A component of Kaspersky Secure Mail Gateway that filters out phishing messages.
A component of Kaspersky Secure Mail Gateway that filers out messages categorized as spam or probable spam.
A component of Kaspersky Secure Mail Gateway that filters out infected and probably infected email messages and attachments.
A special storage for backup copies of files that are created before disinfection or deletion is attempted.
A software system that can store information about network resources (such as users) in one place and provides centralized management capabilities.
Verification of the digital signature added to messages.
Authentication performed to verify that the message was actually sent from the specified domain.
DNS blacklist or DNS blocklist. Custom list of DNSBL servers used to improve the accuracy of spam detection. DNSBL servers stores lists of IP addresses that were previously detected as sources of spam and to which the Anti-Spam engine assigns a spam rating and one of the Anti-Spam message scan status labels.
An email message describing an application event or a message scan event, which Kaspersky Secure Mail Gateway sends to the specified email addresses.
The technology designed to detect threats that cannot be detected using the current version of Kaspersky Lab application databases. It detects files that may be infected with an unknown virus or a new variety of a known virus.
Files in which malicious code is detected during heuristic analysis are marked as probably infected.
An infrastructure of cloud services that provides access to the online Knowledge Base of Kaspersky Lab which contains information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky Lab applications to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.
A xxxxxxx.key file that allows using a Kaspersky Lab application on the terms of a trial or commercial license. The application generates the key file based on the activation code. The application can be used only with a key file.
Lightweight Directory Access Protocol for accessing directory services.
Web addresses leading to malicious resources, i.e. web resources designed to spread malware.
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
An object whose code contains portions of modified code from a known threat, or an object whose behavior is similar to that of a threat.
A cloud service that uses technologies for determining the reputation of messages. Information about new kinds of spam appears in the cloud service sooner than in Anti-Spam module databases, making it possible to improve the speed and accuracy of spam detection.
A network management software module of Kaspersky Secure Mail Gateway, which monitors the operation of Kaspersky Secure Mail Gateway.
An application event notification sent by the SNMP agent.
Unsolicited mass email mailings, most often including advertisements
Comparison of IP addresses of message senders with the list of possible message sources, which has been created by the mail server administrator.
Spam URI Realtime Blocklists. Custom list of SURBL servers used to improve the accuracy of spam detection. SURBL servers store lists of web addresses that were previously detected in the subject or body of messages recognized as spam and to which the Anti-Spam engine assigns a spam rating and one of the Anti-Spam message scan status labels.
A fully isolated software system that executes machine-independent or machine code of the processor and can imitate the operating system of an application or device (such as a computer).
Page top