INDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C

Similar documents
Exam : Title : symantec small Business security. Version : DEMO

Securing Information Systems

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Unit 2 Assignment 2. Software Utilities?

Course Outline (version 2)

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

SECURITY SHIELD 2013 User's Guide

Symantec Multi-tier Protection

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Implementation Guide for Symantec Endpoint Protection Small Business Edition

Client Guide for Symantec Endpoint Protection Small Business Edition

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Symantec Client Security. Integrated protection for network and remote clients.

CIH

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Pass Microsoft Exam

Get Max Internet Security where to buy software for students ]

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo

EXECUTIVE REPORT 20 / 12 / 2006

Malware, , Database Security

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

KASPERSKY LAB. Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition ADMINISTRATOR S GUIDE

Ethical Hacking and Prevention

Symantec Multi-tier Protection

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Symantec Endpoint Protection

Symantec Endpoint Protection Getting Started Guide

Training UNIFIED SECURITY. Signature based packet analysis

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

THE ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 6.0 FOR MICROSOFT EXCHANGE SERVER 2007

FRISK Software International F-Prot AVES Managed Security Service

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Chapter 12. Information Security Management

Advanced Security Measures for Clients and Servers

Chapter 6 Network and Internet Security and Privacy

User Guide. Quick Heal Technologies Ltd.

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

SEP for Windows: FAQ. Updating Security. Definitions (AV and IPS) it.ucsf.edu Published on it.ucsf.edu (

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

ECDL / ICDL IT Security. Syllabus Version 2.0

Owner of the content within this article is Written by Marc Grote

Reporting User's Guide

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials

ESET SMART SECURITY 10

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Core Solutions of Microsoft Exchange Server 2013

SECURE USE OF IT Syllabus Version 2.0


for businesses with more than 25 seats

for businesses with more than 25 seats

Annexure E Technical Bid Format

Configuring Antivirus Devices

Airtel PC Secure Trouble Shooting Guide

: Administration of Symantec Endpoint Protection 14 Exam

Integrate Microsoft Antimalware. EventTracker v8.x and above

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.9.9

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Zillya Internet Security User Guide

CCISO Blueprint v1. EC-Council

How To Remove Xp Internet Security 2011 Virus Manually

The Challenge of Spam An Internet Society Public Policy Briefing

Securing Information Systems

Cyber Security Practice Questions. Varying Difficulty

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2


Security Assessment Checklist

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Education Network Security

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

UTM 5000 WannaCry Technote

Cracked BitDefender Security for File Servers 2 Years 55 PCs pc repair software for free ]

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Nortel Media Application Server 5.1. Installation NN

Item Brand & specification Quantity Remarks Antivirus software user Licenses for windows. McAfee Complete Endpoint Protection Business Suite (CEB)

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

All-in one security for large and medium-sized businesses.

CS System Security Mid-Semester Review

CompTIA E2C Security+ (2008 Edition) Exam Exam.


University of Pittsburgh Security Assessment Questionnaire (v1.7)

Manual Removal Norton Internet Security Won't Open Or

Transcription:

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 354 browser-hijacking adware programs, 29 brute-force spam, 271-272 business, impact of spam, 274-275 business issues, 49-51 C capacity, impact of security risks and threats, 47 Center for Democracy & Technology, 279 Central Quarantine server requirements, 175 Symantec AntiVirus, 75 Central Quarantine polling, 171 CertTracker, 12.cfp (Client Firewall policy) files, 228.cfu (Client Firewall update) files, 228 challenge-response systems, 281 changing client management state, 135 Symantec Client Security, 217 server groups, Symantec System Center, 121 child domains, installation environments, 71 Children s Online Privacy Protection Acts (COPPA), 48 choosing management hierarchies, 146 client groups, 149 server groups, 146-147, 149 Client Firewall, 166 Client Firewall policy (.cfp) files, 228 creating, 232-234 Client Firewall update (.cfu) files, 228 creating, 232, 234 client groups choosing management hierarchies, 149 managing, 131, 133-134 Symantec Client Security, 208-209, 215-216 Symantec System Center, 116-117 Client Integration options page, 339-340 client management, Symantec Client Security, 215 changing client-management state, 217 client groups, 215-216 client migration, 216 client scans, 217 354 client-management state, changing, 135 Symantec Client Security, 217 client-management strategies, 150-151 client migration, Symantec Client Security, 216 client migration paths, 105-106 client requirements Symantec AntiVirus, 74 Symantec Client Security, 174 client scans, 135-137 Symantec Client Security, 217 Client Settings tab, 251 client software, migrating, 107 ClientRemote Install tool, 67 clients client scans, 135, 137 client software, migrating, 107 client-management strategies, 150-151 integrating Norton AntiSpam, 339 logon script Symanted Client Security client installation, 196 managed clients, 64-65 managing, 131 client groups, 131, 133-134 migrating, 134 mixing with parent servers, 117 remote network clients, deploying, 193-194 Symantec Client Security, deploying, 188-190 unmanaged clients, 64-65 command-line installation, Symantec AntiVirus (examples), 103 command-line options, Windows Installer, 197 components of antivirus risk management, 144 Symantec Client Security, 168-170 computer security, impact of security risks and threats, 49 configuration priorities, Symantec System Center, 117 configuration tasks, Symantec Client Security, 215 configuring Installer options, 101-102 Windows Installer options, 196-197 Connection Management tab, 237 Connection property, 244 Connections, Symantec Client Firewall policies, 239-240

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 355 Content Blocking log, 326, 328 content-based filtering, 279 COPPA (Children s Online Privacy Protection), 48 cost of spam to businesses, 274 D data harvesting, impact of security risks and threats, 48-49 definitions, distributing, 154 LiveUpdate, 154-157 VDTM, 155, 157 definitions files, responding to detected threats, 54 deleting server groups, Symantec System Center, 121 Denial-of-Service attacks, 45 deploying policies, 158 remote network clients, 193-194 Symantec AntiVirus servers, 92-95 Symantec Client Security client, 188-190 Symantec Client Security server remotely, 190, 192 Description property, 243 detecting security risks and threats, 53 detection, 53 outbreak response, 55 responding to detected threats, 54 dialers, 30 direct infection, viral infections, 36 direct losses, 2 distributing definitions, 154 LiveUpdate, 154-157 VDTM, 155, 157 policies, Symantec Client Firewall policies, 234 DNS (domain name system), 265 domains, 70-71 downloaded information, viral propagation, 33 Downloader.Mimail.B Trojan horse, 271 E Electronic Privacy Information Center (EPIC), 29 email, 263 evolving threats of, 265-266 filtering, 337 history of, 264 routing, 265 scanning, 337 SMTP, 265 spam. See spam email clients integrating with Norton AntiSpam, 308-309 Microsoft Outlook, 309 Yahoo! Mail, 310, 312 requirements for Norton AntiSpam, 292-293 Email Filtering log, 326 Email options, Norton AntiSpam management console, 337, 339-341 End-User Licensing Agreement (EULA), 272 ensuring effectiveness of policies, 145-146 environments, Symantec AntiVirus managed environments, 115 unmanaged environments, 114 EPIC (Electronic Privacy Information Center), 29 EULA (End-User Licensing Agreement), 272 exams, Symantec Certified Technical Specialist, Small Business Security, 12 exam outlines, 13-16 guidelines and policies, 19-20 preparing for, 17-19 questions, 16-17 registering for, 13 exclusions, scan exclusions (antivirus security policies), 154 executable files, viral infections, 35 F features of Norton AntiSpam, 294 FERPA (Federal Educational Rights Protection Act), 48 fighting spam, 275-277 file attachments, viral infections, 36 file shares, network file shares (viral propagation), 33 355

