Trend Micro HOME NETWORK 1.1 Manual De Usuario

Descargar
Página de 38
Using the Trend Micro Dashboard
4
-
8
F
IGURE
4-6.   
Network report example
Vulnerabilities and corrective actions
Security Scan checks your system for the following vulnerabilities: 
Microsoft security vulnerabilities. These are security weaknesses that Microsoft has 
publicly identified. Microsoft periodically releases software updates that help prevent 
hackers, viruses, and other Internet threats from exploiting these weaknesses and 
damaging computers running Microsoft software.
Trojan horse programs. Trojans are installed secretly and perform unauthorized, often 
malicious, actions such as displaying or sending messages, erasing files, and formatting 
disks.
Spyware. Spyware is installed either secretly or disguised as a legitimate program. 
Spyware may track your Internet use and send your personal data to an illicit database. 
The information tracked can include your location, the Web sites you visit, your online 
purchases, and other private information.
Folder and file sharing. A convenient feature of Microsoft Windows operating systems is 
the ability to share folders or files with other users on a network. But shared folders allow 
attackers easy access to the data they contain.
Security software. Your system is vulnerable if you do not have well-known virus 
protection software installed. Even with virus protection software installed, your system 
remains vulnerable if the software has not been updated recently.