Term
|
Definition
|
Active Directory
|
A hierarchical directory service that enables centralized, secure management of
an entire network which is a central component of the Microsoft Windows
platform.
|
ActiveUpdate
|
ActiveUpdate is a function common to many Trend Micro products. Connected to the
Trend Micro update website, ActiveUpdate provides up-to-date downloads of pattern
files, scan engines, programs, and other Trend Micro component files through the
Internet.
|
Base Distinguished Name (BDN)
|
Specifies the necessary domain components of the LDAP server.
|
Bot
|
A program used on the Internet that performs a repetitive function such as
searching for information.
|
BZIP Files
|
A basic zipper format used as a compressor for single files and not a full
archiver.
|
Compressed File
|
A single file containing one or more separate files plus information for
extraction by a suitable program, such as WinZip.
|
Cookie
|
A mechanism for storing information about an Internet user, such as name,
preferences, and interests, which is stored in the web browser for later use. The
next time you access a website for which your browser has a cookie, the browser
sends the cookie to the web server, which the web server can then use to present
you with customized web pages. For example, you might enter a website that
welcomes you by name.
|
Crimeware
|
Designed (through social engineering or technical stealth) to perpetrate identity
theft in order to access a computer user's online accounts at financial services
companies and online retailers for the purpose of taking funds from those accounts
or completing unauthorized transactions that enrich the thief controlling the
crimeware. Crimeware also often has the intent to export confidential or sensitive
information from a network for financial exploitation.
|
Customer Licensing Portal
|
The Trend Micro Customer Licensing Portal™ helps you
manage your accounts, customer information, and subscriptions, including those
that you manage. From the Customer Licensing Portal , you can directly access the
web consoles of Trend Micro solutions that you manage.
|
Denial of Service Attack
|
A Denial of Service (DoS) attack refers to an attack on a computer or network
that causes a loss of "service," namely a network connection. Typically, DoS
attacks negatively affect network bandwidth or overload system resources such as
the computer's memory.
|
DHCP
|
Dynamic Host Control Protocol (DHCP) is a protocol for assigning dynamic IP
addresses to devices in a network. With dynamic addressing, a device can have a
different IP address every time it connects to the network. In some systems, the
device's IP address can even change while it is still connected. DHCP also
supports a mix of static and dynamic IP addresses.
|
DNS
|
Domain Name System (DNS) is a general-purpose data query service chiefly used in
the Internet for translating host names into IP addresses.
When a DNS client requests host name and address data from a DNS server, the
process is called resolution. Basic DNS configuration results in a server that
performs default resolution. For example, a remote server queries another server
for data in a machine in the current zone. Client software in the remote server
queries the resolver, which answers the request from its database files.
|
Domain Name
|
The full name of a system, consisting of its local host name and its domain name,
for example, tellsitall.com. A domain name should be sufficient to determine a
unique Internet address for any host on the Internet. This process, called "name
resolution," uses the Domain Name System (DNS).
|
Dynamic IP Address
|
A Dynamic IP address is an IP address assigned by a DHCP server. The MAC address
of a computer will remain the same, however, the DHCP server may assign a new IP
address to the computer depending on availability.
|
ESMTP
|
Enhanced Simple Mail Transport Protocol (ESMTP) includes security, authentication
and other devices to save bandwidth and protect servers.
|
End-user License Agreement
|
An End-user License Agreement or EULA is a legal contract between a software
publisher and the software user. It typically outlines restrictions on the side of
the user, who can refuse to enter into the agreement by not clicking "I accept"
during installation. Clicking "I do not accept" will, of course, end the
installation of the software product.
Many users inadvertently agree to the installation of spyware and other types of
grayware into their computers when they click "I accept" on EULA prompts displayed
during the installation of certain free software.
|
False Positive
|
A false positive occurs when a file is incorrectly detected by security software
as infected.
|
FTP
|
File Transfer Protocol (FTP) is a standard protocol used for transporting files
from a server to a client over the Internet. Refer to Network Working Group RFC
959 for more information.
|
Gateway
|
The interface between an information source and a web server. Some companies have
an NAT or proxy server at the corporate network edge. All the web traffic of
internal users goes through that network gateway and from the web server. The
connection comes from the gateway.
|
Grayware
|
A category of software that might be legitimate, unwanted, or malicious. Unlike
threats such as viruses, worms, and Trojans, grayware does not infect, replicate,
or destroy data; however, it might violate your privacy. Examples of grayware
include spyware, adware, and remote access tools.
|
GZIP File
|
Named for a GNU Project compression file that is used for single files and not a
full archiver.
