Capture Threat Assessment User Guide

Exploits

Exploits are used by hackers to infect computers and signify one of the initial phases of a breach. Capture Threat Assessment can help you detect the exploitable vulnerabilities within your company that hackers target . It shows you how many applications are delivering exploits in your company and provides the average for your industry and for all organizations so you can compare.

You can also see the top exploits presented in list form.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden