Step [1]: Go to ITSM → Devices and click the Device List menu.
Step [2]: Choose a device from the list, for which you should see the malicious list.
Step [3]: Click the File list tab and go to the Malicious tab.
Step [4]: The malicious files that are available in a device are listed here.
Step [5]: Click on the name of the file to view the detailed information of the file.