HP T5700 HP Sygate Security Agent User Guide - Page 72

Access Protocol LDAP., spoofing, Stealth Mode Browsing, subnet, subnet mask, sweeping

Page 72 highlights

HP Sygate Security Agent User Guide spoofing: A technique used by an intruder to gain unauthorized network access to a computer system or network by forging known network credentials. IP spoofing is a common method for intruders to gain unauthorized network access to a computer systems or network. Stealth Mode Browsing: An option that detects all HTTP traffic on port 80 from a web browser and removes information such as the browser name and version, the operating system, and the reference web page. It stops web sites from knowing which operating system and browser you are using. Stealth Mode Browsing may cause some web sites not to function properly because it removes the browser signature, called the HTTP_USER_AGENT, from the HTTP request header and replaces it with a generic signature. subnet: Portions of a TCP/IP network used to increase the bandwidth on the network by subdividing the network into portions or segments. All IP addresses within a subnet use the same first three sets of numbers (such as 192.168.1 in 192.168.1.180 and 192.168.1.170) indicating they are on the same network. A subnet is See also subnet mask. subnet mask: A value that allows a network to be subdivided and provides for more complex address assignments. The subnet mask format is nnn.nnn.nnn.nnn, such as 255.255.255.0. sweeping: The process that Sygate uses to eliminate old log files on the database. See also logs. Sygate Security Agent: Software component that enforces rule-based security on devices, whether remote or behind a corporate firewall, using security policies defined using the Policy Editor. Also referred to as the Agent in Sygate documentation. The Agent must be installed on every device before it can connect to the enterprise network. The Agent can detect, identify, and block known Trojans and Denial of Service attacks, and also protects against new or unknown attacks by blocking applications and traffic that violates a defined set of security policies. Port scans are also detected and logged to alert users and system administrators of potential attacks, while maintaining system security. synchronization: Refers to automatically keeping directory servers up-to-date with the user database including synchronizing between LDAP, Active Directory, and NT Domain. System administrators can specify how often to synchronize the user database with the directory server. See also Active Directory, Lightweight Directory Access Protocol (LDAP). 62

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

HP Sygate Security Agent User Guide
spoofing:
A technique used by an intruder to gain unauthorized network access to a
computer system or network by forging known network credentials. IP spoofing is a
common method for intruders to gain unauthorized network access to a computer
systems or network.
Stealth Mode Browsing:
An option that detects all HTTP traffic on port 80 from a web
browser and removes information such as the browser name and version, the
operating system, and the reference web page. It stops web sites from knowing
which operating system and browser you are using. Stealth Mode Browsing may
cause some web sites not to function properly because it removes the browser
signature, called the HTTP_USER_AGENT, from the HTTP request header and
replaces it with a generic signature.
subnet:
Portions of a TCP/IP network used to increase the bandwidth on the network by
subdividing the network into portions or segments. All IP addresses within a subnet
use the same first three sets of numbers (such as 192.168.1 in 192.168.1.180 and
192.168.1.170) indicating they are on the same network. A subnet is See also subnet
mask.
subnet mask:
A value that allows a network to be subdivided and provides for more
complex address assignments. The subnet mask format is nnn.nnn.nnn.nnn, such as
255.255.255.0.
sweeping:
The process that Sygate uses to eliminate old log files on the database. See also
logs.
Sygate Security Agent:
Software component that enforces rule-based security on devices,
whether remote or behind a corporate firewall, using security policies defined using
the Policy Editor. Also referred to as the Agent in Sygate documentation. The Agent
must be installed on every device before it can connect to the enterprise network.
The Agent can detect, identify, and block known Trojans and Denial of Service
attacks, and also protects against new or unknown attacks by blocking applications
and traffic that violates a defined set of security policies. Port scans are also detected
and logged to alert users and system administrators of potential attacks, while
maintaining system security.
synchronization:
Refers to automatically keeping directory servers up-to-date with the user
database including synchronizing between LDAP, Active Directory, and NT
Domain. System administrators can specify how often to synchronize the user
database with the directory server. See also Active Directory, Lightweight Directory
Access Protocol (LDAP).
62