0% found this document useful (0 votes)
60 views9 pages

High-Risk Application Overview

The document provides a summary of application risk and control over a one month period. It found: - 2 high risk applications and 2 threats posing 494GB of network traffic. - The top applications were Proxy.HTTP, RDP, and VNC, accounting for over 6GB of bandwidth. - 97.85% of proxy application traffic was tunneling rather than proxy. - The top web applications were iCloud, Google Cloud Storage, and Adobe accounting for over 200GB of traffic.

Uploaded by

esteban.chaguala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views9 pages

High-Risk Application Overview

The document provides a summary of application risk and control over a one month period. It found: - 2 high risk applications and 2 threats posing 494GB of network traffic. - The top applications were Proxy.HTTP, RDP, and VNC, accounting for over 6GB of bandwidth. - 97.85% of proxy application traffic was tunneling rather than proxy. - The top web applications were iCloud, Google Cloud Storage, and Adobe accounting for over 200GB of traffic.

Uploaded by

esteban.chaguala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Application Risk and Control

Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Application Visibility and Threats

2 High Risk Apps 2 Threats 494.05 GB Total Bytes 0 Malware

High Risk Apps Visibility and Control Threat Detection and Prevention

50% 2 50%
Proxy 1
Remote.Access 1
2 Malicious & Phis... 2
Apps Threats

100%

Application Risk Definition

SEVERE HIGH ELEVATED GUARDED LOW


Malicious applications or the Applications that can cause Applications are used for Applications consume Business applications or
applications that can bypass malware infection or data personal communication or bandwidth or affect software update
security. leakage: often these have known vulnerabilities. productivity. applications.
applications are used for
Examples: Examples: Examples: Examples:
personal file-sharing or
Botnet, Proxy IM, Email, Storage.Backup Game, Social.Media, Video Update or Business apps
tunnelling other apps.
or Audio apps
Examples:
P2P, Remote.Access

page 1 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Top 10 High Risk Applications

Risk Application Name Category Technology User Total Bytes Session

Proxy.HTTP Proxy Network-Protocol 6 496.07 KB 88

RDP Remote.Access Client-Server 1,579 5.71 GB 23,226

VNC Remote.Access Client-Server 829 197.16 MB 2,475

AnyDesk Remote.Access Client-Server 5 5.71 MB 420

Application Behavioral Characteristics Application Behavioral Characteristics History


proxy tunneling
250

97.85% tunneling
200

Number of Sessions
2.15% proxy

150

100

50

0
01-12 01-15 01-18 01-21 01-24 01-27 01-30 02-02 02-05 02-08

page 2 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Key Applications Crossing the Network


Top 15 High Risk Applications by Bandwidth

Risk Application Name Category Technology User Session Total Bytes

Proxy.HTTP Proxy Network-Protocol 6 88 496.07 KB

RDP Remote.Access Client-Server 1,579 23,226 5.71 GB

VNC Remote.Access Client-Server 829 2,475 197.16 MB

AnyDesk Remote.Access Client-Server 5 420 5.71 MB

page 3 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Top 10 App Categories by Bandwidth Usage

Proxy.HTTP (496KB) RDP (5844MB)

Proxy (496KB)

undefined (6048MB)

Remote.Access (6047MB)

AnyDesk (5850KB)

VNC (197MB)

page 4 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Web Applications
Top 15 Applications by Bandwidth

Risk Application Name Technology User Session Total Bytes

iCloud Browser-Based,Client- 9 40,419 111.98 GB


Server

Google.Cloud.Storage Client-Server 7 194 49.96 GB

Adobe.Web Browser-Based 27 1,731,273 24.64 GB

Amazon.AWS_S3 Browser-Based 16 934 21.03 GB

Microsoft.Outlook.Office.365 Browser-Based 36 70,278 15.23 GB

Microsoft.Windows.Update Client-Server 20 20,912 13.67 GB

Microsoft.Office.Online Browser-Based,Client- 33 58,425 9.84 GB


Server

HTTPS.BROWSER Browser-Based 42 52,081 7.83 GB

Microsoft.Portal Browser-Based 38 178,687 7.39 GB

Microsoft.SharePoint Browser-Based 29 14,896 6.17 GB

WhatsApp_File.Transfer Client-Server 31 20,557 6.02 GB

SSL_TLSv1.3 Network-Protocol 43 51,933 5.41 GB

Google.Services Browser-Based 40 86,718 5.38 GB

Apple.Services Client-Server 15 11,510 4.78 GB

Microsoft.Office.365.Portal Browser-Based 34 37,283 4.50 GB

page 5 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Web Categories in Use


Top 15 Web Categories Visited

URL Category Users Bytes Count

Proxy Avoidance 7 455.13 KB 476

Games 10 1.85 MB 329

Newly Observed Domain 8 73.83 MB 67

Malicious Websites 1 20.18 KB 5

Pornography 1 16.86 KB 4

Other Adult Materials 3 17.31 KB 3

Newly Registered Domain 1 8.67 KB 2

Phishing 1 7.77 KB 2

page 6 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Application Vulnerabibility Exploits


Top 15 Threat by Count

No matching log data for this report

page 7 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Malware: Viruses, Bots, Spyware/Adware

No matching log data for this report

page 8 of 9
Application Risk and Control
Data Range: 2024-01-12 00:00:00 2024-02-10 23:59:59COT (FAZ local)

Zero-day Attacks Detected on the Network


Files Analyzed by FortiCloud Sandbox

No matching log data for this report

Examples of the Malicious Files Detected by FortiCloud Sandbox

No matching log data for this report

page 9 of 9

You might also like