icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Tor Tunnel Detection

Medium

Synopsis

The remote client just started a Tor tunnel for routing network traffic over the Tor Tunnel network.

Description

The remote client just started a Tor tunnel for routing network traffic over the Tor Tunnel network. The Tor tunnel allows users to run applications such as peer-to-peer clients, instant messaging and web browsers over a single encrypted tunnel. Tor also tunnels and encrypts the DNS requests associated with such applications. By sending traffic over the Tor network, users can bypass corporate policies, firewalls, and guidelines.

Solution

Ensure that the usage of the Tor network is in alignment with corporate polices and guidelines.