This article defines the terms commonly used within Sophos and the IT industry.
Sophos Threatsaurus can be downloaded here. This is a guide for computer and data security threats.
The following sections are covered:
Applies to the following Sophos products and versions
Not product specific
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Second lowest level of bug severity (3). Annoying is when:
Back to the top of the page
Second highest level of bug severity (2). Painful is when:
Lowest level of bug severity (4). Polish is when:
A quick, frequent (typically daily) meeting between pod members that asks each individual:
Highest level of bug severity. Unusable is when:
If you've spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article. This is invaluable to us to ensure that we continually strive to give our customers the best information possible.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.