A suspicious file is the associated SHA-1 hash value with the potential to expose systems to danger or loss. View suspicious files to understand your risk, find related messages, and assess the relative prevalence of the suspicious file.
- Go to Detections > Suspicious Objects > Files.
-
Specify the search criteria.
- File SHA-1
- Period
-
Press ENTER.
All suspicious objects matching the search criteria appear.
-
View the results.
Header
Description
File SHA-1
View the 160-bit hash value that uniquely identifies a file.
Related Messages
View the messages containing the same suspicious object.
Latest Message Recipients
View the most recent recipients of the email message containing suspicious objects.
Latest Detection
View the date and time Virtual Analyzer last found the suspicious object in a submitted object.