The Security Agent generates logs when it detects files in the Suspicious File list and sends the logs to the server.
Logs > Agents > Security Risks
Date and time of suspicious file detection
Infection source SHA-1 hash value of the file
Path of the file
Scan type that detected the suspicious file
For more information on scan results, see Virus/Malware Scan Results.