A suspicious object is a known malicious or potentially malicious
IP address, domain, URL, or SHA-1 value found in submitted samples. Cloud Email and Collaboration
Protection can use the Suspicious Object lists
synchronized from the Suspicious Object Management app during scanning.
NoteThe Suspicious Object List feature is disabled by default. It applies to all ATP
policies.
|
Procedure
- In Cloud Email and Collaboration Protection, go to .
- On the Suspicious Object List screen that appears, enable or disable the use of the lists during scanning as necessary.
- Click Save.Cloud Email and Collaboration Protection utilizes the suspicious file list in Malware Scanning and the suspicious URL list in Web Reputation.When a URL or file matches an item in the list, Cloud Email and Collaboration Protection takes actions based on how you have configured Suspicious Object Management.
-
Pass: Record the detection in a log and leave the scanned item unchanged.
-
Block/Quarantine: Block the scanned item, or move the scanned item to a dedicated quarantine folder.
Note
The quarantine action does not apply to Gmail. Instead, Cloud Email and Collaboration Protection labels the email message as risky.
-