Software Required; Worms, Viruses, And Trojans - Extreme Networks Sentriant AG Software User's Manual

Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

Tests Help

Software Required

Description. This test verifies that the endpoint attempting to connect to your system has the required
software packages installed.
Test Properties. Enter a list of applications that are required on all connecting endpoints, separated with
a carriage return. The format for an application is vendor\software package[\version]. Using this
format stores the value in the HKEY_LOCAL_MACHINE\Software key.
For example:
Adobe\Acrobat Reader, Adobe\Acrobat Reader\6.0
You can also specify which key to use for the specific value by entering the key at the beginning of the
value. For example:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Messenger
How Does this Affect Me?. Connecting to a network may be impossible if the correct software is not
installed and operational.
What Do I Need to Do?. Contact the vendor and install the missing software.

Worms, Viruses, and Trojans

Description:. This test verifies that the endpoint attempting to connect to your system does not have any
of the worms, viruses, or trojans listed.
Test Properties. This area of the window displays the current list of worms, viruses, and trojans. No
selection actions are required.
How Does this Affect Me?. A virus is a program that infects other programs and files and can spread
when a user opens a program or file containing the virus. A virus needs a host (the program or file) to
spread. A worm is a program that can also perform malicious acts (such as delete files and send email);
however, it replicates itself—it does not need a host (program or file) to spread. Frequently, worms are
used to install a backdoor (a way for an attacker to gain access without having to login). A trojan horse
is a stand-alone program that is not what it seems. For example, it may seem to be calendar program,
but when you open it, it erases all your files and displays a message, such as "Ha ha, I deleted your
files!" Trojan horse programs do not spread or replicate themselves.
What Do I Need to Do?. Make sure you are running an anti-virus software program, and that it is kept
up-to-date.
415
Sentriant AG Software Users Guide, Version 5.3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.3

Table of Contents