Cabinet file. A single cabinet file that stores multiple compressed files. These files are commonly used in software installation and to reduce the file size and the associated download time for Web content.
A file format that is used for the storage of public key certificates.
See also: certificate; public keyThe file name extension for files that contain device information or scripts to control hardware operations.
See also: deviceA service that is part of Microsoft .NET Framework. .NET Passport includes a passport authentication protocol, and it provides the ability to map passport IDs to Active Directory accounts.
See also: Active Directory; authentication; passport authentication; serviceA file format that is used for the storage of public key certificates and their associated private keys.
See also: certificate; private key; public keyAn Institute of Electrical and Electronic Engineers (IEEE) standard for port-based network access control that provides authenticated network access to Ethernet networks and wireless 802.11 local area networks (LANs).
See also: access control; authentication; local area network (LAN); port; port based network access controlA resource record used to map a DNS domain name to a host Internet Protocol version 6 (IPv6) address on the network.
See also: domain name; Domain Name System (DNS); IP address; resource record (RR)A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object.
See also: group; object; permission; registry; serviceAn entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
See also: access control; access control list (ACL); discretionary access control list (DACL); object; permission; security descriptor; system access control list (SACL)A list of security protections that apply to an entire object, a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system.
See also: access control entry (ACE); discretionary access control list (DACL); object; security descriptor; system access control list (SACL)A phone number that subscribers can dial to reach online services.
A data structure that contains the security identifier (SID) for a security principal, SIDs for the groups that the security principal belongs to, and a list of the security principal's privileges (also called user rights) on the local computer.
See also: privilege; security ID (SID); security principalA Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on.
See also: policy; user accountIn auditing, a group of events that are logged when a user logs on to a computer that uses another computer to validate the user account. Events in this event category are logged on the computer that validates the user account.
See also: auditing; event; user accountIn auditing, a group of events that are logged when user or group account information is modified.
See also: auditing; event; group account; user accountA message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed.
See also: hostFor Message Queuing, a message class that indicates that a message arrived or was retrieved by the target application (a positive acknowledgment), or that an error occurred before the original message could be retrieved (a negative acknowledgment). These messages are sent to administration queues on the source computer.
See also: administration queue; Message QueuingDescribes the window or icon that you are currently using or that is currently selected. The operating system always applies the next keystroke or command you choose to the active window. Windows or icons on the desktop that are not selected are inactive.
An application programming interface (API) built into a variety of Windows operating systems, including Windows 2000, Windows XP, and products in the Windows Server 2003 family. Active Accessibility allows an accessibility aid (or other Active Accessibility client) to collect meaningful information from an application's user interface and convey that information to the user. For example, Microsoft Active Accessibility allows a screen reader to convey to the user that an application is displaying a pop-up message asking whether to save or discard file changes. Because Active Accessibility reduces the need for application-specific code, it reduces overall maintenance costs and allows software developers to innovate in their user interface without sacrificing compatibility with accessibility aids.
See also: application programming interface (API)A feature in Microsoft Internet Security and Acceleration (ISA) Server that retrieves files for Web pages that are accessed frequently.
See also: cachingDynamic content, such as a stock ticker, a weather map, or news, that is usually updated from the World Wide Web or a channel.
See also: channelThe Windows-based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
See also: directory partition; directory service; domain; forest; object; replicationThe tool that is used to install and remove Active Directory.
See also: Active DirectoryThe synchronization of Active Directory partition replicas between domain controllers. Replication automatically copies the changes that originate on a writable directory partition replica to all other domain controllers that hold the same directory partition replica. More specifically, a destination domain controller pulls these changes from the source domain controller.
See also: Active Directory; domain controller; global catalog; replica; replicationA directory service model and a set of Component Object Model (COM) interfaces. ADSI enables Windows applications and Active Directory clients to access several network directory services, including Active Directory. ADSI is supplied as a software development kit (SDK).
See also: Active Directory; Component Object Model (COM); directory serviceAn administrative tool used by an administrator to perform day-to-day Active Directory administration tasks. The tasks that can be performed with this tool include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. Examples of objects in Active Directory are organizational units, users, contacts, groups, computers, printers, and shared file objects.
See also: Active Directory; object; permissionA primary Domain Name System (DNS) zone that is stored in Active Directory so that it can use multimaster replication and Active Directory security features.
See also: Active Directory; Domain Name System (DNS); multimaster replication; primary zoneA partition from which an x86-based computer starts up. The active partition must be a primary partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system volume.
