HP Sygate Security Agent User Guide

spoofing: A technique used by an intruder to gain unauthorized network access to a computer system or network by forging known network credentials. IP spoofing is a common method for intruders to gain unauthorized network access to a computer systems or network.

Stealth Mode Browsing: An option that detects all HTTP traffic on port 80 from a web browser and removes information such as the browser name and version, the operating system, and the reference web page. It stops web sites from knowing which operating system and browser you are using. Stealth Mode Browsing may cause some web sites not to function properly because it removes the browser signature, called the HTTP_USER_AGENT, from the HTTP request header and replaces it with a generic signature.

subnet: Portions of a TCP/IP network used to increase the bandwidth on the network by subdividing the network into portions or segments. All IP addresses within a subnet use the same first three sets of numbers (such as 192.168.1 in 192.168.1.180 and 192.168.1.170) indicating they are on the same network. A subnet is See also subnet mask.

subnet mask: A value that allows a network to be subdivided and provides for more complex address assignments. The subnet mask format is nnn.nnn.nnn.nnn, such as 255.255.255.0.

sweeping: The process that Sygate uses to eliminate old log files on the database. See also logs.

Sygate Security Agent: Software component that enforces rule-based security on devices, whether remote or behind a corporate firewall, using security policies defined using the Policy Editor. Also referred to as the Agent in Sygate documentation. The Agent must be installed on every device before it can connect to the enterprise network. The Agent can detect, identify, and block known Trojans and Denial of Service attacks, and also protects against new or unknown attacks by blocking applications and traffic that violates a defined set of security policies. Port scans are also detected and logged to alert users and system administrators of potential attacks, while maintaining system security.

synchronization: Refers to automatically keeping directory servers up-to-date with the user

database including synchronizing between LDAP, Active Directory, and NT Domain. System administrators can specify how often to synchronize the user database with the directory server. See also Active Directory, Lightweight Directory Access Protocol (LDAP).

62