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 356 file sharing, botnets, 45 files definitions file, 54 executable files, viral infections, 35 filtering content-based filtering, 279 email, 337 heuristic filtering, 279 protocol filtering Symantec Client Security, 253 zones, 242 Filtering options page, Norton AntiSpam management console, 337 Filters, Language Filter, 334 firewall policies, Symantec Client Security, 217, 220 firewall rules, Symantec Client Security, 242, 244-246 Client Settings tab, 251 General Settings tab, 251 Intrusion Prevention, 249-250 permissions, 252 protocol filtering, 253 prules, 247-248 Web Content tab, 250-251 Firewalls, Intrusion Prevention, 165 frequency, scan frequency (antivirus security policies), 154 fully managed clients, client-management strategies, 150 G Gateway IP address, 236 Gateway MAC address, 236 General Settings tab, 251 GLBA (Gramm-Leach-Bliley Act), 3, 48 groups client groups. See client groups server groups. See server groups guidelines for exams, 19-20 H hack tools, 30 harvesting addresses, spam, 273 Health Insurance Portability and Accountability Act (HIPAA), 3, 48 Help & Support options, Norton AntiSpam management console, 328 heuristic filtering, 279 hierarchies, choosing management hierarchies, 146 client groups, 149 server groups, 146-147, 149 I impact of spam on business, 274-275 impact of digital infections, 31 impact of security risks and threats, 46 capacity, 47 computer security, 49 data harvesting, 48-49 instability, 49 time, 47 undesirable content, 48 Import Address Book features, Norton AntiSpam, 331 indirect losses, 2 instability, impact of security risks and threats, 49 installation, command-line installation (Symantec AntiVirus), 103 installation environments, 69 operating systems, 69 testing networks, 70-72 installing Norton AntiSpam, 296-299 Symantec AntiVirus, 76-77 local installation, 77-78, 82, 85-89 preinstallation. See also preinstallation, for Symantec AntiVirus, 72 remote installation, 89, 92-93, 95-96, 99, 101 Symantec Client Security, 176-177 administrative rights, 177 local client installation, 178, 180, 182 local installation, 177 local server installation, 183-184 local Symantec Client Firewall Administrator installation, 187 local Symantec System Center installation, 184, 186 remote client installation, 190 remote installation, 188 remote server installation, 193 356

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 357 integrating clients, Norton AntiSpam, 339 Norton AntiSpam with email clients, 308-309 Microsoft Outlook, 309 Yahoo! Mail, 310, 312 Intelligent Updater, 171 Intrusion Prevention, 165-166, 249-250 IPS signatures, 230 IRC (Internet Relay Chat), 44 IRTF (Internet Research Task Force), 263 J-K joke programs, 30 junk mail. See spam Kazaa, 28 kernel attacks, 35 keystroke loggers, 30 L Language Filter, 334 launching Norton AntiSpam, 307 laws COPPA (Children s Online Privacy Protection), 48 FERPA (Federal Educational Rights Protection Act), 48 GLBA (Gramm-Leach-Bliley Act), 3, 48 HIPAA (Health Insurance Portability and Accountability Act), 3, 48 ORA (Open Records Act), 273 SOX (Sarbanes Oxley Act), 3 SPY ACT, 274 U.S. CAN-SPAM Act, 275 legal exposure, 2 legislation, fighting spam, 276 levels Norton AntiSpam, 331 Symantec System Center, 118 licenses, Norton AntiSpam, 293 lightly managed clients, clientmanagement strategies, 151 LiveUpdate, 154-157, 171 Automated LiveUpdate, 345 Norton AntiSpam, 290, 305-306 Norton AntiSpam management console, 328 Help & Support, 328 Options, 344 unmanaged clients, 64 LiveUpdate Administration Utility, 68, 170 local administration tools installation, Symantec AntiVirus, 87-89 local client installation Symantec AntiVirus, 78, 82, 85 Symantec Client Security, 178, 180, 182 local installation Symantec AntiVirus, 77-78 Symantec Client Security, 177 local server installation Symantec AntiVirus, 85, 87 Symantec Client Security, 183-184 local Symantec Client Firewall Administrator installation, installing Symantec Client Security, 187 local Symantec System Center installation, installing Symantec Client Security, 184, 186 location, Symantec Client Firewall policies, 235-237, 239 connections, 239-240 zones, 240-241 locking server groups Symantec Client Security, 210-211 Symantec System Center, 117-119 logon script Symantec AntiVirus client installation, Symantec AntiVirus, 99, 101 logon script Symantec Client Security client installation, 196 logs Content Blocking log, 326, 328 Email Filtering log, 326 Symantec Center, 126-127 losses, 2 M macro viruses, viral infections, 36 malicious code, 3 malicious software, 27 malware, 27 managed clients, 64-65 preparing to install Symantec Client Security, 166-167 357

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 358 managed environments, Symantec AntiVirus, 115 management console, Norton AntiSpam, 324 Statistics page. See Statistics page Status & Settings, 325 management hierarchies, choosing, 146 client groups, 149 server groups, 146-147, 149 management servers, migrating, 106-107 managing alerts, 129-130 clients, 131 changing client management state, 135 client groups, 131, 133-134 client migration, 134 client scans, 135-137 Symantec AntiVirus user accounts, 122 user accounts (Symantec Client Security), 212 Microsoft Management Console (MMC), 115 Microsoft Outlook, integrating with Norton AntiSpam, 309 Microsoft Windows, viruses, 34 BRAIN, 34-35 Microsoft Windows Installer (.msi), 176 configuring options, 101-102 migrating client software, 107 clients, 134 management servers, 106-107 from previous versions, 104-105 migration paths, supported and unspoorted server and client migration paths, 105-106 mining addresses, spam, 273-274 mixing assignments within single parent servers, 209 clients with parent servers, 117 MMC (Microsoft Management Console), 115 monitor rules, 244 Morris, Robert Tappan, 37.msi (Microsoft Windows Installer), 176 configuring options, 101-102 My Addresses options page, 340-341 N network file shares, viral propagation, 33 new server groups Symantec System Center, 120 Symanted Client Security, 211 Norton AntiSpam, 9, 278, 288 ad blocking, 289 before using, 300 activating after installation, 306-308 activation and registration, 301, 304 ad blocking, 305 LiveUpdate, 305-306 Blocked Lists, 331 features of, 294 how it works, 288-289 Import Address Book, 331 installing, 296-299 integrating with email clients, 308-309 Microsoft Outlook, 309 Yahoo! Mail, 310-312 launching, 307 levels, 331 licenses, 293 LiveUpdate, 290 management console, 324 Statistics page. See Statistics page Status & Settings, 325 pop-up blocking, 289 preinstallation, 295 removing, 312, 314 requirements, 290 email clients, 292-293 minimum system requirements, 291-292 operating systems, 290 subscriptions, 295 support for, 295 troubleshooting, 346 Yahoo! Mail, 305 Norton AntiSpam 2005, 7 358

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 359 Norton AntiSpam management console LiveUpdate, Help & Support, 328 Options, 329 Ad Blocking, 343 AntiSpam, 329-331, 333, 335-336 Email, 337, 339-341 LiveUpdate, 344 O Open Records Act (ORA), 273 operating systems installation enviornments, 69 requirements for Norton AntiSpam, 290 Options, Norton AntiSpam management console, 329 Ad Blocking, 343 AntiSpam, 329-331, 333, 335-336 Email, 337, 339-341 LiveUpdate, 344 options, Symantec Client Firewall policies, 229-230 ORA (Open Records Act), 273 outbreak plans, 55 outbreak response, detection, 55 outlining policies, 144-145 Outlook, integrating with Norton AntiSpam, 309 overview of Symantec Client Security, 228 P parent servers, 66 mixing clients within, 117 partnerships, spam, 272 permissions, Symantec Client Security, 252 phishing, 5-6 spam, 268-270 policies antivirus security policies. See antivirus security policies Client Firewall policies, 232-234 deploying, 158 distributing Symantec Client Firewall policies, 234 ensuring effectiveness of, 145-146 firewall policies, 217, 220 outlining, 144-145 Symantec Certified Technical Specialist, Small Business Security, 19-20 Symantec Client Firewall policies, 228 options, 229-230 polymorphism, 43 POP (Post Office Protocol), 265 pop-up blocking, Norton AntiSpam, 289 POP3-complaint email programs, Norton AntiSpam, 292 POST (Power-On Self-Test), 36 Post Office Protocol (POP), 265 Power-On Self-Test (POST), 36 preinstallation for Symantec AntiVirus, 72 system requirements. See system requirements, Symantec AntiVirus Norton AntiSpam, 295 Symantec Client Security, 171 preparing for exams, 17-19 to install Symantec Client Security, 166-167 primary servers, 66 priorities configuration priorities, Symantec System Center, 117 rule evaluation priorities, 243 productivity losses, 2 program rules, 246 proliferation of viruses, worms, and Trojan horses, 42 properties Action property, 243 Connection property, 244 Description property, 243 Protocol property, 245 Symantec AntiVirus properties, 103 Symantec Client Security, 198 Windows Firewall Configuration, 199 Windows Security Center (WSC), 199 protection from spam, 277 Allowed List, 278-279 best practices of users, 279-281 Blocked List, 278-279 content-based filtering, 279 heuristic filtering, 279 359

