Mac Anti-Virus; Mac Bluetooth; Mac Firewall - Extreme Networks Sentriant AG Software User's Manual

Version 5.2
Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

Tests Help

Mac Anti-virus

Description. This test passes if at least one of the required anti-virus software programs for Mac
endpoints is installed.
Test Properties. Select the anti-virus software allowed on your network. Any endpoint that does not
have at least one of the anti-virus software packages selected will fail this test.
How Does this Affect Me?. Anti-virus software scans your computer, email, and other files for known
viruses, worms, and trojan horses. It searches for known files and automatically removes them. A virus
is a program that infects other programs and files and can spread when a user opens a program or file
containing the virus. A virus needs a host (the program or file) to spread.
A worm is a program that can also perform malicious acts (such as delete files and send email);
however, it replicates itself and does not need a host (program or file) to spread. Frequently, worms are
used to install a backdoor (a way for an attacker to gain access without having to login).
A trojan horse is a stand-alone program that is not what it seems. For example, it may seem to be
calendar program, but when you open it, it erases all your files and displays a message, such as "Ha ha,
I deleted your files!" Trojan horse programs do not spread or replicate themselves.
What Do I Need to Do?. Make sure you have an anti-virus program installed, and that the virus
definitions are kept up-to-date.
The following link provides more information on anti-virus software and protecting your computer:
http://www.us-cert.gov/cas/tips/ST04-005.html

Mac Bluetooth

Description. This test verifies that Bluetooth is either completely disabled or if enabled is not
discoverable.
Test Properties. There are no properties to set for this test.
How Does this Affect Me?. Bluetooth is a wireless technology that allows computers and other endpoints
(such as mobile phones and personal digital assistants (PDAs)) to communicate. Whenever you use a
wireless technology, you should make sure that it is secure so that others cannot access your network.
What Do I Need to Do? . Disable Bluetooth, or configure Bluetooth so that it is not discoverable on the
endpoint.
Select Mac Help, or refer to the following for assistance on configuring Bluetooth:
http://www.apple.com/bluetooth/
http://www.bluetooth.com/bluetooth/

Mac Firewall

Description. This test verifies that the firewall is enabled.
434
Sentriant AG Software Users Guide, Version 5.2

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.2

Table of Contents