IES Message Logs

Written By Marissa Fegan (Super Administrator)

Updated at July 9th, 2025

The VIPRE Integrated Email Security Message Logs screen provides important details about the emails coming into your organization. 

Underneath the search bar and timerange filter toward the top of the page, the first thing you might notice on the Message Logs screen in VIPRE IES is the Real Time Analyses bar graph. This graph provides a daily breakdown of emails, categorizing them as confirmed malicious or simply suspicious.

For example, the screenshot above shows that hovering your mouse cursor over the 8 PM mark on 2025 June 4 reveals that 93 emails were received. Four were flagged as malicious (red), and three were deemed suspicious (orange). 

Clicking on this bar instantly filters the Emails table below to display the messages from that specific day between the time stamps on this bar and the next bar. In the case of our example above, it will show emails received between 8 PM on 2025 June 4 and 2 AM on 2025 June 5.

The Emails table presents key information about each email: the time it was received, the subject, sender, recipient, status, verdict, and severity. Using the Add column + button, you can customize the table by adding or removing columns (such as Sender IP, Detection Engine, et al.).

Use the filters on the left to pinpoint one of the malicious emails received on 2025 June 4. 

Clicking on an individual email in the table opens a slider screen. This screen provides essential details to streamline your investigation, including intent, attachments, tactics, and embedded authentication results. You can quickly assess email legitimacy by checking if SPF, DKIM, and DMARC passed.

For a more comprehensive analysis, click Details. This view allows you to download the email file and raw source, display a copy of the email with highlighted risk indicators, and provide a threat analysis. You can also report false positives/negatives from this screen.

Below are just some examples of what the Message Details could look like for each detection engine:

VIPRE AV Scan

 

VIPRE URL Scan

 

Expert Rule Engine
Threat Analyzer (Details)

 

 

 

 

DeepLink

 

BEC