The email tab can be found under the Security area of the feature set (Security > Email).
How does CloudRadial obtain the email usage information?
This tab only appears when an Office 365 tenant has been connected to a specific company. The information pulled into this tab is pulled directly from Office 365's reporting services.
There are three metrics to this chart:
- Sent Mail
- Opened Mail
- Read Mail
Sent Mail is mail that originated from within inboxes of the organization to either internal or external organizations.
Opened Mail is mail that has been fully opened (not just seen in the preview pane) of the users within a given organization.
Read Mail is the number of times an email read action was recorded for the user- (aka, the email was fully opened).
How often is this data refreshed?
The information listed within this report is updated once per day at a minimum when the nightly sync happens with Office 365 tenants. The information can be manually pushed if a Partner syncs the tenant against their tenant data between these automated sync cycles.
Furthermore, email activity is tracked for the organization across one calendar month. Large spikes in data (as seen above in an example tenant) are often the result of mail checkers and other specific security programs that sweep email data periodically.
If you see suspicious activity, please submit a ticket and review this with your Microsoft team directly. CloudRadial does not have control over the data pulled in from Microsoft itself.
How should partners be using this information?
Just like the data breaches tab, this tab shouldn't be used as a marker for active reporting and it shouldn't be used to trigger emergency alerts when usage passes a certain mark.
The key discussion, from a cybersecurity and compliance standpoint, is to prove the "When, not IF" proactive mentality of data vulnerability and breach. This chart can serve as a simple way to begin the discussion with the customer as to the sheer volume of moving parts (in this case, emails) in an organization and the number of threat vectors that they introduce.
As such, this conversation can spawn additional revenue opportunity discussions (such as those leading to email security solutions, advanced firewalls, etc.).