Link to home
Start Free TrialLog in
Avatar of Adhithya Manoj
Adhithya Manoj

asked on

s there a mechanism to identify the route taken by a file transmission from source to destination computer in Unified Endpoint Management .

Hi Team,
Is there a mechanism to identify the route taken by a file transmission from source to destination computer in Unified Endpoint Management .
Avatar of David Favor
David Favor
Flag of United States of America image

No way over the public Internet.

If your local network is flat (no complex hops between computers), you can likely can, given sufficient time/budget/will.

If files are STMP message attachments, you can decode the Received: headers for a guess.

The TCP/UDP protocols aren't really meant to... somehow record route of each packet, as this level of overhead greatly reduce packet flow speed.

Some network protocols attempt something similar to what you're asking + all a person has to do to hide part of this process is to route through a VPN services.
Suggestion: Open a new question describing what you're trying to accomplish by having this routing data.

You might find many people have working solutions to your requirement.
In general, routing is dynamic over Internet.

In general, you can use traceroute (unix/linux) or tracrt (windows) to find the route to any remote server, but this is valid for some time and may change as the network load / traffic routing by carriers /topology may change.
Avatar of Adhithya Manoj
Adhithya Manoj

ASKER

Hi Team,
i was researching on UEM technology on mobile devices i want to know about Identifying the originating ip address ,file ,packet number ,sequence and destination of the file
To trace whether such identifying signature will help to identify the route taken by the file being transferred from the primary source to dest.
To see whether standard routes are established for transfer of data
Strategies of detection
1. signature based
2. Behavior based signature
if a new exploit arises how the organization detects and removes the new exploit before damaging the environment in mobile threat management system
ASKER CERTIFIED SOLUTION
Avatar of David Favor
David Favor
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
 How Threat Defense Mechanism works in deep dive in UEM because we have IBM Maas360 and it has features like advisors to detect but how this detection works  for mobile devices and how to identify and prevent these attacks?