Unsolicited Communications Finding Considerations Ingrid When classifying observations as Unsolicited Communications events, we look for unwanted connection attempts to the system. These are captured by the hardware of software-based systems, such as firewalls. Examples Communication attempts include secure shell (SSH) brute-force attempts, port probes, and network ports scanning. A device sends unsolicited communication if it is infected with a worm that is attempting to locate new devices to infect. January 14, 2020: Published. Related articles Unsolicited Communications Risk Vector Potentially Exploited Finding Considerations How is the Unsolicited Communications Risk Vector Observed? What is Malware? Sinkhole Feedback 0 comments Please sign in to leave a comment.