Print This Page
Outbound filtering of traffic looking for malware generated command and control signatures or data exfiltration. For example, encrypted files being exfiltrated via HTTP or any other known ports that allow outbound traffic.