See also: basic disk; primary partition; system partition; system volume; x86The volume from which the computer starts up. The active volume must be a simple volume on a dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can upgrade a basic disk containing the active partition to a dynamic disk. After the disk is upgraded to dynamic, the partition becomes a simple volume that is active.
See also: active partition; basic disk; dynamic disk; dynamic volume; simple volumeA set of technologies that allows software components to interact with one another in a networked environment, regardless of the language in which the components were created.
See also: ActiveX componentA reusable software component that can be used to incorporate ActiveX technology.
See also: ActiveXA unique identifier that identifies a network node to other nodes on the network. Also known as the net address or MAC address.
See also: media access control (MAC) address; nodeA resource record (RR) used to map a DNS domain name to a host Internet Protocol version 4 (IPv4) address on the network.
See also: domain name; Domain Name System (DNS); IP address; resource record (RR)A predefined grouping of Internet addresses that defines a network of a certain size. The range of numbers that can be assigned for the first octet in the IP address is based on the address class. Class-based IP addressing has been superceded by Classless Interdomain Routing (CIDR).
See also: Class A IP address; Class B IP address; Class C IP address; Classless Interdomain Routing (CIDR)The addresses within a DHCP scope range of addresses that are available for leased distribution to clients.
See also: address; Dynamic Host Configuration Protocol (DHCP); lease; scopeIn TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC) layer address.
In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addresses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses.
See also: asynchronous transfer mode (ATM); classical IP over ATM (CLIP); Internet Protocol (IP); IP address; LAN emulation (LANE); media access control (MAC) address; Message Authentication Code (MAC); packet; Transmission Control Protocol/Internet Protocol (TCP/IP)A set of application programming interfaces (APIs) developed by Microsoft that allows software developers to create applications that use up to 64 GB of physical nonpaged memory in a 32-bit virtual address space on 32-bit platforms. This technology allows for windowed views to this physical memory from within the application's virtual address space.
See also: application programming interface (API); virtual addressA relationship formed between selected neighboring Open Shortest Path First (OSPF) routers for the purpose of exchanging routing information. When the link state databases of two neighboring routers are synchronized, the routers are said to be adjacent. Not every pair of neighboring routers becomes adjacent.
See also: link state database; Open Shortest Path First (OSPF); routerFor Message Queuing, a queue that stores acknowledgment messages.
See also: acknowledgment message; Message Queuing; queueAlerts that relate to server and resource use. They notify users about problems in areas such as security and access, user sessions, server shutdown due to power loss (when an uninterruptible power supply (UPS) is available), directory replication, and printing. When a computer generates an administrative alert, a message is sent to a predefined list of users and computers.
See also: Alerter service; uninterruptible power supply (UPS)Logon information that is used to identify a member of an administrative group. Groups that use administrative credentials include Administrators, Domain Admins, and DNS Admins. Most system-wide or domain-wide tasks require administrative credentials.
See also: Administrators group; groupIn the Windows Server 2003 family, a person who is responsible for setting up and managing local computers, stand-alone servers, member servers, or domain controllers. An administrator sets up user and group accounts, assigns passwords and permissions, and helps users with networking problems. Administrators can be members of the Administrators group on local computers or servers. A person who is a member of the Administrators group on a local computer or server has full access to that computer or server and can assign access control rights to users as necessary.
Administrators can also be members of the Domain Admins group on domain controllers and have full control over user and computer accounts residing in that domain.
See also: access control; computer account; domain; domain controller; group account; member server; network administrator; stand-alone server; user accountOn a local computer, the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. By default, this account has the highest level of administrative access to the local computer, and it is a member of the Administrators group.
In an Active Directory domain, the first account that is created when you set up a new domain by using the Active Directory Installation Wizard. By default, this account has the highest level of administrative access in a domain, and it is a member of the Administrators, Domain Admins, Domain Users, Enterprise Admins, Group Policy Creator Owners, and Schema Admins groups.
See also: Active Directory; Administrators group; local computer; member server; stand-alone server; user accountOn a local computer, a group whose members have the highest level of administrative access to the local computer. Examples of administrative tasks that can be performed by members of this group include installing programs; accessing all files on the computer; auditing access control; and creating, modifying, and deleting local user accounts.
In an Active Directory domain, a group whose members have the highest level of administrative access in the domain. Examples of administrative tasks that can be performed by members of this group include setting domain policy; assigning and resetting domain user account passwords; setting up and managing domain controllers; and creating, modifying, and deleting domain user accounts.
