Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Web Activity
Internet browsing that is not being controlled in a network leads to severe risks and potential security violations, including exposure to threat distribution and data loss for your business. If you are not monitoring web activity, you may also be at risk for not being able to comply with various government security requirements. For the CTA report, URLs are filtered through categories defined by the Content Filtering services. The findings are graphed and summarized in the Key Findings of this section.
Was This Article Helpful?
Help us to improve our support portal