Suspicious objects are objects with the potential to expose systems to danger or loss.
Query Suspicious Objects to:
-
Better understand the threats affecting your network and their relative risk
-
Assess the prevalence of suspicious hosts, URLs, files, and synchronized suspicious objects
-
Learn whether email messages contain embedded links or callback addresses
-
Find infected endpoints in your network
-
Proactively contain or block infections