User-Defined Suspicious Objects Tasks

The following table lists all options available:

Table 1. User-defined Suspicious Objects Tasks




Click Add to add a suspicious object. In the new window that opens, configure the following:

  • Type: Select an object type and then type the object (IP address, domain, URL or SHA-1) in the next field.
  • Scan action: Select an action a managed product will take against the object. This field is not available if the type selected is Domains.

    Control Manager automatically deploys the actions to certain managed products.

    For a list of supported managed products, see Suspicious Object Management and Handling Process.

  • Note: Type some notes for the object.


Click Import to add objects from a properly-formatted CSV file. In the new window that opens:

  • If you are importing objects for the first time, click Download sample CSV, save and populate the CSV file with objects (see the instructions in the CSV file), click Browse, and then locate the CSV file.

  • If you have imported objects previously, save another copy of the CSV file, populate it with new objects, click Browse, and then locate the CSV file.


Select an object to modify and then click Edit. In the new window that opens, modify the action and notes as necessary.

Export All

Click Export All to save all the objects to a CSV file.


Select one or several objects to remove and then click Delete.

Data Filters

If there are too many entries in the table, limit the entries by performing these tasks:

  • Select an object type in the View dropdown box.

  • Type some characters in the text box next to View and then press Enter. searches only the Object column for matches.

Records and Pagination Controls

The panel on the bottom right section of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view.