Suspicious objects are
objects that Virtual Analyzer analysis determined have the potential to expose systems
to danger
or loss.
Query suspicious objects to:
-
Better understand the threats affecting your network and their relative risk
-
Assess the prevalence of suspicious IP addresses, domains, URLs, and files
-
Find infected endpoints in your network
-
Proactively contain or block infections