Symantec 10490452 Administration Guide - Page 246

SSL Secure Sockets, SPF Sender Policy

Page 246 highlights

246 Glossary signature site SMTP (Simple Mail Transfer Protocol) spam spam attack Spam Quarantine spam scoring SSH (Secure Shell) SSL (Secure Sockets Layer) SPF (Sender Policy Framework) spyware 1. A state or pattern of activity that indicates a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. 2. Logic in a product that detects a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. This can also be referred to as a signature definition, an expression, a rule, a trigger, or signature logic. 3. Information about a signature including attributes and descriptive text. This is more precisely referred to as signature data. A collection of one or more computers hosting Symantec Mail Security for SMTP, in which exactly one computer hosts a Control Center, and one or more computers host Scanners. If the site consists of one computer, that computer will include the Control Center and a Scanner. The protocol that allows email messages to be exchanged between mail servers. Then, clients retrieve email, typically via the POP or IMAP protocol. 1. Unsolicited commercial bulk email. 2. An email message identified as spam by Symantec Mail Security for SMTP, using its filters. A series of spam emails from a specific domain. Symantec Mail Security for SMTP allows you to choose an action to perform on these messages; by default, messages received from violating senders are deferred. A database that stores email messages separately from the normal message flow, and allows access to those messages. In Symantec Mail Security for SMTP, Spam Quarantine is located on the Control Center computer, and provides users with Web access to their spam messages. Users can browse, search, and delete their spam messages and can also redeliver misidentified messages to their inbox. An administrator account provides access to all quarantined messages. Spam Quarantine can also be configured for administratoronly access. The process of grading messages when filtering email for spam. Symantec Mail Security for SMTP assigns a spam score to each message that expresses the likelihood that the message is actually spam. See also suspected spam. A program that allows a user to log on to another computer securely over a network by using encryption. SSH prevents third parties from intercepting or otherwise gaining access to information sent over the network. A protocol that allows mutual authentication between a client and server and the establishment of an authenticated and encrypted connection, thus ensuring the secure transmission of information over the Internet. See also TLS. A set of standard practices for authenticating email. If the sender's domain owner participates in SPF, the recipient MTA can check for forged return addresses. Symantec Mail Security for SMTP allows you to specify an action for messages that fail SPF authentication. Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and relay the information back to another computer.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

246
Glossary
signature
1. A state or pattern of activity that indicates a violation of policy, a vulnerable state, or an
activity that may relate to an intrusion. 2. Logic in a product that detects a violation of
policy, a vulnerable state, or an activity that may relate to an intrusion. This can also be
referred to as a signature definition, an expression, a rule, a trigger, or signature logic. 3.
Information about a signature including attributes and descriptive text. This is more
precisely referred to as signature data.
site
A collection of one or more computers hosting Symantec Mail Security for SMTP, in which
exactly one computer hosts a Control Center, and one or more computers host Scanners. If
the site consists of one computer, that computer will include the Control Center and a
Scanner.
SMTP (Simple Mail
Transfer Protocol)
The protocol that allows email messages to be exchanged between mail servers. Then,
clients retrieve email, typically via the POP or IMAP protocol.
spam
1. Unsolicited commercial bulk email.
2. An email message identified as spam by
Symantec Mail Security for SMTP, using its filters.
spam attack
A series of spam emails from a specific domain. Symantec Mail Security for SMTP allows
you to choose an action to perform on these messages; by default, messages received from
violating senders are deferred.
Spam Quarantine
A database that stores email messages separately from the normal message flow, and
allows access to those messages. In Symantec Mail Security for SMTP, Spam Quarantine is
located on the Control Center computer, and provides users with Web access to their spam
messages. Users can browse, search, and delete their spam messages and can also
redeliver misidentified messages to their inbox. An administrator account provides access
to all quarantined messages. Spam Quarantine can also be configured for administrator-
only access.
spam scoring
The process of grading messages when filtering email for spam. Symantec Mail Security
for SMTP assigns a spam score to each message that expresses the likelihood that the
message is actually spam. See also suspected spam.
SSH (Secure Shell)
A program that allows a user to log on to another computer securely over a network by
using encryption. SSH prevents third parties from intercepting or otherwise gaining
access to information sent over the network.
SSL (Secure Sockets
Layer)
A protocol that allows mutual authentication between a client and server and the
establishment of an authenticated and encrypted connection, thus ensuring the secure
transmission of information over the Internet. See also TLS.
SPF (Sender Policy
Framework)
A set of standard practices for authenticating email. If the sender’s domain owner
participates in SPF, the recipient MTA can check for forged return addresses. Symantec
Mail Security for SMTP allows you to specify an action for messages that fail SPF
authentication.
spyware
Stand-alone programs that can secretly monitor system activity and detect passwords and
other confidential information and relay the information back to another computer.