Software Required; Worms, Viruses, And Trojans - HP 800 User Manual

Network access controller 800
Hide thumbs Also See for 800:
Table of Contents

Advertisement

Tests Help
Software – Windows

Software Required

Description: This test verifies that the endpoint attempting to connect to your
system has the required software packages installed.
Test Properties: Enter a list of applications that are required on all connecting
endpoints, separated with a carriage return. The format for an application is
vendor\software package[\version]. Using this format stores the value in the
HKEY_LOCAL_MACHINE\Software key.
For example:
Adobe\Acrobat Reader, Adobe\Acrobat Reader\6.0
You can also specify which key to use for the specific value by entering the
key at the beginning of the value. For example:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Messenger
How Does this Affect Me?: Connecting to a network may be impossible if the
correct software is not installed and operational.
What Do I Need to Do?: Contact the vendor and install the missing software.

Worms, Viruses, and Trojans

Description:: This test verifies that the endpoint attempting to connect to your
system does not have any of the worms, viruses, or trojans listed.
Test Properties: This area of the window displays the current list of worms,
viruses, and trojans. No selection actions are required.
How Does this Affect Me?: A virus is a program that infects other programs and
files and can spread when a user opens a program or file containing the virus.
A virus needs a host (the program or file) to spread. A worm is a program that
can also perform malicious acts (such as delete files and send email); however,
it replicates itself—it does not need a host (program or file) to spread.
Frequently, worms are used to install a backdoor (a way for an attacker to
gain access without having to login). A trojan horse is a stand-alone program
that is not what it seems. For example, it may seem to be calendar program,
but when you open it, it erases all your files and displays a message, such as
"Ha ha, I deleted your files!" Trojan horse programs do not spread or replicate
themselves.
B-39

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve nac 800

Table of Contents