Viewing Suspicious Objects Parent topic

Procedure

  1. Go to DetectionsSuspicious Objects.
  2. Click detection type drop-down and then select one of the following detection types:
    • All (default)
    • Files
    • IP Addresses
    • URLs
    • Domains
  3. Click the time period drop-down and then select a time period.
    Note
    Note
    The table contains all suspicious objects regardless of the time period. The time period filters the number for detections for each suspicious object during that time period. If a suspicious object was not detected during the selected time period, the total detections for that suspicious object will be "0".
  4. (Optional) Move an object to the Deny List or the Allow List.
    1. Select a suspicious object detection.
    2. Click either Move to Deny List or Move to Allow List.
      A window appears to move to the Deny List or Allow List.
    3. Specify the options and click Save.
      A notification that asks to reload the lists appears.
    4. Click Reload.
  5. To delete any detection, select the item and click Delete.
    After deleting detections, a notification appears to reload the lists. Click Reload.
  6. (Optional) Click a number in the Detections column to drill-down to the All Detections screen with filters applied.
  7. To sort the list of suspicious objects, click the column titles.
    Note
    Note
    Only one column can be sorted at a time.
    • Suspicious Object: Ascending/descending alphanumeric
    • Risk Level: Ascending/descending alphabetical
    • Type: Ascending/descending alphabetical
    • Expiration: Earliest/latest date
    • Detections: Ascending/descending numerical