4.3 Antispam protection ..................................................... 21
4.3.1 Self‑learning Antispam ......................................... 22
4.3.1.1 Adding addresses to whitelist ............................... 22
4.3.1.2 Marking messages as spam .................................. 22
4.4 Updating the program
..................................................22
4.4.1 Update setup ....................................................... 22
4.4.1.1 Update profiles .................................................... 23
4.4.1.2 Advanced update setup ........................................ 23
4.4.1.2.1 Update mode ...................................................... 23
4.4.1.2.2 Proxy server ......................................................... 24
4.4.1.2.3 Connecting to LAN ............................................... 24
4.4.1.2.4 Creating update copies – Mirror ............................ 24
4.4.1.2.4.1 Updating from the Mirror ..................................... 25
4.4.1.2.4.2 Troubleshooting Mirror update problems .............. 26
4.4.2 How to create update tasks ..................................26
4.5 Scheduler
................................................................... 26
4.5.1 Purpose of scheduling tasks .................................. 26
4.5.2 Creating new tasks .............................................. 27
4.6 Quarantine
..................................................................27
4.6.1 Quarantining files ................................................ 27
4.6.2 Restoring from Quarantine .................................. 27
4.6.3 Submitting file from Quarantine ........................... 27
4.7 Log files
...................................................................... 28
4.7.1 Log maintenance .................................................28
4.8 User interface
............................................................. 28
4.8.1 Alerts and notifications ........................................ 29
4.9 ThreatSense.Net
......................................................... 29
4.9.1 Suspicious files ....................................................30
4.9.2 Statistics .............................................................30
4.9.3 Submission ...........................................................31
4.10 Remote administration
................................................ 31
4.11 License
.......................................................................32
5. Advanced user ..................................... 33
5.1 Proxy server setup ........................................................33
5.2 Export / import settings
................................................33
5.2.1 Export settings .................................................... 33
5.2.2 Import settings .................................................... 33
5.3 Command Line
.............................................................33
6. Glossary .............................................. 35
6.1 Types of infiltrations .....................................................35
6.1.1 Viruses ................................................................ 35
6.1.2 Worms ................................................................ 35
6.1.3 Trojan horses ....................................................... 35
6.1.4 Rootkits .............................................................. 35
6.1.5 Adware ............................................................... 35
6.1.6 Spyware .............................................................. 36
6.1.7 Potentially unsafe applications ............................. 36
6.1.8 Potentially unwanted applications ....................... 36
6.2 Types of remote attacks
................................................36
6.2.1 DoS attacks ......................................................... 36
6.2.2 DNS Poisoning ..................................................... 36
6.2.3 Worm attacks ...................................................... 36
6.2.4 Port scanning ...................................................... 36
6.2.5 TCP desynchronization ......................................... 36
6.2.6 SMB Relay ........................................................... 37
6.2.7 ICMP attacks ....................................................... 37
6.3 E‑mail
.........................................................................37
6.3.1 Advertisements ................................................... 37
6.3.2 Hoaxes ................................................................ 37
6.3.3 Phishing .............................................................. 37
6.3.4 Recognizing spam scams .....................................38
6.3.4.1 Rules ................................................................... 38
6.3.4.1 Bayesian filter ...................................................... 38
6.3.4.2 Whitelist ............................................................. 38
6.3.4.3 Blacklist .............................................................. 38
6.3.4.5 The server‑side control ......................................... 38