How to use Email Threat Scanner—and why you should