The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.
A set of configurable tables that let you describe the assets and resources of your network. You populate the lookup tables with information that is used to determine incident severity, for example, specifying the systems that host critical or sensitive information, and the systems that require high availability. For example, the IP Watch List and the Trojan Horses table are two types of lookup tables.
Follow us for all the latest news, tips and updates.