Terminology
A
-
3
Mass-Mailing Attacks
Email-aware viruses have the ability to spread by email by automating the infected
computer's email client. Mass-mailing behavior describes a situation when an infec-
tion spreads rapidly between clients and servers in an email environment. Trend
Micro has designed the scan engine in InterScan Gateway Security Appliance to
detect behaviors that mass-mailing attacks usually demonstrate. The behaviors are
recorded in the virus pattern file that is updated using the Trend Labs ActiveUpdate
servers. The action set for mass-mailing behavior takes precedence over all other
actions, and the recommended action against mass-mailing attacks is that such email
be deleted.
Network Viruses
A virus spreading over a network is not, strictly speaking, a network virus. Only some
of the threats mentioned in this section, such as worms, qualify as network viruses.
Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP,
and email protocols such as SMTP and POP3 to replicate. InterScan Gateway Secu-
rity Appliance works with a network virus pattern file to identify and block network
viruses.
Pharming
Similar in nature to email phishing, pharming seeks to obtain personal or private (usu-
ally financial related) information through domain spoofing. Rather than being
spammed with malicious and mischievous email requests for you to visit spoofed
Web sites that appear legitimate, pharming "poisons" a DNS server by infusing it with
false information, resulting in your request's being redirected elsewhere. However,
your browser will indicate that you are at the correct Web site, which makes pharming
a bit more serious and more difficult to detect. Phishing attempts to defraud people
one at a time with an email, whereas pharming allows the scammers to target large
groups of people at one time through domain spoofing.
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...