Viewing Suspicious Files Parent topic

A suspicious file is the associated SHA-1 hash value with the potential to expose systems to danger or loss. View suspicious files to understand your risk, find related messages, and assess the relative prevalence of the suspicious file.

Procedure

  1. Go to DetectionsSuspicious ObjectsFiles.
  2. Specify the search criteria.
    • File SHA-1
    • Period
  3. Click Search.
    All suspicious objects matching the search criteria appear.
  4. View the results.
    Header
    Description
    File SHA-1
    View the 160-bit hash value that uniquely identifies a file.
    Note
    Note
    The SHA-1 hash value links to Threat Connect. Threat Connect correlates suspicious objects detected in your environment and threat data from the Trend Micro Smart Protection Network to provide relevant and actionable intelligence.
    Related Messages
    View the messages containing the same suspicious object.
    Last Message Recipients
    View the most recent recipients of the email message containing suspicious objects.
    Last Detected
    View the date and time Virtual Analyzer last found the suspicious object in a submitted object.