Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Malware Analysis
Several file type variances deliver malware, using the most common business applications found in most enterprise networks. While most malware are distributed via .exe files, some malicious file types are being delivered using email with a PDF or Word attachment. You can use the on-appliance signatures or the cloud signatures to detect these threats, which pose a huge risk to your company.
Was This Article Helpful?
Help us to improve our support portal