Correct Answer: C
To view all devices impacted by asuspicious file, the administrator should go to theDiscovered Items list, select the specific file, and then view the impacted devices from theDetails page.
* Steps to View Impacted Devices:
* Navigate to theDiscovered Items listwithin the management console.
* Locate and select the suspicious file in question to open itsDetails page.
* On the Details page, a list of devices associated with the file is displayed, providing insights into which endpoints are potentially impacted by the suspicious activity.
* Why Other Options Are Less Suitable:
* Options A and B do not provide the specific device list for a selected file.
* Option D is incorrect as it implies selecting by device first rather than by suspicious file.
References: The Discovered Items list and file-specific Details page allow administrators to trace a file's footprint across multiple devices.