User guide

62
VirusScan
®
8.6 for Mac User Guide Glossary
On-Demand scanner The On-Demand scanner allows you to initiate a scan at any time by dragging
and dropping selected files into the console or through a file open dialog box.
You can scan multiple files, directories, and volumes.
On-access scanning A continuous examination of files in use to determine if a virus or other
malware is present. It can take place whenever a file is read from the disk,
and/or written to the disk. Multiple directories and volumes can be scanned.
On-demand scanning A scheduled examination of selected files to determine if a virus or other
potentially unwanted code is present. It can take place immediately, at a
future scheduled time, or at regularly scheduled intervals.
policy The configuration settings of managed products that are defined and
managed from ePolicy Orchestrator.
policy enforcement
interval
The time period during which the agent enforces the settings it has received
from the ePolicy Orchestrator server. Because these settings are enforced
locally, this interval does not require any bandwidth.
properties Data exchanged during agent-server communication that includes
information about each managed computer (for example, hardware and
software) and its managed products (for example, specific policy settings and
the product version number).
Repository The location that stores policy pages used to manage products.
scan task A single scan event.
scan, scanning An examination of files to determine if a virus or other potentially unwanted
code is present.
server events Activity on the ePolicy Orchestrator server that is recorded by the Windows
Event Viewer. This information is not stored in the ePolicy Orchestrator
database, so is not available for reporting purposes.
silent installation An installation method that installs a software package onto a computer
silently, without need for user intervention.
site In the console tree, a logical collection of entities assembled for ease of
management. Sites can contain groups of computers, and can be organized
by IP address range, IP subnet mask, location, department, and others.
task An activity (both one-time such as On-Demand scanning, and routine such as
updating) that is scheduled to occur at a specific time, or at specified intervals.
Compare to policy.
Trojan horse A program that either pretends to have, or is described as having, a set of
useful or desirable features, but actually contains a damaging payload. Trojan
horses are not technically viruses, because they do not replicate.
upper details pane In the console, the upper-right pane, which contains the Policies, Properties, and
Tasks tabs.
UTC time Coordinated Universal Time (UTC). This refers to time on the zero or
Greenwich meridian.