{ "id": "example-id", "sender": "example-sender", "subject": "example-subject", "status": "pending", "severity": "medium", "data_patterns": [ { "id": "example-id", "name": "Staging Policy 72", "category": "standard", "match_count": 700 }, { "id": "example-id", "name": "Branch Scanner 36", "category": "advanced", "match_count": 47 }, { "id": "example-id", "name": "Development Scanner 55", "category": "advanced", "match_count": 674 } ], "match_count": 910, "timestamp": "2026-09-14T02:39:06Z", "has_attachments": true, "attachment_count": 702, "direction": "internal", "action_taken": "alert", "reviewed_by": "example-reviewed_by", "reviewed_at": "2026-08-19T15:15:56Z", "comment": "Malware configured rule endpoint suspicious security policy traffic rule rule on malware." }