CounterSpy Enterprise.CounterSpy Enterprise was designed to make it painless pain·less
Free from complication or pain: a painless operation.
painless·ly adv. for IT managers to rid their company of spyware Software that sends information about your Web surfing habits to its Web site. Often quickly installed in your computer in combination with a free download you selected from the Web, spyware transmits information in the background as you move around the Web. , combining next-generation system management architecture with a powerful spyware scanning and remediation engine.' Designed 'by admins for admins', CounterSpy Enterprise has been built from the ground up for real-world enterprise spyware remedy and is a true enterprise-class product that provides for scalability, multiple methods of agent deployment, policy-based management See policy management. and customisable reporting.
CounterSpy Enterprise's central management console A terminal or workstation used to monitor and control a network. See Microsoft Management Console. allows administrators to access and control agent deployment, threat database updates, quarantine quarantine (kwŏr`əntēn), isolation of persons, animals, places, and effects that carry or are suspected of harboring communicable disease. spyware, configuration, agent policies, scan scheduling and recommend actions to identified spyware threats. Deployment throughout an organisation is seamless featuring an intuitive policy-based user interface with multiple methods to deploy transparently.
CounterSpy Enterprise'-s agent scanning engine automatically scans users' systems for spyware threats. Agents report on spyware to the central server, providing information about the spyware, assigning as·sign
tr.v. as·signed, as·sign·ing, as·signs
1. To set apart for a particular purpose; designate: assigned a day for the inspection.
2. a threat level and allowing the administrator one of four recommended actions: Ignore, Report Only Quarantine' or 'Delete.
Default actions can also be set to automatically address any spyware found based on spyware category as determined by the administrator. The scanning engine utilises a robust threat signature database that includes constantly updated spyware threats from Sunbelt's spyware research team, as well as input from Sunbelt's Spyware Fighters Network a world wide network of users who report on spyware outbreaks