|
TMWS Database
|
The TMWS Database
resides on the TMWS
server that stores user information. It is a component of the TMWS service.
|
HTTP
|
Hypertext Transfer Protocol (HTTP) is a standard protocol used for transporting
web pages (including graphics and multimedia content) from a server to a client
over the Internet.
|
HTTPS
|
Hypertext Transfer Protocol using Secure Socket Layer (SSL). HTTPS is a variant
of HTTP used for handling secure transactions.
|
ICMP
|
Occasionally a gateway or destination host uses Internet Control Message Protocol
(ICMP) to communicate with a source host, for example, to report an error in
datagram processing. ICMP uses the basic support of IP as if it were a higher
level protocol, however, ICMP is actually an integral part of IP, and implemented
by every IP module. ICMP messages are sent in several situations: for example,
when a datagram cannot reach its destination, when the gateway does not have the
buffering capacity to forward a datagram, and when the gateway can direct the host
to send traffic on a shorter route. The Internet Protocol is not designed to be
absolutely reliable. The purpose of these control messages is to provide feedback
about problems in the communication environment, not to make IP reliable.
|
Identity Provider
|
An IdP (Identity Provider) is a Service Provider for storing identity profiles
and offering incentives to other SPs with the aim of federating user identities.
Identity Providers can also provide services beyond those related to the storage
of identity profiles.
|
IntelliScan
|
IntelliScan is a method of identifying files to scan. For executable files (for
example, .exe), the true file type is determined based on the file content. For
non-executable files (for example, .txt), the true file type is determined based
on the file header.
Using IntelliScan provides the following benefits:
|
IntelliTrap
|
Virus writers often attempt to circumvent virus filtering by using real-time
compression algorithms. IntelliTrap helps reduce the risk of such viruses entering
the network by blocking real-time compressed executable files and pairing them
with other malware characteristics. Because IntelliTrap identifies such files as
security risks and may incorrectly block safe files, consider quarantining (not
deleting or cleaning) files when you enable IntelliTrap. If users regularly
exchange real-time compressed executable files, disable IntelliTrap. IntelliTrap
uses the following components: Virus Scan Engine, IntelliTrap Pattern, and
IntelliTrap Exception Pattern.
|
IP
|
The internet protocol (IP) provides for transmitting blocks of data called
datagrams from sources to destinations, where sources and destinations are hosts
identified by fixed length addresses. (RFC 791)
|
Java File
|
Java is a general-purpose programming language developed by Sun Micro Systems. A
Java file contains Java code. Java supports programming for the Internet in the
form of platform-independent Java "applets." An applet is a program written in
Java programming language that can be included in an HTML page. When you use a
Java-technology enabled browser to view a page that contains an applet, the applet
transfers its code to your computer and the browser's Java Virtual Machine
executes the applet.
|
LDAP
|
Lightweight Directory Access Protocol (LDAP) is an application protocol for
querying and modifying directory services running over TCP/IP. LDAP uses TCP/IP to
provide access to directories that support an X.500 model and that does not incur
the resource requirements of the more complex X.500 Directory Access Protocol
(DAP). For example, LDAP can be used to locate people, organizations, and other
resources in an Internet or intranet directory.
|
Listening Port
|
A listening port is utilized for client connection requests for data exchange.
|
Malware
|
Software that is designed to disrupt or gain unauthorized access to a system,
gather information that compromises a person's privacy or assets, or other
behavior that is harmful to the user.
|
Mixed Threat Attack
|
Mixed threat attacks take advantage of multiple entry points and vulnerabilities
in enterprise networks, such as the "Nimda" or "Code Red" threats.
|
Monitor
|
A charting widget that you can add to the "Dashboard" page in order to track
malware or a particular activity protected by TMWS.
|
NAT
|
Network Address Translation (NAT) is a standard for translating secure IP
addresses to temporary, external, registered IP address from the address pool.
This allows trusted networks with privately assigned IP addresses to have access
to the Internet. This also means that you do not have to get a registered IP
address for every machine in the network.
|
NetBIOS
|
Network Basic Input Output System (NetBIOS) is an application program interface
(API) that adds functionality such as network capabilities to disk operating
system (DOS) basic input/output system (BIOS).
|
Phish Attack
|
Phish, or phishing, is a rapidly growing form of fraud that seeks to fool
web users into divulging private information by mimicking a legitimate
website.
In a typical scenario, unsuspecting users get an urgent sounding
(and authentic looking) email telling them there is a problem with their account
that they must immediately fix to avoid account termination. The email will
include a URL to a website that looks exactly like the real thing. It is simple to
copy a legitimate email and a legitimate website but then change the so-called
back end, which receives the collected data.