See also: access control; Active Directory; auditing; domain; domain controller; group; local computer; object; user accountAn open industry specification that defines power management on a wide range of mobile, desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play.
See also: Plug and PlayFor Network Load Balancing, the method used to associate client requests to cluster hosts. When no affinity is specified, all network requests are load balanced across the cluster without respect to their source. Affinity is implemented by directing all client requests from the same IP address to the same cluster host.
See also: client request; IP address; Network Load BalancingAn application that runs on a Simple Network Management Protocol (SNMP) managed device. The agent application is the object of management activities. A computer running SNMP agent software is also sometimes referred to as an agent.
See also: Simple Network Management Protocol (SNMP)A service used by the server and other services to notify selected users and computers of administrative alerts that occur on a computer. The Alerter service requires the Messenger service.
See also: administrative alerts; Messenger service; serviceIn cryptography, a mathematical process that is used in cryptographic operations such as the encryption and digital signing of data. An algorithm is commonly used with a cryptographic key to enhance security.
See also: encryption; public key encryption; symmetric encryptionThe smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. Also called a cluster.
See also: file system; volumeA standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols.
See also: UnicodeAn authentication mechanism by which users who are able to connect to an Internet site without credentials are assigned to the IUSR_ComputerName account and granted the access rights that are assigned to that account.
See also: access control; Anonymous authentication; authenticationAn authentication mechanism that does not require user accounts and passwords. Anonymous authentication grants remote users the identity IUSR_ComputerName. Anonymous authentication is used on the Internet to grant visitors restricted access to predefined public resources.
See also: Anonymous access; authentication; password; user accountA text file used to automate Setup or other installation processes. Using this text file, you can provide custom answers to Setup-related questions. Typically, you must point the Setup program to use the answer file at the same time Setup is started. Answer files can only be used on applications and operating systems that support them.
See also: SetupClient software that is shipped with all Macintosh computers and with Apple Computer server software. Macintosh computers can use their AppleShare client software to connect to computers running Services for Macintosh.
See also: client; serverA network control protocol defined within Point-to-Point Protocol (PPP). ATCP allows clients to connect to a Windows server by running PPP over AppleTalk. ATCP negotiates the AppleTalk parameters to use during the PPP session.
See also: Network Control Protocol; Point-to-Point Protocol (PPP)The presentation-layer protocol that manages access to remote files in an AppleTalk network.
See also: protocolThe extended AppleTalk Internet model designed by Apple Computer that supports multiple zones within a network and extended addressing capacity.
See also: zoneThe set of network protocols on which AppleTalk network architecture is based. The AppleTalk Protocol is installed with Services for Macintosh to help users access resources on a network.
See also: protocol; resourceThe layer of AppleTalk Phase 2 protocols that delivers data to its destination on the network.
See also: AppleTalk Phase 2A process that uses Software Installation (an extension of Group Policy) to assign programs to groups of users. The programs appear on the users' desktop when they log on.
See also: Group PolicyAn Active Directory directory partition that stores application-specific data that can be dynamic (subject to Time to Live restrictions). Application directory partitions can store any type of object except security principals and are not replicated to the global catalog. The replication scope of an application directory partition can be configured to include any set of domain controllers in the forest.
See also: Active Directory; directory partition; Time to Live (TTL)A feature of Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition. Application memory tuning can be enabled on computers with between 2 gigabytes (GB) and 4 GB of physical RAM, and it allows applications running on these computers to address 3 GB of virtual memory instead of the 2 GB normally allocated to each application process. Also known as 4-gigabyte tuning (4GT).
See also: virtual memoryA set of routines that an application uses to request and carry out lower-level services performed by a computer's operating system. These routines usually carry out maintenance tasks such as managing files and displaying information.
A router that is attached to multiple areas. ABRs maintain separate topological databases for each area.
See also: topological databaseA form of data transmission in which information is sent and received at irregular intervals, one character at a time. Because data is received at irregular intervals, the receiving modem must be signaled to let it know when the data bits of a character begin and end. This is done by means of start and stop bits.
See also: modem (modulator/demodulator)A high-speed, connection-oriented protocol used to transport many different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between logical connections on a network.
See also: protocolThe layer of the asynchronous transfer mode (ATM) protocol stack that parses data into the payload portion of the ATM cell for transport across an ATM network.
See also: asynchronous transfer mode (ATM)For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up), compressed, or encrypted, and whether the file contents should be indexed for fast file searching.
In Active Directory, a property of an object. For each object class, the schema defines which attributes an instance of the class must have and which additional attributes it might have.
