Views:

The User-Defined Suspicious Objects list allows you to define suspicious file SHA-1 hash value, suspicious file SHA-256 hash value, IP address, URL, and domain objects that Deep Discovery products with Virtual Analyzer have not yet detected on your network. Supported Deep Discovery products can take action on the objects found in the list to prevent the spread of unknown threats.