Provides detailed information about the impact of Virtual Analyzer suspicious objects
| 
 Data  | 
 Description  | 
|---|---|
| 
 Type  | 
 The type of suspicious object  | 
| 
 Object  | 
 The name of the suspicious object  | 
| 
 Scan Action  | 
 The scan action taken by the managed product that detected the suspicious object (for example, Log, Bock)  | 
| 
 Risk Level  | 
 The risk level of the security threat  | 
| 
 Expiration  | 
 The date and time the suspicious object is set to expire  | 
| 
 First Submission Time  | 
 The date and time the managed product first submitted the suspicious object to Virtual Analyzer  | 
| 
 First Submission Product Name  | 
 The name of the managed product that first submitted the suspicious object to Virtual Analyzer  | 
| 
 First Submission Host Name  | 
 The display name of the managed server that first submitted the suspicious object to Virtual Analyzer  | 
| 
 First Submission IP Address  | 
 The IP address of the managed server that first submitted the suspicious object to Virtual Analyzer  | 
| 
 First Submission File Name  | 
 The file name of the suspicious object that the managed product first submitted to Virtual Analyzer  | 
| 
 First Submission Source  | 
 The source of the suspicious object that the managed product first submitted to Virtual Analyzer  | 
| 
 First Submission Destination  | 
 The destination of the suspicious object that the managed product first submitted to Virtual Analyzer  | 
| 
 Latest Submission Time  | 
 The date and time the managed product last submitted the suspicious object to Virtual Analyzer  | 
| 
 Latest Submission Product Name  | 
 The name of the managed product that last submitted the suspicious object to Virtual Analyzer  | 
| 
 Latest Submission Host Name  | 
 The display name of the managed product that last submitted the suspicious object to Virtual Analyzer  | 
| 
 Latest Submission IP Address  | 
 The IP address of the last managed server that last submitted the suspicious object to Virtual Analyzer  | 
| 
 Latest Submission File Name  | 
 The file name of the suspicious object that the managed product last submitted to Virtual Analyzer  | 
| 
 Latest Submission File Type  | 
 The file type of the suspicious object that the managed product last submitted to Virtual Analyzer  | 
| 
 Latest Submission Source  | 
 The source of the suspicious object that the managed product last submitted to Virtual Analyzer  | 
| 
 Latest Submission Destination  | 
 The destination of the suspicious object that the managed product last submitted to Virtual Analyzer  | 
| 
 Endpoint Domain Name  | 
 The domain name of the endpoint that triggered the detection  | 
| 
 Endpoint Host Name  | 
 The display name of the endpoint that triggered the detection  | 
| 
 Endpoint User Domain Name  | 
 The domain name of the user logged on to the endpoint at the time of the detection  | 
| 
 Endpoint User Domain Account  | 
 The domain account of the user logged on to the endpoint at the time of the detection  | 
| 
 Endpoint User Name  | 
 The logged on user name at the time of the event  | 
| 
 Endpoint IP Address  | 
 The IP address of the endpoint  | 
| 
 Endpoint First Found Time  | 
 The date and time the suspicious object was first detected on the endpoint  | 
| 
 Endpoint First Product Detection  | 
 The name of the managed product that first detected the suspicious object on the endpoint  | 
| 
 Endpoint First Action Taken  | 
 The first action taken on the endpoint by the managed product  | 
| 
 Endpoint Last Found Time  | 
 The date and time the suspicious object was last detected on the endpoint  | 
| 
 Endpoint Last Product Detection  | 
 The name of the managed product that last detected the suspicious object on the endpoint  | 
| 
 Endpoint Last Action Taken  | 
 The last action taken on the endpoint by the managed product  | 
| 
 Endpoint Last Action Result  | 
 The result of the last action taken on the endpoint by the managed product  | 
		