12
Enforced Client Product Guide Introduction
How does the software work?
1
How does the software work?
Enforced Client implements a three-prong approach to security by:
1 Silently monitoring all file input and output, downloads, program executions, inbound and
outbound communications, and other system-related activities on client computers.
Detected viruses are deleted or quarantined automatically.
Potentially unwanted programs, such as spyware or adware, are removed automatically
unless you select a different response.
Suspicious activity is blocked unless you specify a different response.
2 Regularly updating detection definition (DAT) files and software components to ensure that
you are always protected against the latest threats.
3 Uploading security information for each client computer to the SecurityCenter, then using
this information to send emails and create reports that keep you informed about your
account’s status.
In addition, it provides tools for managing client computers and customizing your security
strategy.
The updating process
Outbreak response
Rumor technology
Internet Independent Updating (IIU)
The updating process
Regular updates are the cornerstone of Enforced Client.
Updates of its security components running on client computers. See Retrieving updates.
Updates to the security data maintained on the SecurityCenter website and used in
administrative reports. See Uploading security information.