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 360 protocol filtering Symantec Client Security, 253 zones, 242 Protocol property, 245 protocols POP, 265 Symantec AntiVirus, 73-74 Symantec Client Security, 172 prule Settings component, 229 prules, 247-248 prules component, 229 Q-R quarantine servers, 66 QuickScan, 135 rate of propagation, worms, 38-39 reducing security risks and threats, 51 Symantec Client Security, 52 registering Norton AntiSpam, 301, 304 remote access, 31 remote client installation Symantec AntiVirus, 92 Symantec Client Security, 190 remote installation Symantec AntiVirus deploying Symantec AntiVirus clients to Windows 2000/XP/2003, 89, 92 deploying Symantec AntiVirus servers, 92-93, 95 logon script Symantec AntiVirus client installation, 99, 101 remote client installation, 92 remote network client deployment, 95 remote server installation, 95 Web-based client deployment, 96, 99 Symantec Client Security, 188 remote network clients, deploying, 193-194 Symantec AntiVirus, 95 remote server installation Symantec AntiVirus servers, 95 Symantec Client Security, 193 removable storage, viral propagation, 33 360 removing Norton AntiSpam, 312, 314 Symantec AntiVirus, 137 Symantec Client Security, 220-221 requirements for Norton AntiSpam, 290 email clients, 292-293 minimum system requirements, 291-292 operating systems, 290 responding to detected threats, 54 to spam, 289 risk. See also security risks antivirus risk management, components of, 144 legal exposure, 2 losses, 2 Trojan horses, 40 from viruses, 32 roles of Symantec AntiVirus servers, 66 root domains, installation environments, 70-71 root kits, 46 routing email, 265 rule evaluation priorities, 243 Rule Exception Handling, 237 rules monitor rules, 244 program rules, 246 prules, 247-248 TCP rule, 245 Rules component, 229 S Sarbanes Oxley Act (SOX), 3 scams, spam phishing, 268-270 social engineering, 267-268 scanning email, 337 scans client scans, 135, 137 exclusions, antivirus security policies, 154 frequency, antivirus security policies, 154 secondary servers, 66 Securely Protect Yourself Against Cyber Trespass (SPY ACT) Act, 274 security risks, 3, 27-28 adware, 5, 29 detecting, 53 dialers, 30

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 361 hack tools, 30 impact of, 46-49 impact of infections, 31 joke programs, 30 phishing, 5-6 reducing, 51-52 remote access, 31 spam, 5-6 spyware, 5, 28-29 threats. See threats Trojan horses, 4 viruses, 4 worms, 4 server groups, 65 changing, Symantec System Center, 121 choosing management hierarchies, 146-147, 149 deleting, Symantec System Center, 121 locking, Symantec System Center, 117-119 new server groups, Symantec System Center, 120 Symantec Client Security, 208-211 Symantec System Center, 116-117 unlocking Symantec System Center, 117-119 server migration paths, 105-106 server requirements Central Quarantine, 175 Symantec AntiVirus, 74-75 Symantec Client Security, 174 servers local server installation, Symantec AntiVirus, 85, 87 management servers, migrating, 106-107 parent servers, 66 primary servers, 66 quantine servers, 66 remote server installation, 95 Symantec Client Security, 193 secondary servers, 66 single parent servers, mixing assignments within, 209 Symantec AntiVirus servers, 65 deploying, 92-93, 95 versus Symantec AntiVirus servers, 68 Symantec Client Security deploying, 190, 192 server roles, 168 service set identifier (SSID), 237 single parent servers, mixing assignments within, 209 SMTP (Simple Mail Transfer Protocol), 265 snap-in requirements, Symantec System Center, 175 snap-ins, Symantec AntiVirus snap-in, 67 social engineering attack strategies, 44 spam, 267-268 sometimes-managed clients, clientmanagement strategies, 150-151 SOX (Sarbanes Oxley Act, 3 spam, 5-6, 261-262, 271 address harvesting, 273 address mining, 273-274 brute-force spam, 271-272 fighting, 275-277 impact on business, 274-275 Norton AntiSpam. See Norton AntiSpam partnerships, 272 protection from, 277-281 responding to, 289 statistics on, 263 threats, 270-271 types of, 266-270 versus SPAM, 262 SPY ACT (Securely Protect Yourself Against Cyber Trespass), 274 spyware, 5, 28-29 SSID (service set identifier), 237 standalone systems, installation environments, 71 Statistics page, Norton AntiSpam management console, 326-328 Status & Settings, Norton AntiSpam management console, 325 storage, removable storage (viral propagation), 33 subnet addresses, 236 subscriptions, Norton AntiSpam, 295 support for Norton AntiSpam, 295 361

