Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.
Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection.
| Data Component | Name | Channel |
|---|---|---|
| Network Traffic Flow (DC0078) | Network Traffic | None |
| Network Communication (DC0113) | Application Vetting | None |
Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.
Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection.
| Data Component | Name | Channel |
|---|---|---|
| Network Traffic Flow (DC0078) | Network Traffic | None |
| Network Communication (DC0113) | Application Vetting | None |