Viewing Suspicious File Objects Parent topic

.A suspicious file has the potential to expose systems to danger or loss.
View suspicious file SHA1s to understand your risk and assess the relative prevalence of the suspicious file. Find out detailed information about the detections found for a specific file SHA1.

Procedure

  1. DetectionsSuspicious ObjectsFiles.
  2. Specify the search criteria.
    • File SHA1
    • Period
    When specifying a period, Deep Discovery Web Inspector dynamically filters the results.
    When specifying a file SHA1, click on the Search (icon_search.png) icon or press Enter to filter the results.
    All detections matching the search criteria appear.
  3. View the results.
    Header
    Description
    Suspicious Object
    View the SHA1 value that uniquely identifies a file.
    Risk Level
    View the level of potential danger in an suspicious object.
    Latest Detection
    View the date and time for the most recent occurrence of the malicious or suspicious object detected in Deep Discovery Web Inspector.
    Detections
    View the number of detections with malicious or suspicious characteristics for the selected suspicious file SHA1.