Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates detection of gRPC within the network.gRPC is an open source remote procedure call (RPC) system that uses HT...

Nov 23, 2020 RISK: POPULARITY:
This indicates an attempt to use the MSRP protocol.Message Session Relay Protocol (MSRP) is a connection-oriented protocol...

Mar 27, 2019 RISK: POPULARITY:
This indicates an attempt to use the TLS 1.3 protocol.TLS 1.3 is an update from TLS 1.2. It includes many differences such...

Oct 12, 2018 RISK: POPULARITY:
This indicates an attempt to use AS2 protocol.AS2 (Applicability Statement 2) is a specification about how to transfer dat...

May 04, 2018 RISK: POPULARITY:
This indicates an attempt to tunnel SSH data over SOCKS protocol.

Dec 28, 2017 RISK: POPULARITY:
This indicates an attempt to use the STOMP protocol.Simple (or Streaming) Text Oriented Message Protocol (STOMP) is simple...

Nov 01, 2016 RISK: POPULARITY:
This indicates an attempt to send a C-FIND request command via DICOM.Digital Imaging and Communications in Medicine (DICOM...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to send a C-GET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM)...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to send an N-ACTION request command via DICOM. Digital Imaging and Communications in Medicine (D...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to send an N-CREATE request command via DICOM.Digital Imaging and Communications in Medicine (DI...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to access Tracetcp.Tracetcp is a network diagnostic tool for displaying transit path and time de...

Dec 04, 2012 RISK: POPULARITY:
This indicates an attempt to use the BICC protocol.The Bearer-Independent Call Control (BICC) is a signaling protocol base...

Aug 08, 2012 RISK: POPULARITY:
This indicates an attempt to use the S1AP protocol.S1 Application Protocol (S1AP) provides signalling service between E-UT...

Jul 20, 2012 RISK: POPULARITY:
This indicates an attempt to delete a directory via SMB. Microsoft Server Message Block (SMB) protocol is a network file s...

May 18, 2012 RISK: POPULARITY:
This indicates an attempt to write bytes to a file via SMB. Microsoft Server Message Block (SMB) protocol is a network fil...

May 15, 2012 RISK: POPULARITY:
This indicates an attempt to use the HOPOPT protocol.The IPv6 Hop-by-hop options is an extension header that is checked by...

Nov 03, 2011 RISK: POPULARITY:
This indicates an attempt to use SoupTCP protocol.The SoupTCP protocol is composed of logical messages passed between a ho...

Aug 24, 2011 RISK: POPULARITY:
This indicates an attempt to use the SAP protocol.Session Announcement Protocol (SAP) is used by session directory clients...

Aug 12, 2011 RISK: POPULARITY:
This indicates an attempt to use the H.248 protocol.The Gateway Control Protocol (H.248, Megaco) is a protocol for providi...

Aug 10, 2011 RISK: POPULARITY:
This indicates an attempt to use the Quote of the Day protocol.The Quote of the Day service sends a text message to any cl...

Aug 09, 2011 RISK: POPULARITY: