skip to main content
EN : Definition of Terms : Definition of Terms
Definition of Terms
 
Term
Definition
Deep Freeze Cloud Console
The Deep Freeze Cloud Console allows you to manage the computers on your network from a browser.
Cloud Agent
The Cloud Agent is installed on the computers that are managed by the Deep Freeze Cloud. The Cloud Agent on multiple computers report to the Cloud Relay, and the Cloud Relay reports to the Deep Freeze Cloud.
Cloud Relay
The Cloud Agent installed on the computers report to the Cloud Relay. The Cloud Relay reports to the Deep Freeze Cloud. Real-time Deep Freeze actions can be performed on the computers through the Cloud Relay.
Policy
A policy contains all the configuration settings on how services run on the computer. A policy contains the action taken by the services, schedule, error reporting and the functionality allowed to the user on the computer.
Services
The Deep Freeze Cloud Console allows installing Policies for the following Services: Anti-Executable, Anti-Virus, Deep Freeze, Power Save, and WINSelect.
Imaging Server
Deep Freeze Imaging Server contains Images and Drivers to deploy on to multiple computers.
Anti-Virus Definition Relay
Install the Anti-Virus Definition Relay on any computer on your network to download virus definitions and distribute them across your local network.
Deployment Utility
The Deployment Utility allows you to deploy Services to client computers that are available on the network and turned on. Make sure to run the Deployment utility from your computer with administrative rights.
Anti-Executable Data Import Utility
Run the Anti-Executable Data Import Utility on any computer to automatically add allowed/blocked files and publishers into the Central Control List or the Policy available on the Cloud Console.
Data Igloo
Faronics Data Igloo allows Deep Freeze users to exempt specified data folders, entire user profiles, or even registry keys from being Frozen by redirecting them to a Thawed partition (ThawSpace), while keeping the operating system partition completely protected.
OTP
A One Time Password (OTP) can be useful if, for example, a Deep Freeze password is lost or if a configuration file was created without any password defined. An OTP can also be used to provide access to a computer for an individual performing maintenance duties without requiring that individual to know the permanent Deep Freeze password.
Central List
A Central List contains the names of all the executable files and Publishers on your network. Populate the Central List by adding the files and Publishers on the console computer. This Central List can then be applied to the computers via a Policy. The Central List needs to be created only once, but can be applied multiple times to more than one computer via a Policy.
Executable
Any file that can be launched by the operating system. The executable files managed by Anti-Executable have the extension .scr, .jar, .bat, .com, or .exe.
JAR file
A JAR (Java Archive) is an archive file format contains many Java class files and associated metadata and resources (text, images and so on) into one file to distribute application software or libraries on the Java platform.
Protection
When set to Enabled, this setting indicates that Anti-Executable is protecting a computer based on the Central Control List and Local Control List. When set to Disabled, any executable can be launched on the computer.
Publisher
A Publisher is the creator of a file (for example, Microsoft created wordpad.exe). A Publisher validates the file by digitally signing it. Anti-Executable uses the Publisher name, product filename, and version details to identify the files created by a Publisher.
Stealth Mode
Stealth Mode is a group of options that control visual indication of a Service presence on a system. Stealth Mode provides the option to the Administrator to hide the Service icon in the Windows system tray, and prevent the Alert from being displayed.
Unauthorized Executable
An Unauthorized executable is one that is not allowed to run by Anti-Executable.
Customization Code
The Customization Code is a unique identifier that encrypts the Configuration Administrator, the Enterprise Console, the computer installation files, the One Time Password Generation System, and Deep Freeze Command Line Control. This code is not a password that can be used to access Deep Freeze.
Active Protection
Active Protection (AP) is a real-time method for detecting malware. AP sits quietly in the background as you work or browse the Internet, constantly monitoring files that are executed.
Adware
Adware, also known as advertising software, is often contextually or behaviorally based and tracks browsing habits in order to display third-party ads that are meant to be relevant to the user. The ads can take several forms, including pop-ups, pop-unders, banners, or links embedded within web pages or parts of the Windows interface. Some adware advertising might consist of text ads shown within the application itself or within side bars, search bars, and search results.
Email Protection
Email Protection is a behind-the-scenes tool that protects your computer from potentially harmful inbound and outbound email messages. As long as you have email protection enabled, your computer is protected with automatic email scanning of all attachments for malware and viruses without you having to do anything.
Firewall
A Firewall provides bi-directional protection, protecting you from both incoming and outgoing traffic. A Firewall protects your network from unauthorized intrusion.
Quarantine
The Quarantine is a safe place on your computer that Faronics Anti-Virus uses to store malware or infected files that could not be disinfected. If your computer or files on your computer are not acting normal after an item has been placed here, you have the opportunity to review the details of a risk and research it further and remove it from Quarantine, restoring it back to your computer in its original location. You can also permanently remove the risks from Quarantine.
Rogue security program
A rogue security program is software of unknown or questionable origin, or doubtful value. A rogue security program usually shows up on web sites or spam emails as intrusive warnings that claim that your computer is infected and offer to scan and clean it. These should never be trusted. Reputable anti-virus or anti-spyware companies will never use this way of notifying you. A rogue security program may appear like an ordinary anti-virus or anti-malware program, but will instead attempt to dupe or badger you into purchasing the program. While some rogue security programs are the equivalent to snake oil salesman resulting in no good, others may actually result in harm by installing malware or even stealing the credit information that you enter and possibly resulting in identity theft. Further, you need to be cautious about closing or deleting these alerts, even when you know they're fake.
Rootkits
A rootkit is software that cloaks the presence of files and data to evade detection, while allowing an attacker to take control of the machine without the user's knowledge. Rootkits are typically used by malware including viruses, spyware, trojans, and backdoors, to conceal themselves from the user and malware detection software such as anti-virus and anti-spyware applications. Rootkits are also used by some adware applications and DRM (Digital Rights Management) programs to thwart the removal of that unwanted software by users.
Spyware
Spyware is software that transmits information to a third party without notifying you. It is also referred to as trackware, hijackware, scumware, snoopware, and thiefware. Some privacy advocates even call legitimate access control, filtering, Internet monitoring, password recovery, security, and surveillance software spyware because those could be used without notifying you.
Trojan
A trojan is installed under false or deceptive pretenses and often without the user's full knowledge and consent. In other words, what may appear to be completely harmless to a user is in fact harmful by containing malicious code. Most trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.
Virus
A computer virus is a piece of malicious code that has the ability to replicate itself and invade other programs or files in order to spread within the infected machine. Viruses typically spread when users execute infected files or load infected media, especially removable media such as CD-ROMs or flash drives. Viruses can also spread via email through infected attachments and files. Most viruses include a payload that can be anywhere from annoying and disruptive to harmful and damaging; viruses can cause system damage, loss of valuable data, or can be used to install other malware.
Worm
A worm is a malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some worms may be used to compromise infected machines and download additional malicious software.
Inactivity Definitions
The definition of what makes a computer inactive: keyboard and mouse inactivity and one of the following parameters:
Disk Utilization – user-defined measurement of disk (hard drive) utilization; if the disk utilization is lower than this defined level, the computer is considered inactive and power saving actions will occur.
CPU utilization – user-defined measurement of CPU utilization; if the CPU utilization is lower than this defined level, the computer is considered inactive and power saving actions will occur.
Network activity – user-defined measurement of network activity; if the network activity is lower than this defined level, the computer is considered inactive and power saving actions will occur.
Applications running – user-defined list of applications; if no application from a user defined list is running, the computer is considered inactive and power saving actions will occur.
Inactivity Timeout Actions
Actions that Power Save can perform when a computer becomes inactive, which are:
Turn off monitor
Standby – a mode in which the operating system is suspended and stored in memory before shut down.
Hibernate – a mode in which the operating system is suspended by storing memory on the hard disk before powering down
Shut down
Local Wakeup
Computers in Standby or Hibernate mode can be locally woken up by the Local Wakeup feature without using Wake-on-LAN technology (or without a network connection).
Power Schedule
A Power Schedule consists of:
Inactivity Timeout Actions – defines whether Power Save must turn off monitors, hard disks and shut down the computer after a pre-defined interval.
Inactivity Definitions – defines whether Power Save must manage power on the computer when the hard disk, CPU or network activities are below the specified levels.
Schedule when the Inactivity Timeout Actions will occur.
Stay Awake
Ensures that Power Save does not manage power on the computer for the specified duration.
Wake-on-LAN
A hardware enabled feature that allows remote activation of the computer.