HP Compaq t5720 Thin Client User Manual
Page 73
Glossary
System Library: A Sygate library containing preconfigured IDS signatures to help detect
and prevent known attacks. System administrators can use the System Library or
create custom IDS signatures to be included in custom IDS signature libraries on the
Sygate Management Server. The System Library is shown using a blue icon in the
interface. Sygate periodically posts an updated System Library for download on the
Sygate web site. See also custom library, signature library.
system tray: The lower right section of the taskbar on the Windows desktop that displays a
clock and icons representing certain programs, such as volume control, network
connection status, and antivirus software. The Agent icons can appear on their
respective computers.
T
Transmission Control Protocol/Internet Protocol (TCP/IP): Internet protocols that
every Internet user and every Internet server uses to communicate and transfer data
over networks. TCP packages data into packets that are sent over the Internet and
are reassembled at their destinations. IP handles the addressing and routing of each
data packet so it is sent to the correct destination.
trigger: An event that causes a rule to take effect. When creating rules, you can assign
specific triggers, which cause Agents to react in a specific way, and actions, which
specify what to do when the trigger takes place. For example, you can block all traffic
originating from a certain IP address or block traffic during certain hours of the day.
Triggers can be linked to specific applications, hosts, schedules, and services.
Trojan, Trojan horse: An application that carries out an unauthorized function covertly
while running an authorized application. It is designed to do something other than
what it claims to and frequently is destructive in its actions. The Sygate Security
Agent automatically detects and terminates known Trojan horse applications before
a Trojan horse attempts to communicate.
trusted application: An application that is allowed to run on a Sygate Secure Agent.
trusted IP address: An IP address permitted access the enterprise network without running
the Sygate Security Agent. See also IP address.
U
UDP: See User Datagram Protocol (UDP).
unicast: Sending a message to one specific computer. See also broadcast, multicast.
unique ID: A 128-bit hexadecimal number, also called the GUID, assigned to uniquely
identify a client running Agent software.
63