The network adapter allows communication between devices connected to each other, and also allows resources to be shared between two or more computers. It has a unique identifier.
Program that automatically runs, displays or downloads advertising to the computer.
The agent is responsible for communication between the administered computers and the servers, as well as managing local processes.
The genetic heuristic scan analyzes suspicious items on the basis of “digital genes”, represented by a few hundred characters in each scanned file.
This determines the potential of the software to carry out malicious or damaging actions when run on a computer, and whether it is a virus, spyware, a Trojan, a worm, etc.
Program designed to detect and eliminate viruses and other threats.
The file that allows the antivirus to detect threats.
This is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
The Web console lets you configure, distribute and manage the protection across all the computers on your network. You can also see the security status of your network and generate and print the reports you want.
Quarantine is the place where suspicious or non-disinfectable items are stored, as well as the spyware and hacking tools detected.
Program that redirects users that connect to the Internet using a modem to a premium-rate number. Premium-rate numbers are telephone numbers for which prices higher than normal are charged.
Number that identifies a device interface (usually a computer) on a network that uses the IP protocol.
Hexadecimal, 48-bit unique identifier of a network card or interface. It is individual: each device has its own MAC address.
Computers selected by the user which are not protected by the solution. Excluded computers are only displayed in the Excluded section, they are not shown anywhere else in the console. No warnings about them are displayed either. Bear in mind that you can undo these exclusions at any time. �
Computers whose license has expired or are left without a license because the user has exceeded the maximum number of installations allowed. These computers will be automatically removed from the list of computers without a license as soon as new licenses are purchased.
This is a barrier that can protect information on a system or network when there is a connection to another network, for example, the Internet.
A Peer-to-Peer network is a network without fixed client or servers, but a series of nodes that work simultaneously as clients and servers for the other nodes on the network. This is a legal way of sharing files, similar to sending them via email or instant messaging, but more efficient.
In the case of , the P2P feature reduces Internet bandwidth consumption, as computers that have already updated a file from the Internet then share the update with other connected computers. This prevents saturating Internet connections.
This feature allows to operate in computers without Internet access, accessing the Web through an agent installed on a computer on the same subnet.
In , a group is a set of computers to which the same protection configuration profile is applied. includes an initial group -Default group- to which the administrator can add all the computers to protect. New groups can also be created.
Once downloaded from the Internet and installed on the administrator's PC, the distribution tool lets the administrator remotely install and uninstall the protection on selected network computers. In , the distribution tool can only be used to deploy the protection to Windows computers.
Programs that can be used by a hacker to carry out actions that cause problems for the user of the affected computer (allowing the hacker to control the computer, steal confidential information, scan communication ports, etc.).
Spoof messages, normally emails, warning of viruses/threats which do not really exist.
A unique number or GUID (Globally Unique IDentifier) which identifies each administration agent of .
These are not viruses, but tricks that aim to make users believe they have been infected by a virus.
This term is used to refer to all programs that contain malicious code (MALicious softWARE), whether it is a virus, Trojan, worm or any other threat to the security of IT systems. Malware tries to infiltrate or damage computers, often without users knowing, for a variety of reasons.
In computer networks, each computer on the network is a node, and if talking about the Internet, each server also represents a node.
Cloud computing is a technology that allows services to be offered across the Internet. In IT circles, the word 'cloud' (or 'the cloud') is used as a metaphor for 'the Internet'.
A profile is a specific protection configuration. Profiles are assigned to a group or groups and then applied to all computers that make up the group.
A technique for obtaining confidential information fraudulently. The information targeted includes passwords, credit card numbers and bank account details.
The local processes are responsible for performing the tasks necessary to implement and manage the protection on computers.
A program that may be unwanted, despite the possibility that users consented to download it.
They are usually installed legitimately as part of another program.
System used for interconnection of computers. One of the most commonly used is TCP-IP.
A proxy server acts as an intermediary between an internal network (an intranet, for example) and an external connection to the Internet. This allows a connection for receiving files from Web servers to be shared.
Point through which a computer is accessed and information is exchanged (inbound/outbound) between the computer and external sources (via TCP/IP).
A program designed to hide objects such as processes, files or Windows registry entries (often including its own). This type of software is not malicious in itself, but is used by hackers to cover their tracks in previously compromised systems. There are types of malware that use rootkits to hide their presence on the system.
Mail server developed by Microsoft. Exchange Servers store inbound and/or outbound emails and distribute them to users' email inboxes. To connect to the server and download their email, users must have an email client installed on their computers.
Server that uses SMTP -simple mail transfer protocol- to exchange email messages between computers.
A program that is automatically installed with another (usually without the user’s permission and even without the user realizing), and which collects personal data.
The communication structure of nodes on a network.
Programs that reach computers disguised as harmless programs that install themselves on computers and carry out actions that compromise user confidentiality.
This is the type of network you find in Internet cafes, airports, etc. Visibility of computers is restricted on such networks, and there are restrictions on sharing files, resources and directories.
In this case we are generally talking about office or home networks. Your computer will be perfectly visible to the other computers on the network. There are no limitations on sharing files, resources or directories.
This is a string of environment information such as a drive, path or file name that is associated with a symbolic name that Windows can use. You can use the System applet in the Control Panel or the 'set' command at the command prompt to set environment variables.
Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.