The Handling Process screen provides an overview of the life-cycle for a suspicious object in your environment and current effect of the suspicious object to your users or endpoints.
Viewing the handling process requires additional licensing for a product or service that includes Virtual Analyzer. Ensure that you have a valid license for at least one of the following:
-
Apex One Sandbox as a Service
-
Deep Discovery Analyzer 5.1 (or later)
-
Deep Discovery Endpoint Inspector 3.0 (or later)
-
Deep Discovery Inspector 3.8 (or later)
- Go to Threat Intel > Virtual Analyzer Suspicious Objects.
-
Click the View link in the Handling Process column of the table for a specific suspicious
object.
The Handling Process screen appears.
-
Click any of the following tabs to view more information about the
suspicious object.
Tab
Description
Sample Submission
Displays information related to the first and latest analysis of the suspicious object
Apex Central integrates with the following products, which use a Virtual Analyzer to analyze suspicious objects submitted by other managed products:
-
Deep Discovery Analyzer 5.1 (or later)
-
Deep Discovery Endpoint Inspector 3.0 (or later)
-
Deep Discovery Inspector 3.8 (or later)
Note:Apex One Sandbox as a Service does not provide Sample Submission information.
Analysis
Displays the Virtual Analyzer analysis of the submitted object
Virtual Analyzer determines the risk level of suspicious objects based on their potential to expose systems to danger or loss. Supported objects include files (SHA-1 hash values), IP addresses, domains, and URLs.
Note:Apex One Sandbox as a Service does not provide Product, Product host name, or Product IP address information.
Distribution
Displays all products that synchronized the Suspicious Object list and the last synchronization time
Apex Central consolidates Virtual Analyzer and user-defined suspicious object lists (excluding exceptions) and synchronizes the lists with integrated managed products.
Impact Analysis & Mitigation
Displays all endpoints and users affected by the suspicious object
-
For File detections, the Latest Action Result column displays the last action result reported from managed products.
-
For all other detection types, the Latest Action Result column displays "N/A".
Click the Root Cause Analysis link to further investigate how the object affected the user or endpoint.
-