Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Botnet Analysis
Botnets can be used to initiate denial-of-service attacks; spread viruses, spyware, and adware; circulate malicious programs; and collect confidential data. These types of issues can potentially lead to legal issues and penalties for not protecting data. The Botnet Filter can be enabled to control these infections as cyber attackers use Botnet servers to deliver malware and extract business data. The CTA report highlights the botnet requests detected on your network.
Was This Article Helpful?
Help us to improve our support portal