Threats by Hosts
In this page you can view and drill down all threats grouped by hosts. The Host can be a user name or email address (if it is available) or a device that is the target of a threat. This page displays all threats that have occurred to the user or victim host during a time period. Click the View Jobs icon or double-click an entry in the table to view the second level.