4.3.1
4.3.1.1
4.3.1.2
4.4.1
Update setup ....................................................... 22
4.4.1.1
4.4.1.2
4.4.1.2.1
Update mode ...................................................... 23
4.4.2
4.5 Scheduler ................................................................... 26
4.5.1
4.5.2
4.6 Quarantine .................................................................. 27
4.6.1
4.6.2
4.6.3
4.7 Log files ...................................................................... 28
4.7.1
4.8.1
4.9.1
4.9.2
Statistics .............................................................30
4.9.3
Submission ...........................................................31
4.11 License .......................................................................32
5.1
5.2.1
5.2.2
5.3 Command Line .............................................................33
6. Glossary .............................................. 35
6.1
6.1.1
Viruses ................................................................ 35
6.1.2
Worms ................................................................ 35
6.1.3
Trojan horses ....................................................... 35
6.1.4
Rootkits .............................................................. 35
6.1.5
Adware ............................................................... 35
6.1.6
Spyware .............................................................. 36
6.1.7
6.1.8
6.2.1
DoS attacks ......................................................... 36
6.2.2
DNS Poisoning ..................................................... 36
6.2.3
Worm attacks ...................................................... 36
6.2.4
Port scanning ...................................................... 36
6.2.5
6.2.6
SMB Relay ........................................................... 37
6.2.7
ICMP attacks ....................................................... 37
6.3 E-mail ......................................................................... 37
6.3.1
6.3.2
Hoaxes ................................................................ 37
6.3.3
Phishing .............................................................. 37
6.3.4
6.3.4.1
Rules ................................................................... 38
6.3.4.1
6.3.4.2
Whitelist ............................................................. 38
6.3.4.3
Blacklist .............................................................. 38
6.3.4.5
Need help?
Do you have a question about the SMART SECURITY and is the answer not in the manual?
Questions and answers