Fortinet black logo

Administration Guide

Appendix G : Supported Application Protocol List

Appendix G : Supported Application Protocol List

FortiNDR has multiple ways to identify protocols and applications from sniffer traffic. The NDR engine supports in-depth analysis of the following protocols, plus thousands of applications available here. Application and protocols= identification is used to profile traffic for Machine Learning as well as identifying attacks against weak ciphers, botnets, intrusion etc.

  • TLS
  • HTTP
  • HTTPS
  • SMB
  • SMTP
  • SSH
  • FTP
  • POP3
  • DNS
  • IRC
  • IMAP
  • RTSP
  • RPC
  • SIP
  • RDP
  • SNMP
  • MYSQL
  • MSSQL
  • POSTGRESQL

Appendix G : Supported Application Protocol List

Appendix G : Supported Application Protocol List

FortiNDR has multiple ways to identify protocols and applications from sniffer traffic. The NDR engine supports in-depth analysis of the following protocols, plus thousands of applications available here. Application and protocols= identification is used to profile traffic for Machine Learning as well as identifying attacks against weak ciphers, botnets, intrusion etc.

  • TLS
  • HTTP
  • HTTPS
  • SMB
  • SMTP
  • SSH
  • FTP
  • POP3
  • DNS
  • IRC
  • IMAP
  • RTSP
  • RPC
  • SIP
  • RDP
  • SNMP
  • MYSQL
  • MSSQL
  • POSTGRESQL