Views:

Apex Central checks Web Reputation, URL filtering, network content inspection, and rule-based detection logs received from all managed products and then compares these logs with its list of suspicious objects.

  1. Go to Threat Intel > Virtual Analyzer Suspicious Objects.

    The Virtual Analyzer Suspicious Objects screen appears.

  2. Click the Objects tab.
  3. Expand the arrow to the left of the Object you want to view.
    • The At Risk Endpoints list displays all endpoints and users still affected by the suspicious object.

      • For File detections, the Latest Action Result column displays the last action result reported from managed products.

      • For all other detection types, the Latest Action Result column displays "N/A".

    • The At Risk Recipients list displays all recipients still affected by the suspicious object.