Tor Tunnel Detection
Low Nessus Network Monitor Plugin ID 2543
SynopsisThe remote host is running software that should be authorized with respect to corporate policy.
DescriptionThe remote client is routing network traffic over the Tor Tunnel network. The Tor tunnel allows users to run applications such as peer-to-peer clients, instant messaging, web browsers over a single encrypted HTTP tunnel. Tor also tunnels and encrypts the DNS requests associated with such applications. By sending traffic over the Tor network, users can bypass corporate policies, firewalls, and guidelines.
SolutionEnsure that the usage of the Tor network is in alignment with corporate polices and guidelines.