244 Glossary
port
1. A hardware location used for passing data into and out of a computing device. Personal
computers have various types of ports, including internal ports for connecting disk drives,
monitors, and keyboards, and external ports, for connecting modems, printers, mouse
devices, and other peripheral devices. 2. In TCP/IP and UDP networks, the name given to
an endpoint of a logical connection. Port numbers identify types of ports. For example,
both TCP and UDP use port 80 for transporting HTTP data.
probe accounts
Email addresses assigned to Symantec by our Probe Network Partners, and used by
Symantec Security Response to detect spam.
Probe Network
A network of email accounts provided by Symantec’s Probe Network Partners. Used by
Symantec Security Response for the detection of spam, the Probe Network has a statistical
reach of over 300 million email addresses, and includes over 2 million probe accounts.
Probe Network Partners
ISPs or corporations that participate in the Probe Network.
protocol
A set of rules for encoding and decoding data so that messages can be exchanged between
computers and so that each computer can fully understand the meaning of the messages.
On the Internet, the exchange of information between different computers is made
possible by the suite of protocols known as TCP/IP. Protocols can be stacked, meaning that
one transmission can use two or more protocols. For example, an FTP session uses the FTP
protocol to transfer files, the TCP protocol to manage connections, and the IP protocol to
deliver data.
proxy
An application (or agent) that runs on the security gateway and acts as both a server and
client, accepting connections from a client and making requests on behalf of the client to
the destination server. There are many types of proxies, each used for specific purposes.
See also gateway, proxy server.
proxy server
A server that acts on behalf of one or more other servers, usually for screening, firewall, or
caching purposes, or a combination of these purposes. Also called a gateway. Typically, a
proxy server is used within a company or enterprise to gather all Internet requests,
forward them out to Internet servers, and then receive the responses and in turn forward
them to the original requester within the company.
radio button
A click button used to select one of several options.
reject
An action that an MTA receiving an email message can take, which consists of using a 5xx
SMTP response code to tell the sending MTA that the message is not accepted.
release
In Symantec Mail Security for SMTP, an action that end users or administrators can take
on messages in the Spam Quarantine database. Releasing removes the message from the
Spam Quarantine database and returns the message to the end user’s inbox. See also Spam
Quarantine.
replication
In Symantec Mail Security for SMTP, the process of duplicating configuration data from
the Control Center to Scanners.
report
A formatted query that is generated from a database. Administrators can modify reports
to create custom reports of specific event data.
Содержание Mail Security
Страница 1: ...Symantec Mail Security for SMTP Administration Guide ...
Страница 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Страница 60: ...60 Configuring email settings Configuring scanning settings ...
Страница 116: ...116 Configuring email filtering Managing policy resources ...
Страница 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Страница 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Страница 162: ...162 Configuring alerts and logs Configuring logs ...
Страница 208: ...208 Feature Cross Reference About email filtering and message handling options ...