Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to use SECURE-VMTP protocol.Versatile Message Transaction Protocol (VMTP) is a transport protocol designed...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the TRUNK-1 protocol.It has the ID number 23 in the IP protocol list.

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use VMTP protocol.Versatile Message Transaction Protocol (VMTP) is a transport protocol designed...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the XNS-IDP protocol.XNS-IDP is the acronym for XEROX NS IDP. It has the ID number 22 in the...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the LPD protocol.The Line Printer Daemon (LPD) protocol is a print server protocol used to communicate...

Dec 15, 2008 RISK: POPULARITY:
This indicates an attempt to use the T.38 protocol.T.38 is an ITU standard for sending FAX across IP networks in real time. The...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access kpasswd.Kpasswd is Kerberos's password service used to change a Kerberos's principal password.

Jan 15, 2009 RISK: POPULARITY:
This indicates an attempt to use BNA protocol.It has the ID number 49 in the IP protocol list.

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the BR-SAT-MON protocol.BR-SAT-MON is the acronym for Backroom SATNET Monitoring. It has the...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the CPHB protocol.CPHB is the acronym for Computer Protocol Heart Beat. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the CRUDP protocol.CRUDP is the acronym for Combat Radio User Datagram. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the ETHERIP protocol.Ethernet-within-IP Encapsulation (ETHERIP) is a protocol that tunnels Ethernet...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the HMP protocol.The Host Monitoring Protocol (HMP) is used to collect information from hosts...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the IDPR protocol.Inter-Domain Policy Routing (IDPR) is a set of protocols that include the virtual...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the IDRP protocol.IDRP is the acronym for Inter-Domain Routing Protocol. It has the ID number...

Jan 13, 2009 RISK: POPULARITY: