Capture Threat Assessment User Guide

Botnet Analysis

Botnets can be used to initiate denial-of-service attacks; spread viruses, spyware, and adware; circulate malicious programs; and collect confidential data. These types of issues can potentially lead to legal issues and penalties for not protecting data. The Botnet Filter can be enabled to control these infections as cyber attackers use Botnet servers to deliver malware and extract business data. The CTA report highlights the botnet requests detected on your network.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden