Terminology
A
-
5
cannot be cleaned and Trend Micro recommends that they be deleted—a strategy
fully supported by InterScan Gateway Security Appliance.
Viruses
Computer viruses are programs that have the unique ability to replicate. They can
attach themselves to just about any type of executable file and are spread as files that
are copied and sent from individual to individual. In addition to replication, some
computer viruses share another commonality: a damage routine that delivers the virus
payload. While payloads may only display messages or images, they can also destroy
files, reformat your hard drive, or cause other damage. InterScan Gateway Security
Appliance can detect and delete or quarantine viruses during its real-time scans.
Worms
A computer worm is a self-contained program (or set of programs) that is able to
spread functional copies of itself or its segments to other computer systems. The
propagation usually takes place via network connections or email attachments. Unlike
viruses, worms do not need to attach themselves to host programs. Worms cannot be
cleaned, because they are self-contained programs. Therefore, the recommended
action is that they be deleted-fully supported by InterScan Gateway Security Appli-
ance.
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...