See also: Active Directory; class; object; object class; schemaData that is recorded in the event log when specified system, application, and security-related events take place. Audit entries provide valuable data about system operations that can be used to identify system use and to diagnose system behavior.
See also: auditing; eventEnhanced logging capabilities that monitor and manage the growth and size of log files used by DHCP on an ongoing daily basis.
See also: Dynamic Host Configuration Protocol (DHCP)Policy that determines the security events to be reported to the network administrator.
See also: policy; securityThe process that tracks the activities of users by recording selected types of events in the security log of a server or a workstation.
See also: security logThe process for verifying that an entity or object is who or what it claims to be. Examples include confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of a user or computer.
See also: cryptography; Kerberos V5 authentication protocol; nonrepudiation; NTLM authentication protocol; smart card; trust relationshipA header that provides authentication, integrity, and anti-replay for the entire packet (the Internet Protocol (IP) header and the data payload carried in the packet).
See also: authentication; Internet Protocol (IP); packetThe protocol by which an entity on a network proves its identity to a remote entity. Typically, identity is proved with the use of a secret key, such as a password, or with a stronger key, such as the key on a smart card. Some authentication protocols also implement mechanisms to share keys between client and server to provide message integrity or privacy.
See also: authentication; identity; Kerberos V5 authentication protocol; key; NTLM authentication protocol; protocol; smart cardDescribes a DNS server that hosts a primary or secondary copy of a DNS zone.
See also: authoritative restore; DNS server; Domain Name System (DNS); resource record (RR); zoneIn Backup, a type of restore operation performed on an Active Directory domain controller in which the objects in the restored directory are treated as authoritative, replacing (through replication) all existing copies of those objects.
See also: Active Directory; domain controller; nonauthoritative restore; object; replicationThe process that determines what a user is permitted to do on a computer system or network.
See also: authenticationA database that stores Authorization Manager policy.
The process of adding static routes to the routing table automatically. When you configure an interface to use auto-static update mode, the router sends a request to other routers and inherits routes. The routes are saved in the routing table as auto-static routes and are kept even if the router is restarted or the interface goes down. Auto-static updates are supported in Routing Information Protocol (RIP) for Internet Protocol (IP) and in RIP for Internetwork Packet Exchange (IPX), but they are not available for use with Open Shortest Path First (OSPF).
See also: Open Shortest Path First (OSPF); routing; Routing Information Protocol over IPX (RIPX); static routesA tape or disk library with an automatic mechanism, such as a robotic arm, that loads and unloads media into a drive or drives without manual intervention from the user. Automated libraries are sometimes known as autoloaders, changers, jukeboxes, media changers, and robotic libraries.
A feature that helps you recover a system that will not start. To use Automated System Recovery, you must first use the Automated System Recovery Preparation Wizard (part of Backup). This wizard backs up the partition used by the operating system, but it does not back up other partitions, such as program or data partitions. Those partitions must be backed up using Backup or other standard routines.
See also: partitionThe replication of files and directories between computers as performed automatically by the File Replication service (FRS). In a domain distributed file system, FRS provides automatic file and directory replication between targets. The user configures automatic replication through the DFS administration tool. Files in a stand-alone distributed file system must be replicated between targets manually or by using other utilities.
See also: Distributed File System (DFS); domain DFS; File Replication service (FRS); replicationA TCP/IP feature in Windows XP and products in the Windows Server 2003 family that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for dynamic addressing and a DHCP server is not available. The APIPA range of IP addresses is reserved by the Internet Assigned Numbers Authority (IANA), and IP addresses within this range are not used on the Internet.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); IP address; Transmission Control Protocol/Internet Protocol (TCP/IP)A group of routers exchanging routing information by using a common routing protocol.
See also: autonomous system boundary router (ASBR); routerA router that exchanges routing information with routers that belong to other autonomous systems. The ASBR then advertises external routes throughout the autonomous system. ASBRs can be internal or area border routers, and they might or might not be connected to the backbone.
See also: area border router (ABR); autonomous system (AS); backbone; routerA level of service provided by applications, services, or systems. Highly available systems have minimal downtime, whether planned or unplanned. Availability is often expressed as the percentage of time that a service or system is available, for example, 99.9 percent for a service that is down for 8.75 hours a year.
An asynchronous transfer mode (ATM) service type that supports available-bit-rate traffic, minimum guaranteed transmission rate, and peak data rates. ABR also allows bandwidth allocation depending on availability, and it uses flow control to communicate bandwidth availability to the end node.
See also: asynchronous transfer mode (ATM); bandwidth; nodeA single channel of an Integrated Services Digital Network (ISDN) line that is used to carry either voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 23 B-channels. Also called bearer channel.
See also: Integrated Services Digital Network (ISDN)In Open Shortest Path First (OSPF), an area common to all other OSPF areas that is used as the transit area for inter-area traffic and for distributing routing information between areas. The backbone must be contiguous.
See also: Open Shortest Path First (OSPF)In Open Shortest Path First (OSPF), a router that is connected to the backbone area. This includes routers that are connected to more than one area (area border routers (ABRs)). However, backbone routers do not have to be ABRs. Routers that have all networks connected to the backbone are internal routers.
See also: area border router (ABR); backbone; Open Shortest Path First (OSPF); routerA program that runs while the user is working on another task. The computer's microprocessor assigns fewer resources to background programs than foreground programs.
See also: foreground programA duplicate copy of a program, a disk, or data, made either for archiving purposes or for safeguarding valuable files from loss in case the active copy is damaged or destroyed. Some application programs automatically make backup copies of data files, maintaining both the current version and the preceding version.
A domain controller running Windows NT Server 4.0 or earlier that receives a read-only copy of the directory database for the domain. The directory database contains all account and security policy information for the domain.
See also: Active Directory; mixed mode; primary domain controller (PDC)A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library.
See also: library; media pool; Removable StorageA type of local or global group that contains the user rights you need to back up and restore files and folders. Members of the Backup Operators group can back up and restore files and folders regardless of ownership, permissions, encryption, or auditing settings.
See also: auditing; global group; local group; user rightsA collection of files, folders, and other data that has been backed up and stored in a file or on one or more tapes.
See also: backup set catalog; on-disk catalog; on-media catalogA summary of the files and folders that have been saved in a backup set.
See also: backup setA type that determines which data is backed up and how it is backed up. There are five backup types: copy, daily, differential, incremental, and normal.
See also: copy backup; daily backup; differential backup; incremental backup; normal backupThe data transfer capacity of a transmission medium.
In digital communications, the transfer capacity expressed in bits per second (bps) or megabits per second (Mbps). For example, Ethernet accommodates a bandwidth of 10,000,000 bps or 10 Mbps.
In analog communications, the difference between the highest and lowest frequencies in a specific range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies that it can carry.
See also: bits per second (bps)A Point-to-Point Protocol (PPP) control protocol that is used on a multiprocessing connection to dynamically add and remove links.
See also: Point-to-Point Protocol (PPP)A precedence ranking that determines the order in which the threads of a process are scheduled for the processor. Use Task Manager to view and change base priorities.
For Message Queuing, a property that specifies the queue's priority in a public queue. You can set the base priority from -32,768 to 32,767; the default priority is 0. Private queues do not support base priority. Message Queuing routes and delivers messages first by base priority, then by message priority.
See also: Message Queuing; private queue; public queueAn authentication mechanism that is supported by most browsers, including Internet Explorer. Basic authentication encodes user name and password data before transmitting it over the network. Note that encoding is not the same as encryption. Also known as plaintext authentication.
See also: Anonymous authentication; authentication; Digest authentication; encryption; password; user nameA physical disk that can be accessed by
On x86-based computers, the set of essential software routines that test hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS is usually invisible to computer users.
See also: Extensible Firmware Interface (EFI); read-only memory (ROM); x86A storage method in MS-DOS and Windows for primary partitions, extended partitions, and logical drives.
See also: dynamic storage; extended partition; logical driveA primary partition or logical drive that resides on a basic disk.
See also: basic disk; logical drive; primary partitionAn ASCII (unformatted text) file that contains one or more operating system commands. A batch program's file name has a .cmd or .bat extension. When you type the file name at the command prompt, or when the batch program is run from another program, its commands are processed sequentially. Also called batch files.
See also: American Standard Code for Information Interchange (ASCII); logon scriptThe speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.
See also: bits per second (bps); modem (modulator/demodulator)An implementation of Domain Name System (DNS) written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software.
See also: BIND boot file; Domain Name System (DNS)A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
A configuration file used by DNS servers running under versions of the Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text file, Named.boot, where individual lines in the file list boot directives used to start a service when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters stored in the registry, but they allow the use of a BIND boot file as an alternative for reading boot configuration settings.
See also: Berkeley Internet Name Domain (BIND); DNS server; registry bootA database in Novell NetWare 3.x that contains organizational and security information about users and groups.
