After adding suspicious objects or properly formatted IOC
(STIX or OpenIOC) files to Apex
Central, you can perform an impact analysis by selecting
specific file,
file SHA-1, IP address, or domain objects to determine if the
threat exists within your network and take mitigation steps to prevent the spread
of
the threat to other endpoints.
For more information, see the following topics:
![]() |
Important
|
Procedure
- Go to .The Custom Intelligence screen appears.
- Click the User-Defined Suspicious Objects
tab.The User-Defined Suspicious Object list appears.
- Select one or more objects from the list.
Note
Apex Central does not support analyzing impact for URL objects. - Click Analyze Impact.Endpoint Sensor contacts agents and evaluates the agent logs for any detections of the suspicious objects.
Note
Impact analysis times vary depending on your network environment. - Expand the arrow to the left of the Object
you want to view.
-
The At Risk Endpoints list displays all endpoints and users still affected by the suspicious object.
-
For File detections, the Latest Action Result column displays the last action result reported from managed products.
-
For all other detection types, the Latest Action Result column displays
N/A
.
-
-
The At Risk Recipients list displays all recipients still affected by the suspicious object.
-