Viewing Suspicious Files

A suspicious file is the associated SHA-1 hash value with the potential to expose systems to danger or loss. View suspicious files to understand your risk, find related messages, and assess the relative prevalence of the suspicious file.

  1. Go to Detections > Suspicious Objects > Files.
  2. Specify the search criteria.
    • File SHA-1
    • Period
  3. Press ENTER.

    All suspicious objects matching the search criteria appear.

  4. View the results.

    Header

    Description

    File SHA-1

    View the 160-bit hash value that uniquely identifies a file.

    Related Messages

    View the messages containing the same suspicious object.

    Latest Message Recipients

    View the most recent recipients of the email message containing suspicious objects.

    Latest Detection

    View the date and time Virtual Analyzer last found the suspicious object in a submitted object.