Capture Threat Assessment User Guide

Botnet Analysis

Botnets can be used to initiate denial-of-service attacks; spread viruses, spyware, and adware; circulate malicious programs; and collect confidential data. These types of issues can potentially lead to legal issues and penalties for not protecting data. The Botnet Filter can be enabled to control these infections as cyber attackers use Botnet servers to deliver malware and extract business data. The CTA report highlights the botnet requests detected on your network.