Get a Break from the Chaos of RSA and Meet with Forcepoint at the St. Regis.

Close

Forcepoint URL Database Protocol Categories

Accurate, current and comprehensive protocol categories.

The Forcepoint URL Database contains the industry's most accurate, current, and comprehensive classification of protocols. We use proprietary classification software and human inspection techniques to categorize and maintain definitions of more than 100 protocols in 15 categories.

Protocol categories help us ensure real-time protection against today's targeted and advanced threats. And they enable you to set policies for protocols such as IM, P2P, and streaming media.

Features

  • Database protocols enable the creation and manipulation of structured sets of information.
  • File transfer protocols enable user control over the transfer of files across a network.
  • Instant messaging/chat protocols enable the sending and receiving of synchronous, real-time messages on the desktop. (Also known as chat-room protocols).
  • Instant messaging file attachment protocols enable the sending and receiving of files attached to synchronous, real-time messages on the desktop.
  • Mail and collaborative tool protocols enable the use of email. Collaboration tool (also known as groupware) protocols also enable the sharing of files and applications across workgroups, networks or enterprises and provide communications and shared workspaces for groups.
  • Malicious Traffic*: Bot Networks: Command-and-control traffic generated by a bot attempting to connect with a botnet for malicious purposes (e.g., remote control or data theft).
  • Malicious Traffic (Monitor Only)*: Email-Borne Worms: Outbound SMTP traffic that may be generated by an email-based worm attack.
  • Other malicious traffic: Inbound or outbound traffic suspected of connection with malicious applications, but not comprised within other protocol definitions.
  • Other protocols not otherwise categorized in the Master Database.
  • P2P file sharing protocols that enable file search and sharing across a network without dependence on a central server.
  • Proxy avoidance protocols that enable the avoidance or bypassing of proxy server features.
  • Remote access protocols that enable authorized remote access to and use of a desktop computer or a private network.
  • Streaming media protocols that enable the use and playback of audio and video files.
  • System protocols used in file management, infrastructure, installers, miscellaneous utilities, operating systems and scripting hosts.
  • User-defined protocols that can be defined by the user.
  • Web protocols that enable online publication of information.

* Only available to customers running Forcepoint Web Security (formerly Websense Web Security Suite) version 6.3.1 or later.