Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to use the S1AP protocol.S1 Application Protocol (S1AP) provides signalling service between E-UTRAN...

Jul 20, 2012 RISK: POPULARITY:
This indicates an attempt to delete a directory via SMB. Microsoft Server Message Block (SMB) protocol is a network file sharing...

May 18, 2012 RISK: POPULARITY:
This indicates an attempt to delete a file via SMB. Microsoft Server Message Block (SMB) protocol is a network file sharing and...

May 18, 2012 RISK: POPULARITY:
This indicates an attempt to use the SNMP V3 protocol.SNMP V3 provides additional cryptographic security from SNMP V2. It also...

Apr 24, 2012 RISK: POPULARITY:
This indicates an attempt to use the BlackBerry Enterprise protocol.BlackBerry Enterprise protocol is a proprietary protocol used...

Sep 19, 2011 RISK: POPULARITY:
This indicates an attempt to use the Diameter protocol.Diameter is an authentication, authorization and accounting protocol for...

Aug 17, 2011 RISK: POPULARITY:
This indicates an attempt to use the OWAMP/TWAMP test protocol.OWAMP is the One-way Active Measurement Protocol (OWAMP) and TWAMP...

Aug 10, 2011 RISK: POPULARITY:
This indicates an attempt to use the CAPWAP protocol.Control and Provisioning of Wireless Access Points (CAPWAP) is a network...

Feb 11, 2011 RISK: POPULARITY:
This indicates an attempt to use the MS DFSR protocol.Microsoft Distributed File System Replication (MS DFSR) is a service that...

Oct 13, 2010 RISK: POPULARITY:
This indicates an attempt to upload a file from the web browser via HTTP.

Jan 15, 2010 RISK: POPULARITY:
This indicates an attempt to use the MSRPC protocol with user-specified UUIDs.Microsoft Remote Procedure Call (MSRPC) is Microsoft's...

Jan 15, 2009 RISK: POPULARITY:
This indicates an attempt to use the A/N protocol.A/N is the acronym for Active Networks. It has the ID number 107 in the IP protocol...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the AX.25 protocol.Amateur X.25 (AX.25) is a data link layer protocol from the X.25 protocol...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the BBN RCC Monitoring protocol.It has the ID number 10 in the IP protocol list.

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the CBT protocol.Core-Based Trees is a multicast routing protocol that has a routing tree made...

Jan 13, 2009 RISK: POPULARITY: