Extreme Networks Sentriant AG Bedienungsanleitung Seite 7

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 8
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 6
Extreme Networks Data Sheet
Technical Specifications
Standard Endpoint Tests that
Ship with Sentriant AG200:
Operating Systems—Windows
Windows 2000 hotfixes•
Windows Server 2003 hotfixes•
Windows Server 2003 SP1 hotfixes•
Windows Server 2003 SP2 hotfixes•
Windows XP hotfixes•
Windows XP SP2 hotfixes•
Windows Vista hotfixes•
IIS hotfixes•
Internet Exporer hotfixes•
Office hotfixes•
Microsoft applications hotfixes•
Microsoft servers hotfixes•
Microsoft tools hotfixes•
Service Packs•
Windows automatic updates•
Browser Security Policy—Windows
IE internet security•
IE local intranet security zone•
IE restricted site security zone•
IE trusted site security zone•
Browser version•
Security Settings—Windows
MS Excel macros•
MS Outlook macros•
MS Word macros•
Services not allowed•
Services required•
Windows Bridge Network Connection•
Wireless Network Connections•
Windows Wireless Network SSID Connections•
Allowed Networks •
Windows security policy•
Windows startup registry entries allowed•
Security Settings—OS X
Airport Preference•
Airport User Prompt•
Airport WEP Enabled•
Bluetooth•
Internet Sharing•
Services •
Firewall•
QuickTime Updates•
Security Updates•
Anti-Virus Software—Windows
Avast 4 Professional Edition•
Avast 4 Professional Edition•
AVG AntiVirus Free Ed•
BitDefender AntiVirus / Internet Security v10•
BitDefender Enterprise Manager•
BitDefender AntiVirus for Windows Servers•
ClamWin Free AntiVirus•
Computer Associates eTrust AntiVirus•
Computer Associates eTrust EZ AntiVirus•
F-Secure AntiVirus•
Kaspersky Internet Security/AntiVirus 6.0•
Computer Associates eTrust EZ AntiVirus•
Kaspersky AntiVirus for FileServers•
Kaspersky AntiVirus for Workstations•
McAfee VirusScan•
McAfee Enterprise VirusScan 7.1.0, 8.0i, 8.5i•
McAfee Internet Security Suite 8.0•
McAfee Internet Security Suite 2007/Total •
Protection
McAfee Managed VirusScan•
NOD32 AntiVirus 2.7, 3.0•
Norton AntiVirus 2004, 2007, 2008•
Norton Internet Security 2007, 2008•
Panda Internet Security•
Sophos Anti-Virus 6.5, 7.0•
Symantec Corporate AntiVirus•
Trend Micro AntiVirus•
Trend Micro OfficeScan Corporate Edition•
ZoneAlarm Security Suite•
Windows OneCare•
Anti-Spyware Software
Ad-Aware 2007•
Ad-Aware SE Personal•
Ad-Aware Plus •
Ad-Aware Professional•
McAfee AntiSpyware•
CounterSpy 1.0, 2.1•
Microsoft OneCare Anti-Spyware•
McAfee Anti-Spyware•
PestPatrol•
PestPatrol ITM bundle•
Shavlik NetChk 5.8, 5.9•
Spyware Eliminator•
Webroot Spy Sweeper•
Windows Defender•
Personal Firewalls
AOL Security Edition•
ISS Black ICE PC Protection•
Comodo Firewall•
Computer Associates EZ Firewall•
F-Secure Personal Firewall•
Internet Connection Firewall (Pre XP SP2)•
McAfee Personal Firewall•
Microsoft OneCare Firewall•
Norton Personal Firewall / Internet Security•
Norton Internet Security 2007•
Senforce Advanced Firewall•
Sophos Client Firewall•
Sygate Personal Firewall•
Symantec Client Firewall•
Tiny Personal Firewall•
Trend Micro Personal Firewall•
Windows Firewall•
ZoneAlarm Personal Firewall •
Software not allowed
Administrator defined•
Software required
Administrator defined•
P2P
AIM•
Altnet•
BitTorrent•
Chainsaw•
Chatbot•
DICE•
diRC•
Gator•
Hotline Connect Client•
IceChart IRC Client•
ICQ Pro•
IRCXPro•
Kazaa•
Kazaa Lite K++•
LeafChat•
Metasquarer•
mIRC•
Morpheus•
MyNapster•
MyWay•
NetIRC•
NexIRC•
Not Only Two•
P2PNET.net•
Sentriant AG—Page 6
© 2008 Extreme Networks, Inc. All rights reser ved.
savIRC•
Skype•
Trillian•
Turbo IRC•
Visual IRC•
Xfire•
Yahoo Messenger•
Windows Messenger•
Spyware, worms, viruses, and trojans
CME-24•
Keylogger.Stawin•
Trojans.Mitglieder.C•
VBS.Shania•
W32.Beagle.A•
W32.Beagle.AB•
W32.Beagle.AG•
W32.Beagle.B•
W32.Beagle.E•
W32.Beagle.J•
W32.Beagle.K•
W32.Beagle.M•
W32.Beagle.U•
W32.Blaster.K.Worm•
W32.Blaster.Worm•
W32.DoomHunter•
W32.Dumaru.AD•
W32.Dumaru.AH•
W32.Esbot.A.1•
W32.Esbot.A.2•
W32.Esbot.A.3•
W32.Galil.F•
W32.HLLWAnig•
W32.HLLW.Cult.M•
W32.HLLW.Deadhat•
W32.HLLW.Deadhat.B•
W32.HLLW.Doomjuice•
W32.HLLW.Doomjuice.B•
W32.HLLW.Lovegate•
W32.Hiton•
W32.IRCBot.C•
W32.Kifer•
W32.Klez.H•
W32.Klez.gen•
W32.Korgo.G•
W32.Mimail.Q•
W32.Mimail.S•
W32.Mimail.T•
W32.Mydoom.A•
W32.Mydoom.AX•
W32.Mydoom.AX-1•
W32.Mydoom.B•
W32.Mydoom.M•
W32.Mydoom.Q•
W32.Netsky.B•
W32.Netsky.C•
W32.Netsky.D•
W32.Netsky.K•
W32.Netsky.P•
W32.Rusty@m •
W32.Sasser.B•
W32.Sasser.E•
W32.Sasser.Worm•
W32.Sircam.Worm•
W32.Sober.0•
W32.Sober.Z •
W32.Welchia.Worm•
W32.Zotob.E•
And more…•
Seitenansicht 6
1 2 3 4 5 6 7 8

Kommentare zu diesen Handbüchern

Keine Kommentare