Views:
Suspicious objects are objects with the potential to expose systems to danger or loss.
Query Suspicious Objects to:
  • Better understand the threats affecting your network and their relative risk
  • Assess the prevalence of suspicious hosts, URLs, files, and synchronized suspicious objects
  • Learn whether email messages contain embedded links or callback addresses
  • Find infected endpoints in your network
  • Proactively contain or block infections