Several file type variances deliver malware, using the most common business applications found in most enterprise networks. While most malware are distributed via .exe files, some malicious file types are being delivered using email with a PDF or Word attachment. You can use the on-appliance signatures or the cloud signatures to detect these threats, which pose a huge risk to your company.