EasyManuals Logo

Sophos WS100 User Manual

Sophos WS100
237 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #235 background imageLoading...
Page #235 background image
Usually installed and used with user interaction.
Occasionally used legitimately in small businesses.
Include Remote Control Software as defined by ASC that is not classified as malware.
Dialers
Any application whose primary function is to dial a premium rate phone number.
Can be installed without specific user interaction.
Include Dialing software as defined by ASC.
Hacking Tools
Applications that can be used to assist hackers to gain entry to a network, computer, or software
program.
Examples are port scanners, password crackers, and vulnerability scanners.
Usually installed and used with user interaction.
Have been known to be used in conjunction with malicious software.
Can be used legitimately for assessing network security.
Include Security Analysis Software as defined by ASC.
Other PUAs
Include any software not categorized above that may be considered by a network administrator
to be unsuitable for an enterprise network. For example:
Adware-bundled, -supported, or -affiliated software, such as P2P applications.
Trial versions of server applications that are commonly used in a malicious context.
Chat clients commonly used in a malicious context.
Server applications such as FTP, Telnet, IRC, or SMTP commonly used in a malicious
context.
G.19 proxy
A secure server through which internal clients connect to the internet. A service that allows clients
to make indirect network connections to other networks, for example, an HTTP proxy for use by
hosts with no direct connection to the internet. A client connects to the proxy server, then requests
a connection, file, or other resource available on a different server.The proxy provides the resource
either by connecting to the specified server or by serving it from a cache. In some cases, the
proxy may alter the clients request or the servers response for various purposes. A proxy server
can also serve as a firewall.
G.20 Proxy Automatic Configuration
PAC files script appropriate proxy routing by URL characteristics.
Sophos Web Appliance | Glossary | 235

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Sophos WS100 and is the answer not in the manual?

Sophos WS100 Specifications

General IconGeneral
BrandSophos
ModelWS100
CategoryFirewall
LanguageEnglish

Related product manuals