Views:

Suspicious objects are objects with the potential to expose systems to danger or loss.

Query Suspicious Objects to:

  • Better understand the threats affecting your network and their relative risk

  • Assess the prevalence of suspicious hosts, URLs, files, and synchronized suspicious objects

  • Learn whether email messages contain embedded links or callback addresses

  • Find infected endpoints in your network

  • Proactively contain or block infections