Suspected threat blocked

This situation can occur when an application on your computer is trying to transmit malicious traffic to another computer on the network, exploiting a security hole or even if a port scanning attempt is detected on your system.

Threat – Name of the threat.

Remote address – Remote IP address.

Allow – Creates an Intrusion Detection Service (IDS) rule with predefined no action for each type of action (block, notify, log).

Continue blocking – Blocks detected threat. To create an IDS rule for this threat, select the check box Do not notify me again and the rule will be added without any notification and logging.


Information shown in this notification window may vary depending on the type of threat detected.

For more information about threats and other related terms see Types of remote attacks or Types of detections.