Remote access
Technology that enables someone to connect and interact remotely with another user’s computer over the Internet.
Network adapter
A network adapter allows communication among different computers connected through a data network. It also allows resources to be shared between two or more computers. Network adapters are identified through a unique identifier.
Adware
Program that automatically runs, displays or downloads advertising to a computer.
Agent
One of the modules included in the Adaptive Defense 360 software. It manages communications between computers on the network and Panda Security's cloud-based servers, in addition to managing local processes.
Alert
Email message relating to the protection activity of Adaptive Defense 360.
Forensic analysis
A series of actions and processes carried out by network administrators with special tools in order to track malicious programs and assess the consequences of an infection.
Antivirus
Program designed to detect and remove computer viruses and other threats.
APT (Advanced Persistent Threat)
A set of strategies implemented by hackers and aimed at infecting customers’ networks through multiple infection vectors simultaneously. They are designed to go undetected by traditional antivirus programs for long periods of time. Their main aim is financial (through theft of confidential information, intellectual property, etc.).
Signature file
File that contains the patterns used by the antivirus to detect threats.
Audit
An Adaptive Defense 360 operating mode that lets you view the processes run on the protected network without taking any remedial action (disinfect or block).
Block
Action taken by the advanced protection and which consists of preventing the execution of programs classified as a threat and programs unknown to Adaptive Defense 360.
Broadcasting
In computer networking, broadcasting refers to transmitting a packet that will be received by every device on the network simultaneously, without the need to send it individually to each device. Broadcast packets don’t go through routers and use different addressing methodology to differentiate them from unicast packets.
Adaptive protection cycle
A new security approach based on the integration of a group of services providing protection, detection, monitoring, forensic analysis and remediation capabilities into a single management console accessible from anywhere at any time.
Malware life cycle
Breakdown of all the actions unleashed by a malicious program from the time it is first seen on a customer’s computer until it is classified as malware and disinfected.
Web console
Tool for configuring the protection, as well as distributing and managing the agent across the network. It also allows you to see the security status of your network and generate and print reports.
IP address
Number that identifies a device interface (usually a computer) logically and hierarchically on a network that uses the IP protocol.
MAC address
48-bit hexadecimal number that uniquely identifies a network card or interface. It is individual: each device has its own MAC address.
Active Directory
Proprietary implementation of LDAP (Lightweight Directory Access Protocol) services for Microsoft Windows computers. It enables access to an organized and distributed directory service for finding a range of information on network environments.
Excluded computers
Computers selected by the user which are not protected by the solution. Excluded computers are only displayed in the Excluded section; they are not shown anywhere else in the console. No warnings or alerts about them are displayed either. Bear in mind that you can undo these exclusions at any time.
Computers without a license
Computers whose license has expired or are left without a license because the user has exceeded the maximum number of installations allowed. These computers will be automatically removed from the list of computers without a license as soon as new licenses are purchased.
Master Browser
The role of a computer on a Windows network that keeps a list of all devices connected to its network segment.
A known software flaw exploited by malware to cause a series of errors to the advantage of the malware that initiates the action.
Peer to Peer (P2P) functionality
A Peer-to-Peer network is a network without fixed client or servers, but a series of nodes that work simultaneously as clients and servers for the other nodes on the network. This is a legal way of sharing files, similar to sending them via email or instant messaging, but more efficient.
In the case of Adaptive Defense 360, the P2P feature reduces Internet bandwidth consumption, as those computers that have already updated a file from the Internet then share the update with other connected computers. This prevents saturating Internet connections.
Proxy functionality
This feature allows Adaptive Defense 360 to operate on computers without Internet access, accessing the Web through an agent installed on another computer on the same subnet.
Goodware
A file which, after analysis, has been classified as legitimate and safe.
Group
In Adaptive Defense 360, a group is a set of computers to which the same protection configuration profile is applied. Adaptive Defense 360 includes an initial group -Default group- to which the administrator can add all the computers to protect. New groups can also be created.
Workgroup
Architecture on Windows networks where shared resources, permissions and users are managed independently on each computer.
Hardening
An Adaptive Defense 360 operating mode that blocks unknown programs downloaded from the Internet as well as all files classified as malware.
Heap Spraying
Heap spraying is a technique used in exploits to facilitate arbitrary code execution. It involves writing a series of bytes at a predetermined location in the memory of a target process.
Distribution tool
Once downloaded from the Internet and installed on the administrator's PC, the distribution tool lets the administrator remotely install and uninstall the protection on the selected computers. In Adaptive Defense 360, the distribution tool can only be used to deploy the protection to Windows computers.
Hacking tool
Programs used by hackers to carry out actions that cause problems for the user of the affected computer (allowing the hacker to control the computer, steal confidential information, scan communication ports, etc.).
IDP (Identity Provider)
Centralized service for managing user identity verification.
