Key concepts

 

Network adapter

The network adapter allows communication between devices connected to each other and also allows resources to be shared between two or more computers. It has a unique identifier.

Adware

Program that automatically runs, displays or downloads advertising to the computer.

Agent

This is the agent responsible for communication between the administered computers and the servers, as well as managing local processes.

Genetic heuristic scan

The genetic heuristic scan analyzes suspicious items on the basis of “digital genes”, represented by a few hundred characters in each scanned file. This determines the potential of the software to carry out malicious or damaging actions when run on a computer, and whether it is a virus, spyware, a Trojan, a worm, etc.

Antivirus

Programs designed to detect and eliminate viruses and other threats.

Signature file

This is the file that allows the antivirus to detect threats.

Broadcast domain

This is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.

Web console

The Web console lets you configure, distribute and manage the protection across all the computers on your network. You can also see the security status of your network and generate and print the reports you want.

Quarantine

Quarantine is the place where suspicious or non-disinfectable items are stored, as well as spyware and hacking tools detected.

Dialer

Program that redirects users that connect to the Internet using a modem to a premium-rate number. Premium-rate numbers are telephone numbers for which prices higher than normal are charged.

IP address

Number that identifies a device interface (usually a computer) on a network that uses the IP protocol.

MAC address

Hexadecimal, 48-bit unique identifier of a network card or interface. It is individual; each device has its own MAC address.

Excluded computers

Computers selected by the user which are not protected by the solution. Excluded computers are only displayed in the Excluded section, they are not shown anywhere else in the console. No warnings about them are displayed either. Bear in mind that you can undo the exclusions at any time.  

Computers without a license

Computers whose license has expired or are left without a license because the user has exceeded the maximum number of installations allowed. These computers will be automatically removed from the list of computers without a license as soon as new licenses are purchased.

Firewall

This is a barrier that can protect information on a system or network when there is a connection to another network, for example, the Internet.

Peer to Peer (P2P) function

A Peer-to-Peer network is a network without fixed client or servers, but a series of nodes that work simultaneously as clients and servers for the other nodes on the network. This is a legal way of sharing files, similar to sending them via email or instant messaging, but more efficient.

In the case of , the P2P feature reduces bandwidth consumption for the Internet connection, as computers that have already updated a file from the Internet then share the update with other connected computers. This prevents saturating Internet connections.

Proxy feature

This feature allows to operate on computers without Internet access, accessing the Web through an agent installed on a computer on the same subnet.

Group

In , this is a set of computers to which the same protection configuration profile is applied. includes an initial group -Default group- to which the administrator can add all the computers to protect. New groups can also be created.

Distribution tool

Once downloaded from the Internet and installed on the administrator's PC, the distribution tool lets you remotely install and uninstall the protection on selected network computers.

Hacking tools

Programs that can be used by a hacker to carry out actions that cause problems for the user of the affected computer (allowing the hacker to control the computer, steal confidential information, scan communication ports, etc.).

Hoaxes

These are spoof messages, normally emails, warning of viruses/threats which do not really exist.

Administration agent identifier

A unique number or GUID (Globally Unique IDentifier) which identifies each administration agent of .

Joke

These are not viruses, but tricks that aim to make users believe they have been infected by a virus.

Malware

This term is used to refer to all programs that contain malicious code (MALicious softWARE), whether it is a virus, Trojan, worm or any other threat to the security of IT systems. Malware tries to infiltrate or damage computers, often without users knowing, for a variety of reasons.

Node

In computer networks, each computer on the network is a node, and if talking about the Internet, each server also represents a node.

The Cloud

Cloud computing is a technology that allows services to be offered across the Internet. And so, in IT circles, the word 'cloud' (or 'the cloud') is used as a metaphor for 'the Internet'.

Profile

A profile is a specific protection configuration. Profiles are assigned to a group or groups and then applied to all computers that make up the group.

Phishing

A technique for obtaining confidential information fraudulently. The information targeted includes passwords, credit cards and bank account details.

Local process

The local processes are responsible for performing the tasks necessary to implement and manage the protection on computers.

Potentially unwanted program (PUP)

A program that may be unwanted, despite the possibility that users consented to download it. They are usually installed legitimately as part of another program.

Protocol

System used for interconnection of computers. One of the most commonly used is TCP-IP.

Proxy server

A proxy server acts as an intermediary between an internal network (an intranet, for example) and an external connection to the Internet. This allows a connection for receiving files from Web servers to be shared.

Port

Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).

Rootkit

A program designed to hide objects such as processes, files or Windows registry entries (often including its own). This type of software is not malicious in itself, but is used by hackers to cover their tracks in previously compromised systems. There are types of malware that use rootkits to hide their presence on the system.

Exchange Server

Mail server developed by Microsoft. Exchange Servers store inbound and/or outbound emails and distribute them to users' email inboxes. To connect to the server and download their email, users must have an email client installed on their computers.

SMTP server

Server that uses SMTP -simple mail transfer protocol- to exchange email messages between computers.

Spyware

A program that is automatically installed with another (usually without the user’s permission and even without the user realizing), and which collects personal data.

Network topology

The communication structure of nodes on a network.

Trojans

Programs that reach computers disguised as harmless programs that install themselves on computers and carry out actions that compromise user confidentiality.

Public network

This is the type of network you find in Internet cafes, airports, etc. Visibility of computers is restricted on such networks, and there are restrictions on sharing files, resources and directories.

Trusted network

In this case we are generally talking about office or domestic networks. Your computer will be perfectly visible to the other computers on the network. There are no limitations on sharing files, resources or directories.

Environment variable

This is a string of environment information such as a drive, path or file name that is associated with a symbolic name that Windows can use. You can use the System applet in the Control Panel or the 'set' command at the command prompt to set environment variables.

Viruses

Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.