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 362 Symantec AntiVirus, 7 All Tasks, 129 antivirus security policies. See antivirus security policies changing client management state, 135 client-management strategies, 150-151 clients, 66, 168 defining policies, 144 installing. See installing, Symantec AntiVirus managed environments, 115 managing clients. See clients managing user accounts, 122 policies, 144-146 properties, 103 removing, 137 servers, 65-66 Symantec System Center. See Symantec System Center Tamper Protection, 127-128 unmanaged environments, 114 update methods, 69 virus definitions update, 68 Symantec AntiVirus 10.0, 7 Symantec AntiVirus components, 66-68 Symantec AntiVirus snap-in, 67, 169 Symantec Central Quarantine, 68, 170 Symantec Certified Technical Specialist, Small Business Security, 11 exam outlines, 13-16 exams, 12-13 guidelines and policies, 19-20 preparing for, 17-19 questions, 16-17 Symantec Client Firewall, 169 policies, 228 Symantec Client Firewall Administrator, firewall policies, 217, 220 Symantec Client Firewall policies distributing policies, 234 location, 235-237, 239 connections, 239-240 zones, 240-241 options, 229-230 Symantec Client Firewall snap-in, 169 Symantec Client Security, 8, 51 Central Quarantine server requirements, 175 client management, 215-217 client requirements, 174 Client Settings tab, 251 clients, deploying, 188-190 components, 168-170 example web site, 194-195 firewall policies, 217, 220 firewall rules, 242, 244-246 prules, 247-248 General Settings tab, 251 installing. See installing, Symantec Client Security Intrusion Prevention, 249-250 managing user accounts, 212 overview of, 228 permissions, 252 preinstallation, 171 preparing to install, 166-167 properties, 198 protocol filtering, 253 reducing security risks and threats, 52 removing, 220-221 server requirements, 174 server roles, 168 Symantec System Center. See Symantec System Center system requirements, 171-172 update methods, 170-171 Web Content tab, 250-251 Symantec Client Security 3.0, 7 Symantec Client Security server, 169 deploying remotely, 190, 192 versus Windows Server, 170 Symantec Gateway Security 300 Series, 10 Symantec Gateway Security 5400 Series, 10 Symantec Gateway Security Appliance, 10 Symantec Internet Security Threat Report VIII, 3 Symantec LiveUpdate, 154-157 Symantec Mail Security 8200 Series, 10 Symantec Mail Security for Domino, 10 Symantec Mail Security for Microsoft Exchange, 10 Symantec Security Response list, 270 362

