Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Risky Applications
The section on Risky Applications has been expanded to include several views of the data. It's an attempt to assess the risk of your applications by first categorizing them into industry-standard categories and then comparing them to the number of variants that exist across other organizations. This data can help you decide what applications need to be blocked. You can immediately see where you fall on a 1 to 5 risk scale to understand your overall risk.
The top Risky Applications categories are individually graphed and grouped on a page so you can see the detail associated with them. For example, the graph for the Top Policy Violation Apps is shown below.
At the top of the graph, you can see how much bandwidth is being consumed by this category of Risky Applications. To the right of the bandwidth, the total number of application variants in your own network is compared to the industry average. The bar chart below that shows the relative distribution of the bandwidth between the applications listed. Similar reports are shown for other top categories.
Individual applications are also assessed for risk. A ranked list is provided at the end of the Risky Applications section and shows detail like this:
Was This Article Helpful?
Help us to improve our support portal