High-Risk Software; Microsoft Office Version Check - Novell ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 User Manual

Table of Contents

Advertisement

A worm is a program that can also perform malicious acts (such as delete files and send email);
however, it replicates itself and does not need a host (program or file) to spread. Frequently, worms
are used to install a backdoor (a way for an attacker to gain access without having to login).
A trojan horse is a stand-alone program that is not what it seems. For example, it may seem to be
calendar program, but when you open it, it erases all your files and displays a message, such as "Ha
ha, I deleted your files!" Trojan horse programs do not spread or replicate themselves.
What Do I Need to Do?
Make sure you have an anti-virus program installed, and that the virus definitions are kept up-to-
date.
The following link provides more information on anti-virus software and protecting your computer:
http://www.us-cert.gov/cas/tips/ST04-005.html (http://www.us-cert.gov/cas/tips/ST04-005.html)
B.5.3 High-risk Software
The following sections contain more information:
"Description" on page 431
"Test Properties" on page 431
"How Does this Affect Me?" on page 431
"What Do I Need to Do?" on page 431
Description
This test verifies that the endpoint attempting to connect to your system does not have High-risk
software installed.
Test Properties
Select the high-risk software not allowed on your network. Any endpoint that has at least one of the
high-risk software packages selected fails this test.
How Does this Affect Me?
Some software provides security risks, such as allowing data to be stored on external servers, or not
encrypting sensitive data.
What Do I Need to Do?
Remove or disable any disallowed high-risk software.
B.5.4 Microsoft Office Version Check
The following sections contain more information:
"Description" on page 432
"Test Properties" on page 432
Tests Help 431

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks network access control 5.0

Table of Contents