|
Terminology
|
Description
|
|---|---|
|
ActiveUpdate
|
A component update source managed by Trend Micro.
ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines,
program, and other Trend Micro component files
through the Internet.
|
|
Active primary appliance
|
Clustered appliance with which all management tasks are performed. Retains all configuration
settings and allocates submissions to secondary appliances for performance improvement.
|
|
Administrator
|
The person managing TippingPoint Advanced Threat Protection Analyzer
|
|
Clustering
|
A cluster consists of at least two TippingPoint Advanced Threat Protection Analyzer appliances configured in a way that provides some sort of benefit.
Multiple standalone TippingPoint Advanced Threat Protection Analyzer appliances can be deployed and configured to form a cluster that provides fault tolerance,
improved performance, or a combination thereof.
|
|
Custom port
|
A hardware port that connects TippingPoint Advanced Threat Protection Analyzer to
an isolated network dedicated to sandbox analysis
|
|
Dashboard
|
UI screen on which widgets are displayed
|
|
High availability cluster
|
In a high availability cluster, one appliance acts as the active primary appliance,
and one acts as the passive primary appliance. The passive primary appliance automatically
takes over as the new active primary appliance if the active primary appliance encounters
an error and is unable to recover.
|
|
Load-balancing cluster
|
In a load balancing cluster, one appliance acts as the active primary appliance, and
any additional appliances act as secondary appliances. The secondary appliances process
submissions allocated by the active primary appliance for performance improvement.
|
|
Management console
|
A web-based user interface for managing a
product.
|
|
Management port
|
A hardware port that connects to the management
network.
|
|
Passive primary appliance
|
Clustered appliance that is on standby until active primary appliance encounters an
error and is unable to recover. Provides high availability.
|
|
Role-based administration
|
Role-based administration streamlines how administrators configure user accounts and
control access to the management console.
|
|
Sandbox image
|
A ready-to-use software package (operating system with applications) that require
no configuration or installation. Virtual Analyzer supports only image files in the
Open Virtual Appliance (OVA) format.
|
|
Sandbox instance
|
A single virtual machine based on a sandbox image.
|
|
Secondary appliance
|
Clustered appliance that processes submissions allocated by the active primary appliance
for performance improvement.
|
|
Standalone appliance
|
Appliance that is not part of any cluster. Clustered appliances can revert to being
standalone appliances by detaching the appliance from its cluster.
|
|
Threat Connect
|
A Trend Micro service that
correlates suspicious objects detected in your environment and threat data from
the Trend Micro Smart Protection Network. By
providing on-demand access to Trend Micro
intelligence databases, Threat Connect enables you to identify and investigate
potential threats to your environment.
|
|
Virtual Analyzer
|
A secure virtual environment used to manage and analyze
samples submitted by Trend Micro products. Sandbox
images allow observation of file and network behavior in a natural setting.
|
|
Widget
|
A customizable screen to view targeted, selected data sets.
|
|
YARA
|
YARA rules are malware detection patterns that are fully customizable to identify
targeted attacks and security threats specific to your environment.
|