Symantec 10490452 Administration Guide - Page 248

Symantec Security, Response, Symantec Spam Folder, Agent for Domino, Agent for Exchange, synchronize

Page 248 highlights

248 Glossary Symantec Security Response Symantec Security Response is a team of dedicated intrusion experts, security engineers, virus hunters, threat analysts, and global technical support teams that work in tandem to provide extensive coverage for enterprise businesses and consumers. Symantec Security Response also leverages sophisticated threat and early warning systems to provide customers with comprehensive, global, 24x7 Internet security expertise to proactively guard against today's blended Internet threats and complex security risks. Security Response covers the full range of security issues to provide complete protection for customers including the following areas: ■ Viruses, worms, Trojan horses, bots and other malicious code ■ Hackers ■ Vulnerabilities ■ Spyware, adware, and dialer programs ■ Spam ■ Phishing and other forms of Internet fraud Security Response keeps Symantec and its customers ahead of attackers by forecasting the next generation of threats using its worldwide intelligence network and unmatched insight. The team delivers the bi-annual Internet Security Threat Report that identifies critical trends & statistics for the entire security community, placing Symantec at the forefront of the rapidly shifting landscape. With the steadily increasing sophistication of today's threats, a holistic approach to defending your digital assets is the key to repelling attackers. With a unified team covering the full range of security issues, Symantec Security Response helps provide its customers with fully integrated protection as it combines the collective expertise of hundreds of security specialists to bring updates and security intelligence to the full range of Symantec's products and services. Symantec has research and response centers located around the world. Symantec Spam Folder Agent for Domino An application designed to work with Lotus Domino. Installed separately, the Symantec Spam Folder Agent for Domino creates a subfolder and a server-side filter in each user's mailbox. This filter gets applied to messages that a Scanner identifies as spam, routing spam into each user's spam folder, relieving end users and administrators of the burden of using their mail clients to create filters. The Symantec Spam Folder Agent for Domino also allows users to submit missed spam and false positives to Symantec. Symantec Spam Folder Agent for Exchange An application designed to work on Microsoft Exchange Servers. Installed separately, the Symantec Spam Folder Agent for Exchange creates a subfolder and a server-side filter in each user's mailbox. The filter gets applied to messages that a Scanner identifies as spam, routing spam into each user's spam folder, relieving end users and administrators of the burden of using their mail clients to create filters. synchronize To copy files between two folders on host and remote computers to make the folders identical to one another. Copying occurs in both directions. If there are two files with the same name, the file with the most current date and time is copied. Files are never deleted during the synchronization process.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

248
Glossary
Symantec Security
Response
Symantec Security Response is a team of dedicated intrusion experts, security engineers,
virus hunters, threat analysts, and global technical support teams that work in tandem to
provide extensive coverage for enterprise businesses and consumers. Symantec Security
Response also leverages sophisticated threat and early warning systems to provide
customers with comprehensive, global, 24x7 Internet security expertise to proactively
guard against today’s blended Internet threats and complex security risks.
Security Response covers the full range of security issues to provide complete protection
for customers including the following areas:
Viruses, worms, Trojan horses, bots and other malicious code
Hackers
Vulnerabilities
Spyware, adware, and dialer programs
Spam
Phishing and other forms of Internet fraud
Security Response keeps Symantec and its customers ahead of attackers by forecasting the
next generation of threats using its worldwide intelligence network and unmatched
insight. The team delivers the bi-annual Internet Security Threat Report that identifies
critical trends & statistics for the entire security community, placing Symantec at the
forefront of the rapidly shifting landscape.
With the steadily increasing sophistication of today’s threats, a holistic approach to
defending your digital assets is the key to repelling attackers. With a unified team
covering the full range of security issues, Symantec Security Response helps provide its
customers with fully integrated protection as it combines the collective expertise of
hundreds of security specialists to bring updates and security intelligence to the full range
of Symantec’s products and services. Symantec has research and response centers located
around the world.
Symantec Spam Folder
Agent for Domino
An application designed to work with Lotus Domino. Installed separately, the Symantec
Spam Folder Agent for Domino creates a subfolder and a server-side filter in each user’s
mailbox. This filter gets applied to messages that a Scanner identifies as spam, routing
spam into each user’s spam folder, relieving end users and administrators of the burden of
using their mail clients to create filters. The Symantec Spam Folder Agent for Domino also
allows users to submit missed spam and false positives to Symantec.
Symantec Spam Folder
Agent for Exchange
An application designed to work on Microsoft Exchange Servers. Installed separately, the
Symantec Spam Folder Agent for Exchange creates a subfolder and a server-side filter in
each user’s mailbox. The filter gets applied to messages that a Scanner identifies as spam,
routing spam into each user’s spam folder, relieving end users and administrators of the
burden of using their mail clients to create filters.
synchronize
To copy files between two folders on host and remote computers to make the folders
identical to one another. Copying occurs in both directions. If there are two files with the
same name, the file with the most current date and time is copied. Files are never deleted
during the synchronization process.