Suspected threat blocked
This situation can occur when an application on your computer is trying to transmit malicious traffic to another computer on the network, exploiting a security hole or if someone is trying to scan ports on your network.
•Threat—Name of the threat.
•Source—Source network address.
•Target—Target network address.
•Stop blocking—Creates an IDS rule for the suspected threat with settings to allow communication.
•Keep blocking—Blocks the detected threat. To create an IDS rule with settings to block communication for this threat, select Do not notify me again.
The information shown in this notification window may vary depending on the type of threat detected. For more information about threats and other related terms, see Types of remote attacks or Types of detections. |