Glossary
administrator
1. A person who oversees the operation of a network. 2. A person who is responsible for
installing programs on a network and configuring them for distribution to workstations.
The administrator may also update security settings on workstations.
adware
Programs that secretly gather personal information through the Internet and relay it back
to another computer. This is done by tracking browsing habits, generally for advertising
purposes.
Agent
A component of Symantec Mail Security for SMTP that facilitates communicating
configuration information between the Control Center and each Scanner.
Allowed Senders List
In Symantec Mail Security for SMTP, a list of senders whose messages are omitted from
most types of filtering (but not from virus filtering).
annotation
A phrase or paragraph placed at the beginning or end of the body of an email message.
Symantec Mail Security for SMTP allows you to specify up to 1000 distinct annotations to
use in specific categories of messages for specific groups of recipients. You can use this
feature to automate email disclaimers.
antivirus
A subcategory of a security policy that pertains to computer viruses.
API (application
programming interface)
The specific methodology by which a programmer writing an application program can
make requests of the operating system or another application.
archive
An action that can be performed on email messages by Symantec Mail Security for SMTP,
which consists of forwarding the messages to a specific SMTP address.
attachment list
A list of attachment types for use in filtering. You can create attachment lists based on file
naming (for example, based on the file extension), or on the true type of each file, or you
can use any of five pre-filled lists.
Audit ID
A unique identifier generated by Symantec Mail Security for SMTP and included as a
message header in all processed messages.
authentication
The process of determining the identity of a user attempting to access a network.
Authentication occurs through challenge/response, time-based code sequences, or other
techniques. Authentication typically involves the use of a password, certificate, PIN, or
other information that can be used to validate identity over a computer network.
Содержание Mail Security
Страница 1: ...Symantec Mail Security for SMTP Administration Guide ...
Страница 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Страница 60: ...60 Configuring email settings Configuring scanning settings ...
Страница 116: ...116 Configuring email filtering Managing policy resources ...
Страница 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Страница 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Страница 162: ...162 Configuring alerts and logs Configuring logs ...
Страница 208: ...208 Feature Cross Reference About email filtering and message handling options ...