IP (Internet Protocol)
Principal Internet communications protocol for sending and receiving datagrams generated on the underlying link level.
Malware
This term is used to refer to all programs that contain malicious code (MALicious softWARE), whether it is a virus, Trojan, worm or any other threat to the security of IT systems. Malware tries to infiltrate or damage computers, often without users knowing, for a variety of reasons.
Notifications
Alerts for administrators about important issues concerning the Adaptive Defense 360 platform, such as new versions of the endpoint protection, licenses about to expire, etc.
Lock
An Adaptive Defense 360 operating mode that blocks unknown programs as well as all files classified as malware.
This is a branch of artificial intelligence whose aim is to develop technologies capable of predicting behaviors from unstructured data delivered in the form of examples.
MD5 (Message-Digest Algorithm 5)
A cryptographic hash function producing a 128-bit value that represents data input. The MD5 hash value calculated for a file is used to identify it unequivocally or check that it has not been tampered with.
Cloud
Cloud computing is a technology that allows services to be offered across the Internet. Consequently, the term 'the cloud' is used as a metaphor for the Internet in IT circles.
OU (Organizational Unit)
Hierarchical method for classifying and grouping objects stored in directories.
Partner
A company that offers Panda Security products and services.
Profile
Specific settings governing the protection or any other aspect of a managed computer. Profiles are assigned to a group or groups and then applied to all computers that make up the group.
Phishing
A technique for obtaining confidential information from a user fraudulently. The targeted information includes passwords, credit card numbers and bank account details.
Local process
Local processes are responsible for performing the tasks necessary to implement and manage the protection on computers.
Potentially unwanted programs
A program that may be unwanted, despite the possibility that users consented to download it.
Potentially unwanted programs are often downloaded inadvertently along with other programs.
Protocol
System of rules and specifications in telecommunications that allows two or more computers to communicate. One of the most commonly used protocols is TCP-IP.
Proxy
Software that acts as an intermediary for the communication established between two computers: a client on an internal network (an intranet, for example) and a server on an extranet or the Internet. This allows a connection for receiving files from Web servers to be shared.
Port
Unique ID number assigned to a data channel opened by a process on a device through which data is exchanged (inbound/outbound) with an external source.
RWD (Responsive Web Design)
A set of techniques that enable the development of Web pages that automatically adapt to the size and resolution of the device being used to view them.
RIR (Regional Internet Registry)
An organization that manages the allocation and registration of IP addresses and Autonomous Systems (AS) within a particular region of the world.
Rootkit
A program designed to hide objects such as processes, files or Windows registry entries (often including its own). This type of software is used by attackers to hide evidence and utilities on previously compromised systems. There are types of malware that use rootkits to hide their presence on the system.
Return-oriented programming (ROP)
Return-oriented programming (ROP) is a computer security exploit technique that involves chaining together short instruction sequences already present in the compromised program. It aims to defeat some of the new protection technologies implemented in modern operating systems.
Accumulated knowledge server
A service that stores and relates the knowledge collected by Adaptive Defense 360 from the customer’s network in real time. It enables searches to be run and advanced graphs to be generated to interpret the information.
SIEM (Security Information and Event Management)
Software that provides storage and real-time analysis of the alerts generated by network devices.
SSL (Secure Sockets Layer)
Cryptographic protocol for the secure transmission of data sent over the Internet.
PDC (Primary Domain Controller)
This is the role of a server on Microsoft domain networks, which centrally manages the assignation and validation of user credentials for accessing network resources. Active Directory currently exercises this function.
Spyware
A program that is automatically installed with another software (usually without the user’s permission and even without the user realizing), and collects personal data.
TCO (Total Cost of Ownership)
Financial estimate of the total direct and indirect costs of owning a product or system.
TLS (Transport Layer Security)
New version of protocol SSL 3.0.
Network topology
Physical or logical map of nodes on a network.
Trojans
Programs that reach computers disguised as harmless software to install themselves on computers and carry out actions that compromise user confidentiality.
TCP (Transmission Control Protocol)
The main transport-layer Internet protocol, aimed at connections for exchanging IP packets.
UDP (User Datagram Protocol)
A transport-layer protocol which is unreliable and unsuited for connections for exchanging IP packets.
Environment variable
A string consisting of environment information such as a drive, path or file name, which is associated with a symbolic name that Windows can use.
You can use the System applet in the Control Panel or the 'set' command at the command prompt to set environment variables.
Infection vector
The means used by malware to infect users' computers. The most common infection vectors are Web browsing, email and pen drives.
Window of opportunity
The time it takes between when the first computer in the world is infected with a new malware specimen and its analysis and inclusion by antivirus companies in their signature files to protect computers from infections.
This is the period when malware can infect computers without antivirus software being aware of its existence.
Virus
Programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly destructive and irreparable.