This section provides an example to explain how to configure to submit samples to the Cloud Virtual Analyzer for suspicious object analysis and how to utilize the suspicious objects obtained from the Cloud Virtual Analyzer and Apex Central for threat scanning in TMWS policies.
The action applies to each enabled suspicious object generated by the Cloud Virtual Analyzer or synchronized from Apex Central.