beautypg.com

HP Compaq t5720 Thin Client User Manual

Page 70

background image

HP Sygate Security Agent User Guide

Profile Serial Number: A number that the Policy Editor automatically generates every time

an Agent’s security policy changes. A system administrator can check the serial
number on the Help|About menu of the Agent to verify that an Agent is running an
up-to-date security policy.

protocol driver blocking: A security measure that blocks malicious applications from using

their own protocol driver to exit the network surreptitiously.

R

remote IP address: The IP address of the computer to which information is being

transmitted.

remote port: A port on another computer attempting to transmit information over a

network connection.

rule: See Advanced Rule, firewall rule, Simple Rule.

Running Applications list: Located below the traffic flow graphs; a list of all applications

and services that are currently accessing (or attempting to access) an Agent’s network
connection. The status of the applications is also displayed.

S

Schedule: An Advanced Rule that allows for triggering an event at certain times of the day.

security alerts: A sound or notification indicating that the Agent has detected an attack

against the client computer.

security policy: A combination of all the security rules and settings that have been applied

to a specific group to protect an enterprise’s computing integrity. Security policies
can include rules concerning the permitted applications, connection type, VPN,
Ethernet, wireless, and any other restrictions or specifications that an organization
wants to enforce.

service: A network port, a UDP port, an IP protocol type, or an ICMP type.

severity: A mechanism for the Agent logging system that indicates how critical an event is.

Severity ranges from 0 to 15, where 0 is the most critical and 15 is least critical.

signature: A rule that defines how to identify an intrusion. Sygate’s Intrusion Detection

System identifies known attacks by pattern-matching against rules or ‘signatures’
stored in the System Library or a custom library. See also signature library, System
Library.

60

This manual is related to the following products: