Symantec 10744983 Administration Guide - Page 229

Glossary

Page 229 highlights

Glossary administrator 1. A person who oversees the operation of a network. 2. A person who is responsible for installing programs on a network and configuring them for distribution to workstations. The administrator may also update security settings on workstations. adware Programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes. Agent A component that facilitates communicating configuration information between the Control Center and each Scanner. Allowed Senders List A list of senders in the Control Center whose messages are omitted from most types of filtering (but not from virus filtering). annotation A phrase or paragraph placed at the beginning or end of the body of an email message. Up to 1000 distinct annotations are allowed for use in specific categories of messages for specific groups of recipients. You can use this feature to automate email disclaimers. antivirus A subcategory of a security policy that pertains to computer viruses. API (application The specific methodology by which a programmer writing an application program programming interface) can make requests of the operating system or another application. archive An action that can be performed on email messages which consists of forwarding the messages to a specific SMTP address. attachment list A list of attachment types for use in filtering. You can create attachment lists based on file naming (for example, based on the file extension), or on the true type of each file, or you can use any of five pre-filled lists. Audit ID A unique identifier included as a message header in all processed messages. authentication The process of determining the identity of a user attempting to access a network. Authentication occurs through challenge/response, time-based code sequences, or other techniques. Authentication typically involves the use of a password, certificate, PIN, or other information that can be used to validate identity over a computer network. bandwidth The amount of data transmitted or received per unit time. In digital systems, bandwidth is proportional to the data speed in bits per second (bps). Thus, a modem that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800 bps.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

administrator
1. A person who oversees the operation of a network. 2. A person who is responsible
for installing programs on a network and configuring them for distribution to
workstations. The administrator may also update security settings on workstations.
adware
Programs that secretly gather personal information through the Internet and
relay it back to another computer. This is done by tracking browsing habits,
generally for advertising purposes.
Agent
A component that facilitates communicating configuration information between
the Control Center and each Scanner.
Allowed Senders List
A list of senders in the Control Center whose messages are omitted from most
types of filtering (but not from virus filtering).
annotation
A phrase or paragraph placed at the beginning or end of the body of an email
message. Up to 1000 distinct annotations are allowed for use in specific categories
of messages for specific groups of recipients. You can use this feature to automate
email disclaimers.
antivirus
A subcategory of a security policy that pertains to computer viruses.
API (application
programming interface)
The specific methodology by which a programmer writing an application program
can make requests of the operating system or another application.
archive
An action that can be performed on email messages which consists of forwarding
the messages to a specific SMTP address.
attachment list
A list of attachment types for use in filtering. You can create attachment lists
based on file naming (for example, based on the file extension), or on the true type
of each file, or you can use any of five pre-filled lists.
Audit ID
A unique identifier included as a message header in all processed messages.
authentication
The process of determining the identity of a user attempting to access a network.
Authentication occurs through challenge/response, time-based code sequences,
or other techniques. Authentication typically involves the use of a password,
certificate, PIN, or other information that can be used to validate identity over a
computer network.
bandwidth
The amount of data transmitted or received per unit time. In digital systems,
bandwidth is proportional to the data speed in bits per second (bps). Thus, a modem
that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800
bps.
Glossary