305
Packet logging
Packet logging is a tool used to analyse network traffic, gather
evidence of illicit behavior etc. It consists of copying the payload and
headers of all the network traffic the computer sees to a file, which
can be viewed later. The Internet Shield logs the packets in the
tcpdump format, and this is readable by most network analysis tools.
Ping
Sending ICMP echo packets and listening for echo reply packets to
verify connections to a remote computer or computers.
Policy
A security policy is a set of well-defined rules that regulate how
sensitive information and other resources are managed, protected,
and distributed. The management architecture of F-Secure software
uses policies that are centrally configured by the administrator for
optimum control of security in a corporate environment.
Policy-based management
Controlling the actions and configurations of a system using policy
statements.
POP
Post Office Protocol. The most common way of retrieving e-mails
from the mail server to users' workstations by e-mail clients, such as
Eudora, Netscape Messenger or Pegasus.
Private Key
The part of the key in a public key system which is kept secret and is
used only by its owner. This is the key used for decrypting messages,
and for making digital signatures.
Protection level
Protection levels are preconfigured attributes that set your level of
security. They are automatically updated to ensure that you are
protected against the newest forms of malicious computer programs
and Internet attacks.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...