Aug 21, 2023
Advanced persistent threat (APT)
A sophisticated targeted attack against the corporate IT infrastructure that simultaneously uses different methods to infiltrate the network, hide on the network, and gain unobstructed access to confidential data.
A component of Kaspersky Security 8 for Linux Mail Server designed to detect messages categorized as phishing.
A component of Kaspersky Security 8 for Linux Mail Server designed to detect messages categorized as spam.
A Kaspersky Security 8 for Linux Mail Server component designed to detect viruses in email messages and email attachments.
Special storage for email messages that have been processed by the application.
If a processing rule is applied to the message, and the rule has "Place message in Backup" selected in its settings, the application places the message in Backup before processing regardless of the configured action.
Filtering email messages based on message size, attachment file name mask, and attachment format. Based on the results of content filtering, you can restrict the forwarding of messages by the mail server.
A software system that can store information about network resources (such as users) in one place and provides centralized management capabilities.
DKIM Mail Sender Authentication
Verification of the digital signature added to messages.
DMARC Mail Sender Authentication
Verification that determines the policy and actions taken on messages based on the results of SPF and DKIM Mail Sender Authentication.
DNS blacklist or DNS blocklist. Custom list of DNSBL servers used to improve the accuracy of spam detection. DNSBL servers stores lists of IP addresses that were previously detected as sources of spam and to which the Anti-Spam module assigns a spam rating and one of the Anti-Spam message scan status labels.
An email message describing an application event or a message scan event, which Kaspersky Security 8 for Linux Mail Server sends to the specified email addresses.
Technology designed to detect threats that cannot be detected using the current version of Kaspersky application databases. It detects files that may be infected with an unknown virus or a new variety of a known virus.
Kaspersky Anti Targeted Attack Platform
Solution designed for protection of a corporate IT infrastructure and timely detection of threats such as zero-day attacks, targeted attacks, and complex targeted attacks known as advanced persistent threats (hereinafter also referred to as APT).
Kaspersky Private Security Network
A solution that allows users of Kaspersky anti-virus software to access Kaspersky Security Network data without sending their own information to Kaspersky Security Network servers.
Kaspersky Security Network (KSN)
An infrastructure of cloud services that provides access to the Kaspersky online Knowledge Base, which contains information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures that Kaspersky applications respond faster to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.
A xxxxxxx.key file that allows using a Kaspersky application on the terms of a trial or commercial license.
Lightweight Directory Access Protocol for accessing directory services.
Web addresses leading to malicious resources, that is, web resources designed to spread malware.
MIB (Management Information Base)
Virtual database used to manage objects that are transmitted over the SNMP protocol.
Instant Anti-Spam database update service that allows to install critical updates in real time.
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
A cloud service that uses technologies for determining the reputation of messages. Information about new kinds of spam appears in the cloud service sooner than in Anti-Spam module databases, making it possible to improve the speed and accuracy of spam detection.
A network management software module of Kaspersky Security 8 for Linux Mail Server that tracks information about application operation.
An application event notification sent by the SNMP agent.
Unsolicited mass mailing of emails, most often including advertisements
SPF Mail Sender Authentication
Comparison of IP addresses of mail senders with the list of possible message sources that has been created by the mail server administrator.
Spam URI Realtime Blocklists. Custom list of SURBL servers used to improve the accuracy of spam detection. SURBL servers store lists of web addresses that were previously detected in the subject or body of messages recognized as spam and to which the Anti-Spam module assigns a spam rating and one of the Anti-Spam message scan status labels.
Attack that targets a specific person or organization. Unlike mass attacks by computer viruses designed to infect as many computers as possible, targeted attacks can be aimed at infecting the network of a specific organization or even a specific server within the corporate IT infrastructure. A dedicated Trojan program may be written to stage each targeted attack.
An attack targeting the corporate IT infrastructure by exploiting zero-day vulnerabilities in software. These are software vulnerabilities that hackers find and exploit before the software vendor has a chance to release a patch.
A software vulnerability that hackers find and exploit before the software vendor has a chance to release a patch with fixed program code.