Suspicious objects are objects with the potential to expose systems to danger or loss.
Query Suspicious Objects to:
Better understand the threats affecting your network and their relative risk
Assess the prevalence of suspicious hosts, URLs, files, and synchronized suspicious objects
Learn whether email messages contain embedded links or callback addresses
Find infected endpoints in your network
Proactively contain or block infections