Suspicious objects are
               objects that Virtual Analyzer analysis determined have the potential to expose systems
               to danger
               or loss.
            
Query suspicious objects to:
            
               - 
                  
                  Better understand the threats affecting your network and their relative risk 
- 
                  
                  Assess the prevalence of suspicious IP addresses, domains, URLs, and files 
- 
                  
                  Find infected endpoints in your network 
- 
                  
                  Proactively contain or block infections