A process by which software components and layers are linked together. When a network component is installed, the binding relationships and dependencies for the components are established. Binding allows components to communicate with each other.
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Also known as a binary digit.
See also: binaryThe number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.
See also: modem (modulator/demodulator)A password that does not contain any characters. Also called a null password.
See also: password policy; strong password; weak passwordIn Group Policy, the method of preventing a child container from inheriting the policy settings from all parent containers. Block inheritance does not apply to Group Policy object (GPO) links that are enforced.
See also: Enforce; Group Policy Management console (GPMC); Group Policy object link; inheritance; precedenceThe process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the computer runs the software that loads and starts the computer's operating system, which prepares it for use.
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.
See also: partition boot sectorA service that runs on a Remote Installation Services (RIS) server that acts on client boot requests. The display name of BINLSVC is Remote Installation.
See also: Remote Installation Services (RIS)A process in which a computer that is starting (booting) creates a log file that records the loading of each device and service. The log file is called Ntbtlog.txt, and it is saved in the systemroot directory.
See also: systemrootThe partition that contains the Windows operating system and its support files. The boot partition can be, but does not have to be, the same as the system partition.
See also: partition; Primary disk; system partitionThe volume that contains the Windows operating system and its support files. The boot volume can be, but does not have to be, the same as the system volume.
See also: system volume; volumeA CD-ROM that can be used to start a computer. An automated installation uses a bootable CD to start a computer.
A set of optional information types defined originally in RFC 1497 for use with BOOTP service and later supported by DHCP. In DHCP, these extensions form the legacy core set of client parameters available and supported by most standard DHCP and BOOTP servers.
See also: bootstrap protocol (BOOTP); Dynamic Host Configuration Protocol (DHCP); Request for Comments (RFC)A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service.
See also: Dynamic Host Configuration Protocol (DHCP); Request for Comments (RFC); Transmission Control Protocol/Internet Protocol (TCP/IP)A routing protocol designed for use between autonomous systems. BGP is especially useful for detecting routing loops.
See also: autonomous system (AS); routing; routing protocolIn Active Directory replication, a single server in a site that is designated to perform site-to-site replication for a specific domain and transport.
In a messaging system, a server that receives and forwards e-mail traffic at each end of a connection agreement, similar to the task a gateway performs.
See also: Active Directory; Active Directory replication; gateway; replication; siteAn International Telecommunication Union - Telecommunication [Standardization Sector]
The transmission of packets by an Internet Protocol version 4 (IPv4) host to all computers on the subnet.
See also: broadcast address; Internet Protocol (IP); packet; subnetAn Internet Protocol version 4 (IPv4) address that is destined for all hosts on a particular network segment.
See also: broadcast; host; Internet Protocol (IP); IP addressA multicast service on an emulated local area network (ELAN) that forwards broadcast, multicast, and initial unicast data traffic sent by a LAN emulation client (LEC).
See also: emulated local area network (ELAN); LAN emulation client (LEC); serviceA network message sent from a single computer that is distributed to all other devices on the same segment of the network as the sending computer.
A network that supports more than two attached routers and has the ability to address a single physical message to all of the attached routers (broadcast). Ethernet is an example of a broadcast network.
See also: routerThe process of creating and maintaining an up-to-date list of computers and resources on a network or part of a network by one or more designated computers running the Computer Browser service.
See also: Computer Browser serviceA region of random access memory (RAM) reserved for use with data that is temporarily held while waiting to be transferred between two locations, such as between an application's data area and an input/output device.
See also: random access memory (RAM)The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For example, members of the built-in Backup Operators group can back up and restore files and folders. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
See also: groupA communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.
See also: expansion slot; universal serial bus (USB)A special memory subsystem in which frequently used data values are duplicated for quick access.
See also: cache file; file system cacheA file used by DNS servers and clients to store responses to DNS queries. For Windows DNS servers, the cache file is named Cache.dns by default.
See also: authoritative; cache; DNS client; DNS server; Domain Name System (DNS)The process of temporarily storing recently accessed information in a special memory subsystem for quicker access.
See also: cache; caching resolverA program that extracts information from DNS servers in response to client requests.
See also: cache; cache file; caching; DNS serverA DNS sever that does not host any DNS zones but that performs name resolution and stores the results in its cache.
See also: caching; DNS server; DNS zone; name resolutionThe Network Control Protocol that negotiates the use of callback over PPP links.
