HP Compaq t5700 User Manual page 70

Hp compaq t5700: supplementary guide
Hide thumbs Also See for Compaq t5700:
Table of Contents

Advertisement

HP Sygate Security Agent User Guide
Profile Serial Number: A number that the Policy Editor automatically generates every time
an Agent's security policy changes. A system administrator can check the serial
number on the Help|About menu of the Agent to verify that an Agent is running an
up-to-date security policy.
protocol driver blocking: A security measure that blocks malicious applications from using
their own protocol driver to exit the network surreptitiously.
remote IP address: The IP address of the computer to which information is being
transmitted.
remote port: A port on another computer attempting to transmit information over a
network connection.
rule: See Advanced Rule, firewall rule, Simple Rule.
Running Applications list: Located below the traffic flow graphs; a list of all applications
and services that are currently accessing (or attempting to access) an Agent's network
connection. The status of the applications is also displayed.
Schedule: An Advanced Rule that allows for triggering an event at certain times of the day.
security alerts: A sound or notification indicating that the Agent has detected an attack
against the client computer.
security policy: A combination of all the security rules and settings that have been applied
to a specific group to protect an enterprise's computing integrity. Security policies
can include rules concerning the permitted applications, connection type, VPN,
Ethernet, wireless, and any other restrictions or specifications that an organization
wants to enforce.
service: A network port, a UDP port, an IP protocol type, or an ICMP type.
severity: A mechanism for the Agent logging system that indicates how critical an event is.
Severity ranges from 0 to 15, where 0 is the most critical and 15 is least critical.
signature: A rule that defines how to identify an intrusion. Sygate's Intrusion Detection
System identifies known attacks by pattern-matching against rules or 'signatures'
stored in the System Library or a custom library. See also signature library, System
Library.
60
R
S

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents