Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tor Tunnel Detection



The remote host is running software that should be authorized with respect to corporate policy.


The remote client is routing network traffic over the Tor Tunnel network. The Tor tunnel allows users to run applications such as peer-to-peer clients, instant messaging, web browsers over a single encrypted HTTP tunnel. Tor also tunnels and encrypts the DNS requests associated with such applications. By sending traffic over the Tor network, users can bypass corporate policies, firewalls, and guidelines.


Ensure that the usage of the Tor network is in alignment with corporate polices and guidelines.