See also: Point-to-Point Protocol (PPP)The number that a remote access server uses to call back a user. This number can be preset by the administrator or specified by the user at the time of each call, depending on how the administrator configures the user's callback options. The callback number should be the number of the phone line to which the user's modem is connected.
See also: preset-to callback; remote access server; set-by-caller callbackA form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated.
See also: preset-to callback; remote access serverA string that specifies the called subscriber ID transmitted by the receiving fax machine when receiving an inbound fax. This string is usually a combination of the fax or telephone number and the name of the business. It is often the same as the transmitter subscriber ID.
See also: string; transmitting station ID (TSID) stringA resource record used to map an alternate alias name to a primary canonical DNS domain name used in the zone.
See also: resource record (RR)An object's distinguished name presented with the root first and without the Lightweight Directory Access Protocol (LDAP) attribute tags (such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For example,
CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
is presented as
microsoft.com/MyOU/MyDocuments
in canonical form.
See also: distinguished name; Lightweight Directory Access Protocol (LDAP)To assign a port to a printer. Documents that you print are sent to the printer through the captured port.
For Network Monitor, the process by which frames are copied.
See also: frameA password that allows the user to capture statistics from the network and to display captured data.
See also: display password; passwordA set of conditions that, when met, stop the capture or execute a program or command file to perform another type of action related to the capture.
A 32-bit PC Card.
A font contained in a plug-in cartridge and used to add fonts to laser, ink-jet, or high-end dot-matrix printers. Cartridge fonts are distinguished both from internal fonts, which are contained in read-only memory (ROM) in the printer and are always available, and from downloadable (soft) fonts, which reside on disk and which can be sent to the printer as needed.
See also: downloadable fonts; font; font cartridge; read-only memory (ROM)A network configuration in which hubs are connected to other hubs.
See also: hubFor Indexing Service, a collection of all index information and stored properties for a particular group of file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.
See also: Indexing Service; propertyA digital document that is commonly used for authentication and to secure information on open networks. A certificate securely binds a public key to the entity that holds the corresponding private key. Certificates are digitally signed by the issuing certification authority (CA), and they can be issued for a user, a computer, or a service.
See also: certification authority (CA); private key; public keyA document maintained and published by a certification authority that lists certificates that have been revoked.
See also: certificate; certification authority (CA)A software service that issues certificates for a particular certification authority (CA). It provides customizable services for issuing and managing certificates for the enterprise. Certificates can be used to provide authentication support, including secure e-mail, Web-based authentication, and smart-card authentication.
See also: authentication; certificate; certification authority (CA); Internet Authentication Service (IAS); serviceA permanent storage where certificates, certificate revocation lists, and certificate trust lists are stored.
See also: certificate; certificate revocation list (CRL); certificate trust list (CTL)A Windows construct that specifies the format and content of certificates based on their intended usage. When requesting a certificate from a Windows enterprise certification authority (CA), certificate requestors can select from a variety of certificate types that are based on certificate templates.
See also: certificate; certification authority (CA)A signed list of root certification authority certificates that an administrator considers reputable for designated purposes, such as client authentication or secure e-mail.
See also: certificate; certification authority (CA); root certificateAn entity responsible for establishing and vouching for the authenticity of public keys belonging to subjects (usually users or computers) or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation.
See also: certificate; public key; root certification authorityA model of trust for certificates in which certification paths are created by means of the establishment of parent-child relationships between certification authorities.
See also: certification authority (CA); certification pathAn unbroken chain of trust, consisting of certificates from trusted certification authorities, from a specific certificate to the root certification authority in a certification hierarchy.
See also: certificate; certification authority (CA); certification hierarchy; public keyA challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response.
See also: MD5; message digest; Point-to-Point Protocol (PPP)A feature that tracks changes to NTFS volumes, including additions, deletions, and modifications. The change journal exists on the volume as a sparse file.
See also: NTFS file system; sparse file; volumeA path or link through which noncontrol information passes between two devices. A single Basic Rate Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information between devices. This is often called a bearer channel, implying a channel that carries information.
On the Internet, a Web site designed to deliver content from the Internet to your computer, similar to subscribing to a favorite Web site.
See also: active content; B-channel; D-channelA display mode in which the monitor can display letters, numbers, and other text characters, but no graphical images or character formatting (italics, superscript, and so on).
See also: graphics modeFor DNS and Active Directory, a domain located in the namespace tree directly beneath another domain (the parent domain). For example, example.microsoft.com would be a child domain of the parent domain microsoft.com. Also known as a subdomain.
