The remote host is running software that should be authorized with respect to corporate policy.
The remote client is routing network traffic over the Tor Tunnel network. The Tor tunnel allows users to run applications such as peer-to-peer clients, instant messaging, web browsers over a single encrypted HTTP tunnel. Tor also tunnels and encrypts the DNS requests associated with such applications. By sending traffic over the Tor network, users can bypass corporate policies, firewalls, and guidelines.
Ensure that the usage of the Tor network is in alignment with corporate polices and guidelines.