An administrator sees several inbound sessions identified as unknown-tcp in the Traffic logs. The administrator determines that these sessions are form external users accessing the company's proprietary accounting application. The administrator wants to reliably identify this traffic as their accounting application and to scan this traffic for threats.
Which option would achieve this result?
trashboat
Highly Voted 3 years, 9 months agoMarshpillowz
Most Recent 1 year agosov4
1 year, 5 months agodrpcc
1 year, 6 months agoALCOSTA35
5 months, 2 weeks agoXuzi
1 year, 2 months agoSarbi
2 years, 1 month agosujss
1 year, 9 months agojavim
2 years agoUFanat
2 years, 7 months agoGngogh
2 years, 2 months agodatz
2 years, 8 months agohpbdcb
4 years, 2 months agoameeeeen
4 years agoMS_NW
4 years, 6 months ago