The Threat Search feature sounds really good but I'm wondering how effective people find it? I have a file recently downloaded on my machine and I've calculated the SHA-256 file hash. The file is sat in my downloads folder but when I search for the hash using the Threat Analysis Center it finds nothing. Am I misunderstanding what this feature is supposed to do or not understanding how it works? Ideally, if I'm suspicious of a file, I want to calculate the hash and see where is it is sat n the network.
This thread was automatically locked due to age.