Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to tunnel SSH data over SOCKS protocol.

Dec 28, 2017 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the NAT-PMP protocol.The NAT Port Mapping Protocol (NAT-PMP) is a network protocol used t...

Sep 08, 2017 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the Wake-on-LAN protocol.Wake-on-LAN is a protocol developed by AMD and Hewlett Packard f...

Jan 24, 2017 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to tunnel SSH data over HTTP.

Aug 28, 2014 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the RMCP protocol.Remote Management and Control Protocol (RMCP) is a UDP based protocol f...

Sep 05, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the BFD protocol.Bi-directional Forwarding Detection (BFD) is a networking standard that ...

Jun 18, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send a C-GET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM)...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send a C-MOVE request command via DICOM.Digital Imaging and Communications in Medicine (DICOM...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send an N-ACTION request command via DICOM. Digital Imaging and Communications in Medicine (D...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send an N-CREATE request command via DICOM.Digital Imaging and Communications in Medicine (DI...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send an N-GET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to send an N-SET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM...

Jan 25, 2013 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the BICC protocol.The Bearer-Independent Call Control (BICC) is a signaling protocol base...

Aug 08, 2012 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the S1AP protocol.S1 Application Protocol (S1AP) provides signalling service between E-UT...

Jul 20, 2012 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the AS2 protocol.Applicability Statement 2 (AS2) is the communication standard use to sec...

Mar 29, 2012 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the HOPOPT protocol.The IPv6 Hop-by-hop options is an extension header that is checked by...

Nov 03, 2011 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the RIPng protocol.Routing Information Protocol next generation (RIPng) is the routing pr...

Nov 03, 2011 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use SoupTCP protocol.The SoupTCP protocol is composed of logical messages passed between a ho...

Aug 24, 2011 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the Diameter protocol.Diameter is an authentication, authorization and accounting protoco...

Aug 17, 2011 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the MMS protocol.The Multimedia Messaging Service (MMS) is a protocol used by Wireless Ap...

Aug 17, 2011 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo