Symantec 10521146 Administration Guide - Page 359

SMF Standard Message, SLIP Serial Line

Page 359 highlights

Glossary 359 SESA (Symantec Enterprise Security Architecture) The centralized, scalable management architecture that is used by Symantec's security products. session In communications, the time during which two computers maintain a connection and, usually, are engaged in transferring information. setting A collection of parameters (key/value pairs, data blobs, and so on). severity A level that is assigned to an incident. See also incident. shared POP3 mailbox A mailbox that stores messages for an entire domain and that allows organizations with part-time Internet connections to exchange mail. signature 1. A state or pattern of activity that indicates a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. 2. Logic in a product that detects a violation of policy, a vulnerable state, or an activity that may relate to an intrusion. This can also be referred to as a signature definition, an expression, a rule, a trigger, or signature logic. 3. Information about a signature including attributes and descriptive text. This is more precisely referred to as signature data. SLIP (Serial Line Internet Protocol) A TCP/IP protocol used for communication between two computers that have been previously configured for communication with each other. Smart Agents See Symantec Network Security Smart Agents. SMF (Standard Message A message file format established by Novell and used by many email applications. Format) SMON See interface, monitoring. SMTP (Simple Mail Transfer Protocol) The protocol that allows email messages to be exchanged between mail servers. Then, clients retrieve email, typically via the POP or IMAP protocol. SMTP alert A Simple Mail Transfer Protocol notification of a major system event, such as shutdown, startup, crash, or virus definition update error. snapshot A file in which information about the system's configuration and properties is stored. SNMP (Simple Network The protocol governing network management and the monitoring of network devices and Management Protocol) their functions. SNMP alert A Simple Network Management Protocol notification of a major system event, such as shutdown, startup, crash, virus definitions update, or virus definitions update error. social engineering An attack based on tricking or deceiving users or security administrators into revealing passwords or other information that compromises a target system's security. Social engineering attacks are typically carried out by attackers who telephone users or operators and pretend to be authorized users.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

359
Glossary
SESA (Symantec
Enterprise Security
Architecture)
The centralized, scalable management architecture that is used by Symantec’s security
products.
session
In communications, the time during which two computers maintain a connection and,
usually, are engaged in transferring information.
setting
A collection of parameters (key/value pairs, data blobs, and so on).
severity
A level that is assigned to an incident. See also
incident
.
shared POP3 mailbox
A mailbox that stores messages for an entire domain and that allows organizations with
part-time Internet connections to exchange mail.
signature
1. A state or pattern of activity that indicates a violation of policy, a vulnerable state, or an
activity that may relate to an intrusion. 2. Logic in a product that detects a violation of
policy, a vulnerable state, or an activity that may relate to an intrusion. This can also be
referred to as a signature definition, an expression, a rule, a trigger, or signature logic. 3.
Information about a signature including attributes and descriptive text. This is more
precisely referred to as signature data.
SLIP (Serial Line
Internet Protocol)
A TCP/IP protocol used for communication between two computers that have been
previously configured for communication with each other.
Smart Agent
s
See
Symantec Network Security Smart Agents
.
SMF (Standard Message
Format)
A message file format established by Novell and used by many email applications.
SMON
See
interface, monitoring
.
SMTP (Simple Mail
Transfer Protocol)
The protocol that allows email messages to be exchanged between mail servers. Then,
clients retrieve email, typically via the POP or IMAP protocol.
SMTP alert
A Simple Mail Transfer Protocol notification of a major system event, such as shutdown,
startup, crash, or virus definition update error.
snapshot
A file in which information about the system’s configuration and properties is stored.
SNMP (Simple Network
Management Protocol)
The protocol governing network management and the monitoring of network devices and
their functions.
SNMP alert
A Simple Network Management Protocol notification of a major system event, such as
shutdown, startup, crash, virus definitions update, or virus definitions update error.
social engineering
An attack based on tricking or deceiving users or security administrators into revealing
passwords or other information that compromises a target system’s security. Social
engineering attacks are typically carried out by attackers who telephone users or
operators and pretend to be authorized users.