McAfee AVM85M User Guide - Page 61
Extra DAT files, Information Library
UPC - 731944564609
View all McAfee AVM85M manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 61 highlights
VirusScan® 8.6 for Mac User Guide Glossary Extra DAT files Supplemental virus definition file that is created in response to an outbreak of a new virus or a new variant of an existing virus. Firewall A program that acts as a filter between your computer and the network or Internet. It can scan all traffic arriving at your computer (incoming traffic) and all traffic sent by your computer (outgoing traffic). It scans traffic at the packet level, and either blocks it or allows it, based on rules that you set up. FTP File Transfer Protocol. It is a common way to move files between two Internet sites. Global Administrator A user account with read, write, and delete permissions, and rights to all operations. Operations that affect the entire installation are reserved for use only by global administrator user accounts. group In the console tree, a logical collection of entities assembled for ease of management. Groups can contain other groups or computers, and can be assigned IP address ranges or IP subnet masks to allow the sorting of computers by IP address. If you create a group by importing a Windows NT domain, you can automatically send the agent installation package to all imported computers in the domain. HTTP HyperText Transfer Protocol. It is a protocol for moving files across the Internet. It requires an HTTP client program on one end and an HTTP server program on the other. immediate event forwarding The act of immediately sending events of a specific severity or higher to the ePolicy Orchestrator server once a predefined number of events are available. This communication is done outside of other agent-server communication. inactive agent Any agent that has not communicated with the ePolicy Orchestrator server within a specified time period. inherit, inheritance The act of applying the settings defined for an item within a hierarchy from the item above it. Joke program A non-replicating program that may alarm or annoy users, but contains no malware and does not do any actual harm to files or data. Log/log file A record of the activities of a component of McAfee anti-virus software. Log files record the actions taken during an installation, or during scanning, or updating tasks. Lost&Found group A group used to temporarily store computers whose appropriate location in the Directory cannot be determined. Macro In some programs, like word-processing programs, a macro is a saved sequence of commands that can be stored and then recalled with a single command or keyboard stroke. McAfee Virus Information Library The Virus Information Library (http://vil.nai.com/vil/default.aspx) has detailed information about the origins of viruses, how they infect your computer, and how to remove them. The site also contains information on hoaxes. On-Access scanner The On-Access scanner continuously monitors all files in use to determine if a virus or other potentially unwanted malware is present. It takes place whenever a file is read from the disk, and/or written to the disk. Multiple directories and volumes can be scanned. 61