View Scan Submissions
After submission, the records are available in the listing with their analysis status. You can review the summary details and access the detailed report for further analysis.
View Scan Listing
You can view all scan submissions made by you and other users in your organization in the listing, allowing you to track submissions, review analysis outcomes, and access key details for each record. View the submissions using the following information:
The scan submission list displays the following information:
Title: Name of the submitted artifact.
Status: Current analysis state of the submission, such as Initiated, In Progress, Success, or Failed.
Type: Type of the submission.
Scan ID: Unique identifier of the scanned record.
SHA256: SHA256 hash of the submitted file.
Submitted By: Email ID of the user who initiated the scan.
Submitted On: Date and time of the scan submission.
You can filter submissions by Status and Submitted On. To locate a specific record, enter its file title in the search bar.
You can sort the list by Submitted On in ascending or descending order, and click Refresh to view the latest results. By default, the list is sorted by Submitted On in descending order.
For each scan record, you can perform the following actions:
Download PDF: Save the scan report as a PDF file. The download may take some time, depending on the report size.
Download HTML: Save the full report in HTML format for offline access.
Rescan: Scan the artifact again to generate a new analysis report.
Delete: Delete the scan submission when it is no longer required.
View Scan Report
View the scan report to assess whether a submitted artifact is associated with known threats. The report summarizes detection outcomes and artifact details to help you evaluate potential risk. The report is organized into the following sections:
Summary: Provides the following high-level overview of the scan results:
Detections: Number of engines that flagged the artifact as malicious
File Name: Name of the submitted file
Artifact Size: Size of the submitted artifact
Scan Date: Date and timestamp of the scan
Detections: Lists the engines and their detection results. A green icon indicates a non-malicious artifact, while a red icon indicates a malicious artifact.
File Metadata: Provides technical attributes and historical scan information related to the artifact.
Supported Actions
You can perform the following actions from the scan report:
Submit to Sandbox: Submit the artifact for sandbox analysis to perform deeper behavioral analysis when additional investigation is required.
Rescan: Run the scan again to obtain updated results based on the latest detection data.
Download: Download the scan report in HTML or PDF format for sharing or offline analysis.