HTTP > Advanced Threat Protection > Policies | Policy List | Spyware/Grayware Scan
               Rule
            Spyware, phish, and other so-called grayware threats are beginning to surpass viruses,
               Trojans and worms in terms of prevalence and risk level. IWSVA can help enforce your
               right to prevent unwanted or unauthorized software from entering your network. In
               addition, you can break down your "virus" reports by threat type, and IWSVA can take
               different actions according to the threat type.
            The following is a list of related topics:
            
               - 
                  
                  Spyware—High prevalence. 
                     
                     Spyware is software that can monitor a user’s computing habits and personal information,
                        such as credit card numbers and passwords. Spyware can track a user's keystrokes and
                        send this information back to the author without the user’s authorization or knowledge.
                        Not all spyware is that pernicious, however. Web browser cookies that track Web hits
                        for targeted marketing, are also considered spyware. 
 
- 
                  
                  Dialers—Low to medium prevalence. 
                     
                     Dialers, or "phone home" programs, are Trojans. Upon execution, a dialer tries to
                        connect the system to a pay-per-call location without the user's knowledge or consent.
                        Dialers often arrive in porn-related or other enticing service-related applications,
                        and can run up large phone bills for the victim. 
 
- 
                  
                  Hacking tools—Low prevalence. 
                     
                     Hacking tools include programs that can be used by IT administrators to test their
                        network's vulnerability or their susceptibility to attacks. Whereas in this context,
                        these programs are legitimate; they can be downloaded from rouge sites by users who
                        want to use the powerful programs for malicious purposes. 
 
- 
                  
                  Password cracking applications—Low prevalence. 
                     
                     Like hacking tools, password crackers are malicious tools designed to seek out weak
                        passwords, generally poor security, or to mine valuable data. In the context of IT use, these programs are usually considered legitimate. In the
                        wrong hands, however, they can create significant security concerns. 
 
- 
                  
                  Adware—High prevalence. 
                     
                     Adware is a software application that displays advertising banners while the program
                        is running. Adware often contains spyware for the program to establish which advertisements
                        to display based on the user’s Web surfing habits. 
 
- 
                  
                  Joke programs—Low prevalence. 
                     
                     Joke programs are ordinary executable programs, often written for the amusement of
                        the recipient. Network administrators do not want joke programs to enter their systems,
                        because these programs take up precious network bandwidth and might affect employee
                        work performance. 
 
- 
                  
                  Remote access tools—Low prevalence. 
                     
                     This class of software enables the user to gain remote access to network clients or
                        even servers. After access is gained, the user is often able to perform a variety
                        of computing tasks, including complete control of the system. Like other programs
                        of this type, these have the potential for both legitimate and illegitimate use. 
 
- 
                  
                  Others—Low prevalence. 
                     
                     This is used as an umbrella category to include newly emerging threats that do not
                        fit into any of the existing categories. In other words, it is simply a catch-all
                        for a variety of unique or undefinable threats.