Capture Threat Assessment User Guide

Executive Summary

The Executive Briefing of the prior version transformed into a more informative Executive Summary. Aside from description of the CTA report, you can see a roll-up of certain key elements. They include:

  • Applications
  • Vulnerable Applications
  • Total threats
  • Exploits
  • Malware
  • Zero-day attacks

Further, the Executive Summary takes the top elements from above and summarizes the key findings associated with them.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden