Glossary
about box
A dialog box containing basic information about the application, such as product name and version
number, company name, logo, copyright date, trademarks, and legal notices.
access control
The mechanisms and policies that restrict access to computer resources. An access control list (ACL),
for example, specifies what operations different users can perform on specific files and directories.
action
A predefined response to an event or alert by a system or application.
activation
The process of making a configuration available for download and notifying all associated security
gateways that it is there. Successful validation is a required piece of the activation process.
active
A status that indicates that a program, job, policy, or scan is running. For example, when a scheduled
scan executes, it is considered active.
ActiveX
The name that Microsoft has given to a set of strategic object-oriented program technologies and
tools. ActiveX is Microsoft’s answer to the Java technology from Sun Microsystems in that an ActiveX
control is roughly equivalent to a Java applet. The main thing that you create when writing a program
to run in the ActiveX environment is a component, a self-sufficient program that can be run
anywhere in your ActiveX network (currently a network consisting of Windows and Macintosh
systems). This component is known as an ActiveX control.
address transforms
A process that lets you present routable addresses to the security gateway for packets passing
through a security gateway interface or secure tunnel.
administrator
1. A person who oversees the operation of a network.
2. A person who is responsible for installing programs on a network and configuring them for
distribution to workstations. The administrator may also update security settings on workstations.
agent
See SESA Agent.
In SESA, a message that notifies a SESA user that some predefined condition has been met. SESA can
be configured to create an alert for specific kinds of events. Alerts can be triggered, for example, by a
threshold number of events within a specified time or changes relating to the point product (such as
a crash, agent restart, or a loss of connectivity).
alert
An event or set of events that an administrator should review and potentially configure a notification
for. Alerts are used to escalate a single event or a group of events and to draw more attention to the
events.
alert threshold
A rule that monitors suspicious activity based on access attempts and time intervals. You can
customize or disable the default threshold according to your needs.
AES (Advanced Encryption Standard)
A symmetric block cipher that is used to protect electronic data. The AES algorithm is capable of
using cryptographic keys of 128 bits (AES with 16-byte key), 192 bits (AES with 24-byte key), and 256
bits (AES with 32-byte key) to encrypt and decrypt data in blocks of 128 bits.
antivirus comforting
See client comforting.
applet
See Java applet.
application gateway
A gateway that evaluates the use of application layer protocols, such as Telnet and File Transfer
Protocol (FTP), and then forwards them to the application. Because the application gateway
understands these protocols, it provides security for each application that it supports. Also called
application-layer security gateway.
application server
A software server that lets thin clients use applications and databases that are managed by the
server. The application server handles all of the application operations and connectivity for the
clients.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...