HP Compaq t5700 User Manual page 72

Hp compaq t5700: supplementary guide
Hide thumbs Also See for Compaq t5700:
Table of Contents

Advertisement

HP Sygate Security Agent User Guide
spoofing: A technique used by an intruder to gain unauthorized network access to a
computer system or network by forging known network credentials. IP spoofing is a
common method for intruders to gain unauthorized network access to a computer
systems or network.
Stealth Mode Browsing: An option that detects all HTTP traffic on port 80 from a web
browser and removes information such as the browser name and version, the
operating system, and the reference web page. It stops web sites from knowing
which operating system and browser you are using. Stealth Mode Browsing may
cause some web sites not to function properly because it removes the browser
signature, called the HTTP_USER_AGENT, from the HTTP request header and
replaces it with a generic signature.
subnet: Portions of a TCP/IP network used to increase the bandwidth on the network by
subdividing the network into portions or segments. All IP addresses within a subnet
use the same first three sets of numbers (such as 192.168.1 in 192.168.1.180 and
192.168.1.170) indicating they are on the same network. A subnet is See also subnet
mask.
subnet mask: A value that allows a network to be subdivided and provides for more
complex address assignments. The subnet mask format is nnn.nnn.nnn.nnn, such as
255.255.255.0.
sweeping: The process that Sygate uses to eliminate old log files on the database. See also
logs.
Sygate Security Agent: Software component that enforces rule-based security on devices,
whether remote or behind a corporate firewall, using security policies defined using
the Policy Editor. Also referred to as the Agent in Sygate documentation. The Agent
must be installed on every device before it can connect to the enterprise network.
The Agent can detect, identify, and block known Trojans and Denial of Service
attacks, and also protects against new or unknown attacks by blocking applications
and traffic that violates a defined set of security policies. Port scans are also detected
and logged to alert users and system administrators of potential attacks, while
maintaining system security.
synchronization: Refers to automatically keeping directory servers up-to-date with the user
database including synchronizing between LDAP, Active Directory, and NT
Domain. System administrators can specify how often to synchronize the user
database with the directory server. See also Active Directory, Lightweight Directory
Access Protocol (LDAP).
62

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents