Glossary
Files and programs, other than viruses, that can negatively affect the performance of the computers on your network.
Endpoints that do not have Threat Management Agent installed. On the Threat Management screen, a red-colored icon under the Connectivity column indicates that the endpoint is agentless.
A red-colored icon also displays if the endpoint is disconnected.
Endpoints that have Threat Management Agent installed. The agents can connect to Threat Mitigator and can therefore run mitigation tasks. On the Threat Management screen, a green-colored icon under the Connectivity column indicates that the agent is connected.
An agent is considered "connected" if it was able to send a heartbeat message to Threat Mitigator at the specified time interval (15 minutes by default). Configure the time interval from the Agent Settings screen. For details, see Agent Settings.
Disconnected endpoints include:
Endpoints with agents reporting to Threat Mitigator. If these endpoints require mitigation, mitigation tasks will only run when connection to Threat Mitigator is established.
An agent is considered "disconnected" if it was unable to send a heartbeat message to Threat Mitigator at the specified time interval (15 minutes by default). Configure the time interval from the Agent Settings screen. For details, see Agent Settings.
Endpoints with agents that Threat Mitigator used to managed. The agents are now reporting to other Threat Mitigator servers.
Agentless Endpoints that have run On-demand Scan.
On the Threat Management screen, a red-colored icon under the Connectivity column indicates that the endpoint is disconnected.
A device, such as a computer or switch, must have an IP address to be connected to a network, but the address does not have to be static. A DHCP server, using the Dynamic Host Control Protocol, can assign and manage IP addresses dynamically every time a device connects to a network.
A Dynamic IP address is an IP address that is assigned by a DHCP server. The MAC address of a computer will remain the same, however, the computer may be assigned a new IP address by the DHCP server depending on availability.
FTP is a standard protocol used for transporting files from a server to a client over the Internet. Refer to Network Working Group RFC 959 for more information.
HTTP is a standard protocol used for transporting web pages (including graphics and multimedia content) from a server to a client over the Internet.
Hypertext Transfer Protocol using Secure Socket Layer (SSL).
Occasionally a gateway or destination host uses ICMP to communicate with a source host, for example, to report an error in datagram processing. ICMP uses the basic support of IP as if it were a higher level protocol, however, ICMP is actually an integral part of IP, and must be implemented by every IP module. ICMP messages are sent in several situations: for example, when a datagram cannot reach its destination, when the gateway does not have the buffering capacity to forward a datagram, and when the gateway can direct the host to send traffic on a shorter route. The Internet Protocol is not designed to be absolutely reliable. The purpose of these control messages is to provide feedback about problems in the communication environment, not to make IP reliable.
"The internet protocol provides for transmitting blocks of data called datagrams from sources to destinations, where sources and destinations are hosts identified by fixed length addresses." (RFC 791)
Malware refers to any program that executes and performs activities that are outside of the user’s consent. A virus is a form of malware. Other examples of malware include Trojans, Worms, Backdoors, Denial of Service attacker agents, Joke programs, as well as several other smaller categories of malicious code.
A utility that sends an Internet Control Message Protocol (ICMP) echo request to an IP address and waits for a response. The Ping utility can determine whether or not the machine with the specified IP address is online or not.
SSL is a scheme proposed by Netscape Communications Corporation to use RSA public-key cryptography to encrypt and authenticate content transferred on higher level protocols such as HTTP and FTP.
Telnet is a standard method of interfacing terminal devices over TCP by creating a "Network Virtual Terminal". Refer to Network Working Group RFC 854 for more information.
An inert file that acts like a real virus and is detectable by virus-scanning software. Use test viruses, such as the EICAR test script, to verify that your antivirus installation is scanning properly.
A connection-oriented, end-to-end reliable protocol designed to fit into a layered hierarchy of protocols which support multi-network applications. TCP relies on IP datagrams for address resolution. Refer to DARPA Internet Program RFC 793 for information.
TrendLabs is Trend Micro's global network of antivirus research and product support centers that provide 24 x 7 coverage to Trend Micro customers around the world.
A virus is a program that replicates. To do so, the virus needs to attach itself to other program files and execute whenever the host program executes.