
Table 1-1 Definitions (continued)
Term Description
network user
An unauthenticated remote user or process sending information to the
workstation through a network protocol; this role only has the authority to send
information through the appliance from either the Internet or the internal
network.
packers
Compression tools that compress files and change the binary signature of the
ex
ecutable. They can be used to compress Trojans and make them harder to
detect.
Perl DBI
Perl DBI (database interface) is a database interface for the Perl programming
language. It is used within the McAfee Email Gateway Appliance in the logging
subsystem for the purposes of accessing the database housing audit records.
phishing
This category includes sites that typically arrive in hoax email established only to
steal user account information. These sites falsely represent themselves as
legitimate company websites in order to deceive and obtain user account
information that can be used to perpetrate fraud or theft.
POP3 Post Office Protocol 3
potentially
unwanted
progr
ams (PUPs)
A program that performs some unauthorized (and often harmful or undesirable)
acts such as viruses, worms, and Trojan horses.
quarantine
Enforced isolation of a file or folder — for example, to prevent infection by a virus
or to isolate a spam email message — until action can be taken to clean or
remove the item.
scanning engine The mechanism that drives the scanning process.
signature The description of a virus, malware, or attack methodology.
SMTP 250
command
Requested mail action okay, completed.
spam score
A rating system used to indicate the likelihood that an email message contains
spam. The higher the score allocated to a message, the more likely it is to be
spam.
spyware
This category includes URLs that download software that covertly gathers user
information through the user's Internet connection, without his or her knowledge,
usually for advertising purposes. This might be considered a violation of privacy
and might have bandwidth and security implications.
transparent mode
In either transparent router mode or transparent bridge mode, the
communicating devices are unaware of the interv
ention of the appliance — the
appliance's operation is transparent to those devices.
Trojan
An application that either pretends to have, or is described as having, a set of
useful or desirable features, but actually contains a damaging payload. Trojan
horses are not technically viruses because they do not replicate.
virtual appliance A virtual machine image designed to run on a virtualization platform.
virus
An application that is capable of replicating with little or no user intervention, and
the replicated program(s) also replicate further.
whitelist
A list of email addresses or domains you created that the anti‑spam module
treats as non‑spam. When the anti‑spam module detects an incoming message
from an address or domain on the whitelist, it immediately assigns a high
negative score to that message.
worm A virus that spreads by creating duplicates of itself on other driv
es, systems, or
networks.
Preparing the Common Criteria environment
Key networking terms
1
McAfee
®
Email Gateway 7.0.1 Common Criteria Ev
aluated Configuration Guide
Appliances
9
Commentaires sur ces manuels