The email tells the user to
log on to the site and confirm some account information. A hacker receives data a
user provides, such as a logon name, password, credit card number, or social
security number.
Phish fraud is fast, cheap, and easy to perpetuate. It is
also potentially quite lucrative for those criminals who practice it. Phish is
hard for even computer-savvy users to detect. And it is hard for law enforcement
to track down. Worse, it is almost impossible to prosecute. Please report to
Trend Micro any website you suspect to be a phishing site. |
Ping
|
Ping is a utility that sends an ICMP echo request to an IP address and waits for
a response. The Ping utility can determine if the computer with the specified IP
address is online or not.
|
POP3
|
Post Office Protocol 3 (POP3) is a standard protocol for storing and transporting
email messages from a server to a client email application.
|
Port Forwarding
|
Packets forwarding technology based on a destination port. Administrators can
configure an existing network device, (such as a firewall or switch) to easily
deploy TMWS.
|
Primary Domain
|
This is the domain selected in the Primary domain dropdown
box in the Active Directory screen (
).The domains listed in the dropdown box are the same domains
configured in the Domains screen. |
Proxy Auto-configuration (PAC) File
|
PAC files are text files containing JavaScript, a high-level programming
language. The PAC files specify which proxies should be used and under what
circumstances. PAC files may be hosted on each workstation, on an internal Web
server, on a server outside the corporate network, or on TMWS. Browsers simply
require the address of the PAC file - they fetch the file at the address specified
and execute the JavaScript contained within it.
|
Proxy Server
|
A proxy server is a World Wide Web server which accepts URLs with a special
prefix, used to fetch documents from either a local cache or a remote server, then
returns the URL to the requester.
|
RAR File
|
A Roshal Archive file is a non-documented archive file format that supports data
compression, error recovery, and file spanning.
|
Roaming User
|
Users that are not within the range of the company gateway.
|
RPC
|
Remote procedure call (RPC) is a network protocol that allows a computer program
running on one host to cause code to be executed on another host.
|
Service Provider
|
See Identity Provider.
|
SMTP
|
Simple Mail Transport Protocol (SMTP) is a standard protocol used to transport
email messages from server to server, and client to server, over the internet.
|
SNMP
|
Simple Network Management Protocol (SNMP) is a protocol that supports monitoring
of devices attached to a network for conditions that merit administrative
attention.
|
SOCKS 4
|
SOCKS 4 is a TCP protocol used by proxy servers to establish a connection between
clients on the internal network or LAN and computers or servers outside the LAN.
The SOCKS 4 protocol makes connection requests, sets up proxy circuits and relays
data at the Application layer of the OSI model.
|
Software as a Service (SaaS)
|
A model of software deployment whereby software including business processes,
enterprise applications, and collaboration tools, are provided as a service to
customers.
|
SSL
|
Secure Socket Layer (SSL) is a protocol designed by Netscape for providing data
security layered between application protocols (such as HTTP, Telnet, or FTP) and
TCP/IP. This security protocol provides data encryption, server authentication,
message integrity, and optional client authentication for a TCP/IP connection.
With SSL, client/server applications can communicate in a way that is designed to
prevent eavesdropping, tampering, and message forgery.
|
SSL Certificate
|
This digital certificate establishes secure HTTPS communication.
|
TAR File
|
This file is often used for distributing open source code.
|
TCP
|
Transmission Control Protocol (TCP) is a connection-oriented, end-to-end reliable
protocol designed to fit into a layered hierarchy of protocols that support
multi-network applications. TCP relies on IP datagrams for address resolution.
Refer to DARPA Internet Program RFC 793 for information.
|
Telnet
|
Telnet is a standard method of interfacing terminal devices over TCP by creating
a "Network Virtual Terminal." Refer to Network Working Group RFC 854 for more
information.
|
UDP
|
User Datagram Protocol (UDP) is a connectionless communication protocol used with
IP for application programs to send messages to other programs. Refer to DARPA
Internet Program RFC 768 for information.
|
Web Reputation Service (WRS)
|
Web Reputation Services are offered by Trend Micro to detect and block Web-based
security risks, including phishing attacks.
|
Widget
|
A portable, reusable application that can be added to the "Dashboard" page in
order to track malware or a particular activity protected by TMWS.
|
ZIP File
|
The ZIP file format is a data compression and archive format. A ZIP file contains
one or more files that have been compressed to reduce file size, or stored as-is.
The ZIP file format permits a number of compression algorithms.
|
Views: