Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
A
-
4
Phishing
A phish is an email message that falsely claims to be from an established or legitimate
enterprise. The message encourages recipients to click on a link that will redirect their
browsers to a fraudulent Web site. Once there, the user is asked to update personal
information such as passwords, social security numbers, and credit card numbers,
which will be used for identity theft. InterScan Gateway Security Appliance provides
tools for handling known phishing sites and for adding others to a list of offenders.
Spam
Spamming is the misuse of electronic communications media to send unsolicited bulk
messages. The most common form of spam is delivered in email as a form of com-
mercial advertising. In practice, however, people use spam for many purposes other
than commercial ones and in many media other than email, including instant messag-
ing, Usenet newsgroups, Web search engines, Web logs, and mobile phone messag-
ing. InterScan Gateway Security Appliance protects you against unwanted spam in
email and on the Web using a database of known spammers and content filters.
Spyware
Spyware refers to that broad category of malicious software designed to intercept or
take partial control of a computer's operation without the informed consent of its
owner or user. While the term suggests software that secretly monitors the user, it
more broadly refers to software that subverts the computer's operation for the benefit
of a third party, usually for commercial gain. Typical uses of spyware include the
delivery of unsolicited pop-up advertisements, the theft of personal information
(including financial information such as credit card numbers), the monitoring of
Web-browsing activity for marketing purposes, and the routing of HTTP requests to
advertising sites.
Trojans
A Trojan is a malicious program that masquerades as a harmless application. Unlike
viruses, Trojans do not replicate, but they can be just as destructive. An application
that claims to rid your computer of viruses when it actually introduces viruses onto
your computer is an example of a Trojan. Trojans do not infect files; therefore, they
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...