To view all devices impacted by asuspicious file, the administrator should go to theDiscovered Items list, select the specific file, and then view the impacted devices from theDetails page.
Steps to View Impacted Devices:
Navigate to theDiscovered Items listwithin the management console.
Locate and select the suspicious file in question to open itsDetails page.
On the Details page, a list of devices associated with the file is displayed, providing insights into which endpoints are potentially impacted by the suspicious activity.
Why Other Options Are Less Suitable:
Options A and B do not provide the specific device list for a selected file.
Option D is incorrect as it implies selecting by device first rather than by suspicious file.
References: The Discovered Items list and file-specific Details page allow administrators to trace a file’s footprint across multiple devices.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit