Terminology
A
-
5
cannot be cleaned and Trend Micro recommends that they be deleted—a strategy
fully supported by InterScan Gateway Security Appliance.
Viruses
Computer viruses are programs that have the unique ability to replicate. They can
attach themselves to just about any type of executable file and are spread as files that
are copied and sent from individual to individual. In addition to replication, some
computer viruses share another commonality: a damage routine that delivers the virus
payload. While payloads may only display messages or images, they can also destroy
files, reformat your hard drive, or cause other damage. InterScan Gateway Security
Appliance can detect and delete or quarantine viruses during its real-time scans.
Worms
A computer worm is a self-contained program (or set of programs) that is able to
spread functional copies of itself or its segments to other computer systems. The
propagation usually takes place via network connections or email attachments. Unlike
viruses, worms do not need to attach themselves to host programs. Worms cannot be
cleaned, because they are self-contained programs. Therefore, the recommended
action is that they be deleted-fully supported by InterScan Gateway Security Appli-
ance.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...