Some applications are non-malicious and possibly useful in the right context, but are not suitable for company networks. Examples are adware, tools for administering PCs remotely and scanners that identify vulnerabilities in computer systems.
Certain antivirus and endpoint security programs can detect PUAs on users’ computers and report them.
Back to Security Threats A-Z
Back to Threatsaurus Home