Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
A
-
4
Phishing
A phish is an email message that falsely claims to be from an established or legitimate
enterprise. The message encourages recipients to click on a link that will redirect their
browsers to a fraudulent Web site. Once there, the user is asked to update personal
information such as passwords, social security numbers, and credit card numbers,
which will be used for identity theft. InterScan Gateway Security Appliance provides
tools for handling known phishing sites and for adding others to a list of offenders.
Spam
Spamming is the misuse of electronic communications media to send unsolicited bulk
messages. The most common form of spam is delivered in email as a form of com-
mercial advertising. In practice, however, people use spam for many purposes other
than commercial ones and in many media other than email, including instant messag-
ing, Usenet newsgroups, Web search engines, Web logs, and mobile phone messag-
ing. InterScan Gateway Security Appliance protects you against unwanted spam in
email and on the Web using a database of known spammers and content filters.
Spyware
Spyware refers to that broad category of malicious software designed to intercept or
take partial control of a computer's operation without the informed consent of its
owner or user. While the term suggests software that secretly monitors the user, it
more broadly refers to software that subverts the computer's operation for the benefit
of a third party, usually for commercial gain. Typical uses of spyware include the
delivery of unsolicited pop-up advertisements, the theft of personal information
(including financial information such as credit card numbers), the monitoring of
Web-browsing activity for marketing purposes, and the routing of HTTP requests to
advertising sites.
Trojans
A Trojan is a malicious program that masquerades as a harmless application. Unlike
viruses, Trojans do not replicate, but they can be just as destructive. An application
that claims to rid your computer of viruses when it actually introduces viruses onto
your computer is an example of a Trojan. Trojans do not infect files; therefore, they
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...