
827
Glossary
event family
A group of associated events. Different integrating products may log events that belong to the same
event family. For example, all products log events from the System Event Family, such as Application
Start and Application Update. Products with antivirus components log events from the AntiVirus
Event Family, such as Virus Found and Virus Repaired.
event forwarding
The process by which an Administrator forwards events to another SESA Manager. Event forwarding
includes the ability to filter events selectively before forwarding.
event logging
1. The process by which SESA Agents collect product events and deliver them to the SESA Manager
for insertion into the SESA DataStore.
2. The processes by which individual security products such as the security gateway collect product
events.
event management
The centralized collection, classification, and normalization of events to enable alerting and
reporting across multivendor managed security products.
event normalization
The process by which events from disparate sources are mapped to a consistent framework.
event priority
A number between one and five (inclusive) that is assigned to an event. The number is assigned based
on signature attributes, system attributes, organization attributes, and vulnerability attributes.
event type
A predefined event category that is used for sorting reports and configuring events and alerts.
exploit
1. A method used to compromise the integrity, availability, or confidentiality of information or
services.
2. A program that automates a method to compromise the integrity, availability, or confidentiality of
information or services.
exposure
A vulnerability that is inherent in a legitimate service or system.
In Vulnerability Management, the actualization of risk. The event or result of a threat that exploits a
vulnerability of the system.
external threat
A threat that originates outside of an organization.
extranet
The extension of the LAN via remote or Internet access to partners outside of your organization, such
as frequent suppliers and purchasers. Such relationships should be over authenticated links to
authorized segments of the LAN and are frequently encrypted for privacy.
factory reset
In the context of Symantec Gateway Security appliances, an action that returns the appliance to its
default state and removes any software patches and hotfixes that have been applied. This is the state
the appliance was in when it was first shipped. All network information and configuration data that
you have entered is lost. Only licensing information, if you entered any, is retained.
failover
An automatic or manual backup operation that switches communication from one SESA component
to a standby SESA component (a replica SESA Directory, replica SESA DataStore, or secondary SESA
Manager component) if the primary component fails or is shut down for servicing. Failover support
in SESA provides fault tolerance of mission-critical SESA components that rely on constant
accessibility. See also failback.
false positive
A reported activity or state that does not require response because it was reported incorrectly or does
not pose a threat.
fault tolerance
A design method that ensures continued systems operation in the event of individual failures by
providing redundant system elements.
file transfer
The process of using communications to send a file from one computer to another. In
communications, a protocol must be agreed upon by sending and receiving computers before a file
transfer can occur.
filter
A program or section of code that is designed to examine each input or output request for certain
qualifying criteria and then process or forward it accordingly.
filter group
A sequence of one or more filters.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...