Symantec 10744983 Administration Guide - Page 236

computers is made possible by the suite of protocols known as TCP/IP. Protocols, can be stacked

Page 236 highlights

236 Glossary policy A set of message filtering instructions that Symantec Mail Security implements on a message or set of messages. See also filter policy, Group Policy. policy resources In Symantec Mail Security, sets of data that enable customization of email filtering and the actions taken on filtered email. You can employ policy resources when you create filter policies. Policy resources include annotations, archive, attachment lists, dictionaries, and notifications. See also filter policy, annotation, archive, attachment list, dictionary, and notification (definition 1). POP3 (Post Office Protocol 3) An email protocol used to retrieve email from a remote server over an Internet connection. port 1. A hardware location used for passing data into and out of a computing device. Personal computers have various types of ports, including internal ports for connecting disk drives, monitors, and keyboards, and external ports, for connecting modems, printers, mouse devices, and other peripheral devices. 2. In TCP/IP and UDP networks, the name given to an endpoint of a logical connection. Port numbers identify types of ports. For example, both TCP and UDP use port 80 for transporting HTTP data. probe accounts Email addresses assigned to Symantec by our Probe Network Partners, and used by Symantec Security Response to detect spam. Probe Network A network of email accounts provided by Symantec's Probe Network Partners. Used by Symantec Security Response for the detection of spam, the Probe Network has a statistical reach of over 300 million email addresses, and includes over 2 million probe accounts. Probe Network Partners ISPs or corporations that participate in the Probe Network. protocol A set of rules for encoding and decoding data so that messages can be exchanged between computers and so that each computer can fully understand the meaning of the messages. On the Internet, the exchange of information between different computers is made possible by the suite of protocols known as TCP/IP. Protocols can be stacked, meaning that one transmission can use two or more protocols. For example, an FTP session uses the FTP protocol to transfer files, the TCP protocol to manage connections, and the IP protocol to deliver data. proxy An application (or agent) that runs on the security gateway and acts as both a server and client, accepting connections from a client and making requests on behalf of the client to the destination server. There are many types of proxies, each used for specific purposes. See also gateway, proxy server. proxy server A server that acts on behalf of one or more other servers, usually for screening, firewall, or caching purposes, or a combination of these purposes. Also called a gateway. Typically, a proxy server is used within a company or enterprise to gather all Internet requests, forward them out to Internet servers, and then receive the responses and in turn forward them to the original requester within the company.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

policy
A set of message filtering instructions that Symantec Mail Security implements
on a message or set of messages. See also filter policy, Group Policy.
policy resources
In Symantec Mail Security, sets of data that enable customization of email filtering
and the actions taken on filtered email. You can employ policy resources when
you create filter policies. Policy resources include annotations, archive, attachment
lists, dictionaries, and notifications. See also filter policy, annotation, archive,
attachment list, dictionary, and notification (definition 1).
POP3 (Post Office
Protocol 3)
An email protocol used to retrieve email from a remote server over an Internet
connection.
port
1. A hardware location used for passing data into and out of a computing device.
Personal computers have various types of ports, including internal ports for
connecting disk drives, monitors, and keyboards, and external ports, for connecting
modems, printers, mouse devices, and other peripheral devices. 2. In TCP/IP and
UDP networks, the name given to an endpoint of a logical connection. Port numbers
identify types of ports. For example, both TCP and UDP use port 80 for transporting
HTTP data.
probe accounts
Email addresses assigned to Symantec by our Probe Network Partners, and used
by Symantec Security Response to detect spam.
Probe Network
A network of email accounts provided by Symantec's Probe Network Partners.
Used by Symantec Security Response for the detection of spam, the Probe Network
has a statistical reach of over 300 million email addresses, and includes over 2
million probe accounts.
Probe Network Partners
ISPs or corporations that participate in the Probe Network.
protocol
A set of rules for encoding and decoding data so that messages can be exchanged
between computers and so that each computer can fully understand the meaning
of the messages. On the Internet, the exchange of information between different
computers is made possible by the suite of protocols known as TCP/IP. Protocols
can be stacked, meaning that one transmission can use two or more protocols.
For example, an FTP session uses the FTP protocol to transfer files, the TCP
protocol to manage connections, and the IP protocol to deliver data.
proxy
An application (or agent) that runs on the security gateway and acts as both a
server and client, accepting connections from a client and making requests on
behalf of the client to the destination server. There are many types of proxies,
each used for specific purposes. See also gateway, proxy server.
proxy server
A server that acts on behalf of one or more other servers, usually for screening,
firewall, or caching purposes, or a combination of these purposes. Also called a
gateway. Typically, a proxy server is used within a company or enterprise to gather
all Internet requests, forward them out to Internet servers, and then receive the
responses and in turn forward them to the original requester within the company.
Glossary
236