Capture Threat Assessment User Guide

Malware Analysis

Several file type variances deliver malware, using the most common business applications found in most enterprise networks. While most malware are distributed via .exe files, some malicious file types are being delivered using email with a PDF or Word attachment. You can use the on-appliance signatures or the cloud signatures to detect these threats, which pose a huge risk to your company.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden