
• McAfee Email Gateway 7.0 Appliance Help; online Help is included in the McAfee Email Gateway
Appliance v
ersion 7.0.
• McAfee Email Gateway Release Notes, version 7.0 Patch 7.0.1
(meg‑7.0.1‑2151.150.readme.en‑us.pdf)
Key networking terms
The following table provides definitions of key terms related to McAfee Email Gateway Appliances.
Table 1-1 Definitions
Term Description
appliance
Within the context of this document, the term appliance is synonymous with T
OE
— the combination of hardware and software that is described within the TOE
boundary.
blacklist
A list of email addresses or domains you created that the anti‑spam module will
always treat as spam. When the application detects an incoming message from
an address or domain on the blacklist, it immediately assigns a high score to that
message.
content filtering
A process that uses rules to detect undesir
able content, such as offensive words,
in email messages.
Cyrus IMAP
software
The Cyrus IMAP (Internet Message Access Protocol) software provides access to
personal mail and system‑wide bulletin boards through the IMAP protocol.
data loss
prevention
Refers to systems that identify, monitor, and protect data in use (for example,
endpoint actions), data in motion (for example, network actions), and data at
rest (for example, data storage) through deep content inspection and contextual
security analysis of transactions (attributes of originator, data object, medium,
timing, recipient/destination, and so on).
Denial of Service
(DoS)
A means of attack against a computer, server, or network that disrupts the ability
to respond to legitimate connection requests. A denial‑of‑service attack
overwhelms its target with false connection requests, so that the target ignores
legitimate requests.
denied connection
The term used by the TOE to denote traffic dropped in response to matching a
Denial of Service prevention policy as defined and configured by the TOE
administrator.
directory harvest
attack (DHA)
An attack on an email server that uses a script to identify and gather valid email
addresses; used by spammers.
explicit proxy
mode
In explicit pro
xy mode, some network devices must be set up to explicitly send
traffic to the appliance. The appliance then works as a proxy, processing the
traffic on behalf of these network devices.
heuristic analysis
A method of scanning that looks for patterns or activities that are virus‑like, to
detect new or previously undetected viruses.
ICAP Internet Content Adaptation Protocol.
image filtering
A method of scanning that searches for inappropriate images in email traffic and
performs a designated action on discovery
IMAP Internet Message Access Protocol
keylogger A computer program that captures the keystrokes of a computer user and stores
them.
1
Preparing the Common Criteria environment
K
ey networking terms
8
McAfee
®
Email Gateway 7.0.1 Common Criteria Ev
aluated Configuration Guide
Appliances
Commentaires sur ces manuels