Table 11-6
Viruses and security risks (continued)
Description
Risk
Programs that alter or interrupt the operation of a computer in
a way that is intended to be humorous or frightening. For
example, a joke program might move the recycle bin away from
the mouse when the user tries to delete it.
Joke programs
Applications that intentionally misrepresent the security status
of a computer. These applications typically masquerade as
security notifications about any fake infections that must be
removed.
Misleading applications
Programs that monitor or limit computer usage. The programs
can run undetected and typically transmit monitoring
information to another computer.
Parental control
programs
Programs that allow access over the Internet from another
computer so that they can gain information or attack or alter a
user's computer.
Remote access
programs
Programs that are used to gather information for unauthorized
access to a computer.
Security assessment
tool
Stand-alone programs that can secretly monitor system activity
and detect passwords and other confidential information and
relay it back to another computer.
Spyware
Stand-alone or appended applications that trace a user's path on
the Internet and send information to the controller or hacker's
system.
Trackware
About the files and folders that Symantec Endpoint Protection excludes
from virus and spyware scans
When Symantec Endpoint Protection Small Business Edition detects the presence
of certain third-party applications and some Symantec products, it automatically
creates exclusions for these files and folders. The client excludes these files and
folders from all scans.
Note:
The client does not exclude the system temporary folders from scans because
doing so can create a significant security vulnerability on a computer.
To improve scan performance or reduce false positive detections, you can exclude
files by adding a file or a folder exception to an Exceptions policy. You can also
Managing Virus and Spyware Protection
Managing scans on client computers
146
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...