Traffic scan, specifically referring to a Network traffic scanner, is a security feature designed to provide malware protection for application protocols.
A Network traffic scanner integrates multiple advanced scanning techniques to identify malicious threats within the data streams flowing across a network. Its primary role is to act as a layer of defense against malware attempting to enter a system through common internet activities.
How a Network Traffic Scanner Works
Based on the provided information, a Network traffic scanner functions by automatically examining data transmitted over specific communication protocols. This scanning occurs seamlessly, without requiring user interaction or being tied to a particular web browser or email client.
Key functions highlighted in the reference include:
- Malware Protection: Its core purpose is to defend against malware.
- Protocol Integration: It works with specific application protocols.
- Advanced Scanning: Utilizes advanced techniques for detection.
- Automation: Scans automatically without user intervention.
Protocols Scanned
According to the reference, a Network traffic scanner automatically scans the following protocols:
- HTTP(S): Used for secure and non-secure web browsing.
- POP3(S): Used for securely and non-securely receiving emails from a server.
- IMAP(S): Used for securely and non-securely managing emails on a server.
By scanning these common protocols, the scanner helps to intercept threats embedded in websites or email communications before they can infect a device or network.