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 363 Symantec System Center, 67, 115, 123, 169 Auto-Protect, 124 changing server groups, 121 client groups, 116-117 configuration priorities, 117 deleting server groups, 121 levels, 118 locking server groups, 117, 119 logs, 126-127 rollout, 176 server and client groups, 116-117 server groups, 116-117 new server groups, 120 snap-in requirements, 175 Symantec Client Security, 208, 213 AntiVirus, 213 client groups, 208-209 configuration tasks, 215 locking server groups, 210-211 new server groups, 211 server groups, 208-209 test files, 214 unlocking server groups, 210 Tamper Protection, 127-128 test files, 126 unlocking server groups, 117-119 Symantec System Center console, accessing, 88 Symantec System Center requirements, Symantec AntiVirus, 75-76 Symanted Client Security logon script Symanted Client Security client installation, 196 Symantec System Center, 208-210 system requirements Symantec AntiVirus, 73-74 administrative rights, 76-77 Central Quarantine server requirements, 75 client requirements, 74 installation methods, 76 required protocols, 73-74 server requirements, 74-75 Symantec System Center and snap-in requirements, 75-76 time synchronization, 73 Symantec Client Security, 171-172 T Tamper Protection, Symantec Center, 127-128 TCP, Symantec Client Security, 172 TCP rule, 245 test files Symantec Client Security, 214 Symantec System Center, 126 testing networks, installation enviornments, 70-72 tests. See exams threats, 3 adware, 5 blended threats, 40-42 detecting, 53 email, 265-266 impact of, 46-49 phishing, 5-6 reducing, 51-52 spam, 5-6, 270-271 spyware, 5 Trojan horses. See Trojan horses viruses. See viruses worms. See worms zero-day, 38 time, impact of security risks and threats, 47 time synchronization Symantec AntiVirus, 73 Symantec Client Security, 172 tools AV Server Rollout tool, 67, 169 ClientRemote Install tool, 67 hack tools, 30 Trojan horses, 4, 39-40 Downloader.Mimail.B, 271 proliferation of, 42 risks, 40 troubleshooting, AntiSpam, 346 Trusted Zones, 230 types of spam, 266-267 phishing, 268-270 social engineering, 267-268 U U.S. CAN-SPAM Act, 275 UBE (unsolicited bulk email, 262 UCE (unsolicited commercial email), 5, 262 UDP, Symantec Client Security, 172 363

HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 364 undesirable content, impact of security risks and threats, 48 unlocking server groups Symantec Client Security, 210 Symantec System Center, 117-119 unmanaged clients, 64-65 client-management strategies, 151 preparing to install Symantec Client Security, 166-167 unmanaged environments, Symantec AntiVirus, 114 update methods, AntiVirus update methods, 69 updates Client Firewall updates, 232 virus-definitions update, 68 updating Symantec Client Security, 170-171 user accounts, managing Symantec AntiVirus user accounts, 122 Symantec Client Security, 212 utilities, LiveUpdate Administration Utility, 68 V VDTM (Virus Definition Transport), 154-155, 157, 171 viral infections, 35-36 viral propagation, 32-34 virus-mitigation strategies, antivirus security policies, 152-153 viruses, 4, 32 boot-sector viruses, 36 BRAIN, 34-35 definitions updates, 68 kernel attacks, 35 Microsoft Window, 34 proliferation of, 42 risks form, 32 viral infections, 35-36 viral propagation, 32-34 VPN client, 50 Vulnerabilities, worms, 38 W Web bugs, 281 Web Content tab, 250-251 364 Web-based client deployment, Symantec AntiVirus, 96, 99 Windows 2000, deploying Symantec AntiVirus clients to, 89, 92 Windows 2000 Professional, requirements for Norton AntiSpam, 291 Windows 2003, deploying Symantec AntiVirus clients to, 89, 92 Windows 98/98SE/Me, requirements for Norton AntiSpam, 291 Windows Firewall Configuration, properties, 199 Windows Installer (.msi) configuring, 196-197 command-line options, 102, 197 Windows Security Center (WSC), properties, 199 Windows servers versus Symantec AntiVirus servers, 68 versus Symantec Client Security server, 170 Windows XP deploying Symantec AntiVirus clients to, 89, 92 requirements for Norton AntiSpam, 291 with Service Pack 2, 73 Symantec Client Security, 172 wireless connectivity, viral propagation, 34 Witty worm, 38 worms, 4, 37 first worms, 37 proliferation of, 42 rate of propagation, 38-39 vulnerabilities, 38 Witty worms, 38 WSC (Windows Security Center), properties, 199 X-Y-Z Yahoo! Mail integrating with Norton AntiSpam, 310-312 Norton AntiSpam, 305 Yahoo! Mail options page, 341-342 zero-day, 38 zones, Symantec Client Firewall policies, 235, 240-241 protocol filtering, 242 Zones component, 229