An application sometimes launches another hidden process to perform some network access for it.
Malicious applications can use this technique to evade firewalls: they launch a trusted application to access the network rather than doing so themselves.
The firewall sends an alert to the management console, if one is being used, the first time a hidden process is detected.
To allow applications to launch hidden processes:
For information about the Home page, see About the Home page.