An administrator sees several inbound sessions identified as unknown-tcp in the Traffic logs. The administrator determines that these sessions are form external users accessing the company's proprietary accounting application. The administrator wants to reliably identify this traffic as their accounting application and to scan this traffic for threats.
Which option would achieve this result?
trashboat
Highly Voted 3 years, 3 months agoMarshpillowz
Most Recent 7 months agosov4
1 year agodrpcc
1 year agoALCOSTA35
1 week, 4 days agoXuzi
9 months, 2 weeks agoSarbi
1 year, 8 months agosujss
1 year, 4 months agojavim
1 year, 7 months agoUFanat
2 years, 2 months agoGngogh
1 year, 9 months agodatz
2 years, 2 months agohpbdcb
3 years, 9 months agoameeeeen
3 years, 7 months agoMS_NW
4 years, 1 month ago