Trend Micro HOME NETWORK 1.1 Manual De Usuario
Using the Trend Micro Dashboard
4
-
8
F
IGURE
4-6.
Network report example
Vulnerabilities and corrective actions
Security Scan checks your system for the following vulnerabilities:
•
•
Microsoft security vulnerabilities. These are security weaknesses that Microsoft has
publicly identified. Microsoft periodically releases software updates that help prevent
hackers, viruses, and other Internet threats from exploiting these weaknesses and
damaging computers running Microsoft software.
publicly identified. Microsoft periodically releases software updates that help prevent
hackers, viruses, and other Internet threats from exploiting these weaknesses and
damaging computers running Microsoft software.
•
Trojan horse programs. Trojans are installed secretly and perform unauthorized, often
malicious, actions such as displaying or sending messages, erasing files, and formatting
disks.
malicious, actions such as displaying or sending messages, erasing files, and formatting
disks.
•
Spyware. Spyware is installed either secretly or disguised as a legitimate program.
Spyware may track your Internet use and send your personal data to an illicit database.
The information tracked can include your location, the Web sites you visit, your online
purchases, and other private information.
Spyware may track your Internet use and send your personal data to an illicit database.
The information tracked can include your location, the Web sites you visit, your online
purchases, and other private information.
•
Folder and file sharing. A convenient feature of Microsoft Windows operating systems is
the ability to share folders or files with other users on a network. But shared folders allow
attackers easy access to the data they contain.
the ability to share folders or files with other users on a network. But shared folders allow
attackers easy access to the data they contain.
•
Security software. Your system is vulnerable if you do not have well-known virus
protection software installed. Even with virus protection software installed, your system
remains vulnerable if the software has not been updated recently.
protection software installed. Even with virus protection software installed, your system
remains vulnerable if the software has not been updated recently.