Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to use the NTP protocol.Network Time Protocol (NTP) is a protocol to synchronize computer clocks between...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the SNMP V1 protocol.SNMP V1 is the first implementation of the SNMP protocol. It operates over...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the SMB v2 protocol.Microsoft Server Message Block (SMB) protocol is a network file sharing and...

Oct 11, 2017 RISK: POPULARITY:
This indicates an attempt to use the TLS 1.0 protocol.TLS 1.0 is an upgrade of SSL 3.0. There are no significant differences between...

Oct 22, 2015 RISK: POPULARITY:
This indicates an attempt to use the TLS 1.2 protocol.TLS 1.2 is an update of TLS 1.1. It includes many differences like expansion...

Oct 22, 2015 RISK: POPULARITY:
This indicates an attempt to use the ESP protocol over UDP.Encapsulating Security Payload (ESP) is part of the IPsec protocol...

Feb 17, 2011 RISK: POPULARITY:
This indicates an attempt to use the Teredo protocol.Teredo is a tunneling protocol which encapsulates IPv6 packets within IPv4...

Feb 19, 2009 RISK: POPULARITY:
This indicates an attempt to use the ISAKMP protocol.Internet Security Association and Key Management Protocol (ISAKMP) is a protocol...

Jan 16, 2009 RISK: POPULARITY:
This indicates an attempt to use the ICMP protocol.Internet Control Message Protocol (ICMP) is used by network devices to send...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the Daytime protocol.The Daytime protocol is used for testing in a computer network. It returns...

Dec 15, 2008 RISK: POPULARITY:
This indicates an attempt to use the Time protocol.The Time protocol is a network protocol that provides a site-independent, machine...

Dec 15, 2008 RISK: POPULARITY:
This indicates an attempt to use the LDAP protocol.Lightweight Directory Access Protocol (LDAP) provides access to distributed...

Dec 10, 2008 RISK: POPULARITY:
This indicates an attempt to use the DHCP protocol.The Dynamic Host Configuration Protocol (DHCP) is a network protocol to distribute...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use Kerberos protocol.Kerberos is a network authentication protocol that is designed to provide strong...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the Portmap protocol.Portmap is an Open Network Computing Remote Procedure Call (ONC RPC) service...

Dec 09, 2008 RISK: POPULARITY: