Symantec 10490452 Administration Guide - Page 237

Glossary

Page 237 highlights

Glossary administrator 1. A person who oversees the operation of a network. 2. A person who is responsible for installing programs on a network and configuring them for distribution to workstations. The administrator may also update security settings on workstations. adware Programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes. Agent A component of Symantec Mail Security for SMTP that facilitates communicating configuration information between the Control Center and each Scanner. Allowed Senders List In Symantec Mail Security for SMTP, a list of senders whose messages are omitted from most types of filtering (but not from virus filtering). annotation A phrase or paragraph placed at the beginning or end of the body of an email message. Symantec Mail Security for SMTP allows you to specify up to 1000 distinct annotations to use in specific categories of messages for specific groups of recipients. You can use this feature to automate email disclaimers. antivirus A subcategory of a security policy that pertains to computer viruses. API (application The specific methodology by which a programmer writing an application program can programming interface) make requests of the operating system or another application. archive An action that can be performed on email messages by Symantec Mail Security for SMTP, which consists of forwarding the messages to a specific SMTP address. attachment list A list of attachment types for use in filtering. You can create attachment lists based on file naming (for example, based on the file extension), or on the true type of each file, or you can use any of five pre-filled lists. Audit ID A unique identifier generated by Symantec Mail Security for SMTP and included as a message header in all processed messages. authentication The process of determining the identity of a user attempting to access a network. Authentication occurs through challenge/response, time-based code sequences, or other techniques. Authentication typically involves the use of a password, certificate, PIN, or other information that can be used to validate identity over a computer network.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

Glossary
administrator
1. A person who oversees the operation of a network. 2. A person who is responsible for
installing programs on a network and configuring them for distribution to workstations.
The administrator may also update security settings on workstations.
adware
Programs that secretly gather personal information through the Internet and relay it back
to another computer. This is done by tracking browsing habits, generally for advertising
purposes.
Agent
A component of Symantec Mail Security for SMTP that facilitates communicating
configuration information between the Control Center and each Scanner.
Allowed Senders List
In Symantec Mail Security for SMTP, a list of senders whose messages are omitted from
most types of filtering (but not from virus filtering).
annotation
A phrase or paragraph placed at the beginning or end of the body of an email message.
Symantec Mail Security for SMTP allows you to specify up to 1000 distinct annotations to
use in specific categories of messages for specific groups of recipients. You can use this
feature to automate email disclaimers.
antivirus
A subcategory of a security policy that pertains to computer viruses.
API (application
programming interface)
The specific methodology by which a programmer writing an application program can
make requests of the operating system or another application.
archive
An action that can be performed on email messages by Symantec Mail Security for SMTP,
which consists of forwarding the messages to a specific SMTP address.
attachment list
A list of attachment types for use in filtering. You can create attachment lists based on file
naming (for example, based on the file extension), or on the true type of each file, or you
can use any of five pre-filled lists.
Audit ID
A unique identifier generated by Symantec Mail Security for SMTP and included as a
message header in all processed messages.
authentication
The process of determining the identity of a user attempting to access a network.
Authentication occurs through challenge/response, time-based code sequences, or other
techniques. Authentication typically involves the use of a password, certificate, PIN, or
other information that can be used to validate identity over a computer network.