162
Enforced Client Anti-Virus and Anti-Spyware 4.5 Product Guide Glossary
Clean Failed The virus and spyware protection service could not clean or delete the item. This might
indicate that the item is in use; if so, close it and attempt the clean again. This might also
indicate that the item resides on read-only media, such as a CD. If so, no further action is
required. The virus and spyware protection service has prevented the original file from
being accessed by the client computer, but it cannot delete the item. Any files copied to the
computer have been cleaned. If the item is not in use or on read-only media, further action
might be required to ensure the computer is not at risk.
clean, cleaning (1) Action taken by the virus and spyware protection service when it detects a threat such
as a virus, Trojan horse, or worm. The cleaning action can include removing the threat from
a file and restoring the file to usability; removing references to the threat from system files,
system .INI files, and the registry; ending the process generated by the threat; deleting a
macro or a Microsoft Visual Basic script that is infecting a file; deleting a file if it is a Trojan
horse or a worm; renaming a file that cannot be cleaned.
(2) A label applied to email that has been inspected by the email security service and found
free of inappropriate content such as spam, phishing attempts, viruses, or particular content
identified by your organization as undesirable.
client computer A computer on which the Enforced Client client software is installed.
client software The Enforced Client software module installed on each client computer. It serves as an
intelligent link between the client computer and the SecurityCenter website by performing
tasks (such as scanning and updating) on the client computer and sending report data to the
SecurityCenter.
Compare to SecurityCenter website.
configuration settings See policy.
connection type The type of network environment to which a client computer is connected; used by the
firewall protection service to determine whether to trust communications from other
computers on the same network.
See also custom connection type, trusted connection, and untrusted connection.
custom connection type A network environment where only specified communications are allowed. The firewall
protection service allows communications only from IP addresses and ports defined by the
administrator.
Compare to trusted connection and untrusted connection.
Customer Home site See SecurityCenter website.
deployment Distributing and installing the Enforced Client client software to computers from a central
location, such as the administrative computer, via the silent installation or push installation
method.
Compare to URL installation.
detection definition files DAT files (also referred to as signatures) that identify the code which anti-virus and
anti-spyware software detect to repair viruses, Trojan horses and potentially unwanted
programs (PUPs).
directory harvest attacks
(DHA)
Attempts to retrieve lists of valid email addresses from email servers. The email security
service analyzes every IP address that connects to an email server and blocks messages that
exhibit the characteristics of a directory harvest attack.
download site The SonicWALL website for retrieving product, DAT file, and engine updates.
EICAR test file European Institute of Computer Anti-Virus Research has developed a file consisting of a
string of characters that can be used to test the proper installation and operation of anti-virus
and anti-spyware software.