Purpose: Enable and manage the Suspicious Objects List.

Location: Policies > Suspicious Objects

  1. For Enable, select On or Off.
  2. If you selected On for Enable, then the Suspicious Objects List appears and you can perform the following optional steps.

    It may take several seconds for the suspicious objects to appear. You can also click the refresh button to refresh the list.

    1. (Optional) Type a suspicious object in the Search box to filter the suspicious objects list.
    2. (Optional) In the Block Action column, enable or disable the block action for a suspicious object and then click Deploy All.
  3. Click Deploy All.

    The suspicious object settings are deployed to your gateways.