Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to download a file on Zoom.Zoom Video Communications offers cloud video conferencing that unifies HD...

Jan 29, 2019 RISK: POPULARITY:
This indicates an attempt to upload a file on Zoom.Zoom Video Communications offers cloud video conferencing that unifies HD video...

Jan 29, 2019 RISK: POPULARITY:
This indicates an attempt to host or join a meeting on Zoom.Zoom Video Communications offers cloud video conferencing that unifies...

Jan 29, 2019 RISK: POPULARITY:
This indicates an attempt to access Zhihu.Zhihu is a Chinese question-and-answer website that allows users to create and answer...

Sep 25, 2018 RISK: POPULARITY:
This indicates detection of a remote WMI connection over DCE/RPC.Windows Management Instrumentation (WMI) is a suite of tools...

Jul 31, 2018 RISK: POPULARITY:
This indicates an attempt to access Docker.Docker is an application that allows users to perform virtualization of applications...

Jul 10, 2018 RISK: POPULARITY:
This indicates an attempt to pull a blob from Docker.Docker is an application that allows users to perform virtualization of applications...

Jul 10, 2018 RISK: POPULARITY:
This indicates an attempt to pull a manifest from Docker.Docker is an application that allows users to perform virtualization...

Jul 10, 2018 RISK: POPULARITY:
This indicates an attempt to push a blob onto Docker.Docker is an application that allows users to perform virtualization of applications...

Jul 10, 2018 RISK: POPULARITY:
This indicates an attempt to push a manifest onto Docker.Docker is an application that allows users to perform virtualization...

Jul 10, 2018 RISK: POPULARITY:
This indicates an attempt to access LINE WORKS.LINE WORKS is a business version of Line. It is an enterprise communication and...

Jun 11, 2018 RISK: POPULARITY:
This indicates an attempt to use AS2 protocol.AS2 (Applicability Statement 2) is a specification about how to transfer data securely...

May 04, 2018 RISK: POPULARITY:
This indicates an attempt to use the Precision Time Protocol.Precision Time Protocol (PTP) is a protocol to synchronize computer...

Apr 03, 2018 RISK: POPULARITY:
This indicates an attempt to use EPMD.Erlang Port Mapper Daemon(EPMD) acts as a name server on hosts involved in distributed Erlang...

Mar 16, 2018 RISK: POPULARITY:
This indicates detection of the ICCP Stop Transfer IMTransferSet command.ICCP (Inter-Control Center Communications Protocol),...

Mar 02, 2018 RISK: POPULARITY: