Capture Threat Assessment User Guide

Web Activity

Internet browsing that is not being controlled in a network leads to severe risks and potential security violations, including exposure to threat distribution and data loss for your business. If you are not monitoring web activity, you may also be at risk for not being able to comply with various government security requirements. For the CTA report, URLs are filtered through categories defined by the Content Filtering services. The findings are graphed and summarized in the Key Findings of this section.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden