Glossary
A
access point: A network connection that allows a computer or user to connect to an enterprise network. Virtual Private Networks (VPNs), wireless communications, and Remote Access Service (RAS)
Active Response: The ability to automatically block the IP address of a known intruder for a specific amount of time. The amount of time that a Security Agent blocks an intruder’s IP address can be modified to any interval from 1 to 65,000 seconds. By the way, a Trojan is not considered an attack because it is a program running on the same computer on which a Security Agent has detected a Trojan.
adapter: See network adapter.
Advanced rule: A rule that can be added on an Agent to enforce a security policy. Advanced Rules can exhibit complex relationships between applications, IP addresses, and services. See also firewall rule, simple rule.
Agent: A device running HP Sygate Security Agent software is also called an Agent device.
of the ability to forge (or spoof) a Media Access Control (MAC) address of a computer.
51