The analysis chain shows object types using the following icons:
| Icon | Name | Description | 
|---|---|---|
| 
 | First Observed Object | Marks an object that most likely created the matched object | 
| 
 | Matched Criteria | Marks objects matching the investigation criteria | 
| 
 | Normal Object | Marks objects that have been verified to not pose a threat These are usually common system files. | 
| 
 | Unrated Object | Marks objects that have not yet been rated | 
| 
 | Suspicious Object | Marks objects that exhibit behaviors that are similar to known threats | 
| 
 | Malicious Object | Marks objects that match a known threat | 
| 
 | Boot | Objects that launch during system startup | 
| 
 | Browser | Objects that are capable of displaying web pages, usually a web browser | 
| 
 | Email client | Objects that can send and receive email messages, usually an email client or server | 
| 
 | Email message | Objects identified through use of the Cloud App Security integration email correlation feature | 
| 
         | File | Objects that are files on the disk | 
| 
 | Network | Objects related to network connections or the Internet | 
| 
 | Process | Objects that are processes running during the time of execution | 
| 
 | Registry | Objects that are registry keys, entries or data | 
| 
 | Event | Indicates actions done by the object | 
| 
 | Association | Indicates relationships between two objects | 
 
		
 
        
        
        
        
        
        
        
        
       

 
        
        
        
       