The following table describes the
suspicious objects that Deep Discovery Analyzer detects and adds to the Generated Suspicious Objects list.
Field
|
Description
|
Last Detected
|
Date and time Virtual Analyzer last found the object in
a submitted sample
|
Expiration
|
Date and time Virtual Analyzer will remove the object
from the Suspicious Objects tab
|
Risk Level
|
If the suspicious object is:
Risk level descriptions:
|
Type
|
IP address,
Domain, URL, or
File SHA-1
|
Object
|
The IP address, domain, URL, or SHA-1 hash value of the
file
|
Latest Related Sample
|
SHA-1 hash value of the sample where the object was last
found.
|
Related Submissions
|
The total number of samples where the object was
found.
Clicking the number opens the Submissions screen with the SHA-1 hash value as the
search criteria.
|
The following table describes the tasks you can perform on the
Generated Suspicious Objects tab.
Suspicious Objects Tasks
Task
|
Steps
|
Export/Export All
|
Select one or several objects and then click
Export to save the objects to a CSV
file.
Click Export All to save all the
objects to a CSV file.
|
Add to Exceptions
|
Select one or several objects that you consider harmless
and then click Add to Exceptions. The objects
move to the Exceptions tab.
|
Never Expire
|
Select one or several objects that you always want
flagged as suspicious and then click Never
Expire.
|
Expire Now
|
Select one or several objects that you want to remove
from the Suspicious Objects and then click
Expire Now. When the same object is
detected in the future, it will be added back to the
Suspicious Objects.
|
Data Filters
|
If there are too many entries in the table, limit the
entries by performing these tasks:
|
Records and Pagination Controls
|
The panel at the bottom of the screen shows the total
number of objects. If all objects cannot be displayed at the same
time, use the pagination controls to view the objects that are
hidden from view.
|