Icon | Risk Level | Description | Example |
Critical | Applications that are used to conceal activity to evade detection | Tor, SpyBoss | |
High | Applications that can cause data leakage, or prone to vulnerabilities or downloading malware | Remote Desktop, File Sharing, P2P | |
Medium | Applications that can be misused | VoiP, Instant Messaging, File Storage, WebEx, Gmail | |
Elevated | Applications are used for personal communications or can lower productivity | Gaming, Facebook, Youtube | |
Low | Business Related Applications or other harmless applications | Windows Updates |