An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network. The user is reporting that the file is not malicious. Which action does the engineer take to identify the file and validate whether or not it is malicious?
d0980cc
1 week agoInitial14
6 months, 2 weeks agoInitial14
6 months, 1 week agoSilexis
2 months, 1 week ago