Symantec 10744983 Administration Guide - Page 235

Reputation Service, Open Proxy Senders is a sender group in Symantec Mail

Page 235 highlights

Glossary 235 notification Notifier Open Proxy Senders packet parameter password phishing ping (Packet Internet Groper) 1. In Symantec Mail Security, a separate email that can be automatically sent to the sender, recipients, or other email addresses when a specified condition is met. For example, if you have a policy that strips .exe attachments from incoming messages, you may want to also notify the sender that the attachment has been stripped. 2. In Symantec Mail Security, a periodic email summary sent by Spam Quarantine to users, listing the newly quarantined spam messages, and including links for users to immediately release messages to their inbox or to log in to their personal quarantines. See also Notifier. A component of Spam Quarantine, which resides on the Control Center in Symantec Mail Security. Notifier sends periodic email messages to users, providing a digest of their spam. The Notifier message (notification) is customizable; it can contain a list of the subject lines and senders of all spam messages. A dynamic list of IP addresses of identity-masking relays, including proxy servers with open or insecure ports, provided by Symantec based on data from the Probe Network. Because open proxy servers allow spammers to conceal their identities and off-load the cost of emailing to other parties, spammers will continually misuse a vulnerable server until it is brought offline or secured. Part of the Sender Reputation Service, Open Proxy Senders is a sender group in Symantec Mail Security. You can specify actions to take on messages from each sender group. A unit of data that is formed when a protocol breaks down messages that are sent along the Internet or other networks. Messages are broken down into standard-sized packets to avoid overloading lines of transmission with large chunks of data. Each of these packets is separately numbered and includes the Internet address of the destination. Upon arrival at the recipient computer, the protocol recombines the packets into the original message. A value that is assigned to a variable. In communications, a parameter is a means of customizing program (software) and hardware operation. A unique string of characters that a user types as an identification code to restrict access to computers and sensitive files. The system compares the code against a stored list of authorized passwords and users. If the code is legitimate, the system allows access at the security level approved for the owner of the password. An attempt to illegally gather personal and financial information by sending a message that appears to be from a well known and trusted company. A phishing message typically includes at least one link to a fake Web site, designed to mimic the site of a legitimate business and entice the recipient to provide information that can be used for identity theft or online financial theft. A program that system administrators and hackers or crackers use to determine whether a specific computer is currently online and accessible. Pinging works by sending a packet to the specified IP address and waiting for a reply; if a reply is received, the computer is deemed to be online and accessible.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

notification
1. In Symantec Mail Security, a separate email that can be automatically sent to
the sender, recipients, or other email addresses when a specified condition is met.
For example, if you have a policy that strips .exe attachments from incoming
messages, you may want to also notify the sender that the attachment has been
stripped. 2. In Symantec Mail Security, a periodic email summary sent by Spam
Quarantine to users, listing the newly quarantined spam messages, and including
links for users to immediately release messages to their inbox or to log in to their
personal quarantines. See also Notifier.
Notifier
A component of Spam Quarantine, which resides on the Control Center in Symantec
Mail Security. Notifier sends periodic email messages to users, providing a digest
of their spam. The Notifier message (notification) is customizable; it can contain
a list of the subject lines and senders of all spam messages.
Open Proxy Senders
A dynamic list of IP addresses of identity-masking relays, including proxy servers
with open or insecure ports, provided by Symantec based on data from the Probe
Network. Because open proxy servers allow spammers to conceal their identities
and off-load the cost of emailing to other parties, spammers will continually
misuse a vulnerable server until it is brought offline or secured. Part of the Sender
Reputation Service, Open Proxy Senders is a sender group in Symantec Mail
Security. You can specify actions to take on messages from each sender group.
packet
A unit of data that is formed when a protocol breaks down messages that are sent
along the Internet or other networks. Messages are broken down into
standard-sized packets to avoid overloading lines of transmission with large
chunks of data. Each of these packets is separately numbered and includes the
Internet address of the destination. Upon arrival at the recipient computer, the
protocol recombines the packets into the original message.
parameter
A value that is assigned to a variable. In communications, a parameter is a means
of customizing program (software) and hardware operation.
password
A unique string of characters that a user types as an identification code to restrict
access to computers and sensitive files. The system compares the code against a
stored list of authorized passwords and users. If the code is legitimate, the system
allows access at the security level approved for the owner of the password.
phishing
An attempt to illegally gather personal and financial information by sending a
message that appears to be from a well known and trusted company. A phishing
message typically includes at least one link to a fake Web site, designed to mimic
the site of a legitimate business and entice the recipient to provide information
that can be used for identity theft or online financial theft.
ping (Packet Internet
Groper)
A program that system administrators and hackers or crackers use to determine
whether a specific computer is currently online and accessible. Pinging works by
sending a packet to the specified IP address and waiting for a reply; if a reply is
received, the computer is deemed to be online and accessible.
235
Glossary