Intrusion Prevention



This indicates detection of suspicious traffics that might belong to various Exploit Kits.
Exploit Kit attempts to compromise a system through various software vulnerabilities.

Affected Products

All unprotected Windows systems


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.