See also: Active Directory; domain; Domain Name System (DNS); parent domainAn object that resides in another object. A child object implies relation. For example, a file is a child object that resides in a folder, which is the parent object.
See also: object; parent objectThe Macintosh desk accessory with which users select the network server and printers they want to use.
A collection of files, some of which contain PostScript information. When a Macintosh computer sends a print job to a PostScript printer, the printer uses a Chooser Pack to interpret PostScript commands in the print job.
See also: PostScript; PostScript printerThe method of forming a hidden message. The cipher is used to transform a readable message called plaintext (also sometimes called cleartext) into an unreadable, scrambled, or hidden message called ciphertext. Only someone with a secret decoding key can convert the ciphertext back into its original plaintext.
See also: plaintextA technology in which a connection is established by closing a switch, for example, by dialing a telephone. This creates a circuit in which all the information transmitted over the connection follows the same route to the destination. The circuit is dedicated to the connection until it is closed.
A category of objects that share a common set of characteristics. Each object in the directory is an instance of one or more classes in the schema.
See also: object; schemaA unicast IP address that ranges from 1.0.0.1 through 127.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network. Class-based IP addressing has been superceded by Classless Interdomain Routing (CIDR).
See also: Class B IP address; Class C IP address; Classless Interdomain Routing (CIDR); IP addressA unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network. Class-based IP addressing has been superceded by Classless Interdomain Routing (CIDR).
See also: Class A IP address; Class C IP address; Classless Interdomain Routing (CIDR); IP addressSpecifies that Network Load Balancing direct multiple requests from the same TCP/IP Class C address range to the same cluster host.
See also: affinity; Network Load Balancing; single affinityA unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site. Class-based IP addressing has been superceded by Classless Interdomain Routing (CIDR).
See also: Class A IP address; Class B IP address; Classless Interdomain Routing (CIDR); IP address; Network Load Balancing; proxy serverA proposed Internet standard, described in RFC 2225, that allows Internet Protocol (IP) communication directly on the asynchronous transfer mode (ATM) layer, bypassing an additional protocol (such as Ethernet or Token Ring) in the protocol stack.
See also: asynchronous transfer mode (ATM); Internet Protocol (IP)An IP address and routing management method that allocates IP addresses in a way that reduces the number of routes stored on any individual router, while also increasing the number of available IP addresses. CIDR replaces class-based IP address allocation.
See also: IP address; routerTo turn off an option by removing the X or check mark from a check box. You clear a check box by clicking it, or by selecting it and then pressing the SPACEBAR.
Passwords that are not scrambled, thus making them more susceptible to network sniffers.
See also: password; plaintextAny computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server).
See also: serverThe ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource.
See also: client; cluster; resource; serverA Windows-based application that can display and store linked or embedded objects. For distributed applications, the application that imitates a request to a server application.
See also: server applicationA method of authentication by which the client in a client-server communication proves its identity to the server.
See also: authentication; client; identity; serverA service request from a client computer to a server computer or a cluster of server computers.
See also: client; serverA service included that allows clients to make direct connections to resources on computers running NetWare 2.x, 3.x, 4.x, or 5.x server software by using the Internetwork Packet Exchange (IPX) protocol only. This service is included with Windows XP Professional and the Windows Server 2003 family.
See also: Internetwork Packet Exchange (IPX); serviceA system service that supports ClipBook Viewer, which allows pages to be seen by remote ClipBooks.
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on clusters, which consist of one or more contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows picks defaults based on the size of the volume. These defaults are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. Also called an allocation unit.
In computer networking, a group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.
See also: availability; client; file system; scalability; volumeThe adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the cluster). This adapter is programmed with the host's cluster IP address.
See also: cluster; dedicated adapter; host; IP address; Network Load BalancingAn application that configures a cluster and its nodes, groups, and resources. Cluster Administrator can run on any member of the trusted domain regardless of whether the computer is a cluster node.
See also: cluster; Cluster.exe; node; server clusterA software component that implements the Cluster Administrator extension application programming interface (API) for allowing Cluster Administrator to configure a new resource type.
See also: application programming interface (API); cluster; Cluster AdministratorA collection of functions that are implemented by the cluster software and used by a cluster-aware client or server application, a cluster management application, or a Resource DLL. The Cluster API is used to manage the cluster, cluster objects, and the cluster database.
See also: cluster; Resource DLL; server clusterA full Internet name for the Network Load Balancing cluster (for example, cluster.microsoft.com). This name is used for the cluster as a whole and should be the same for all hosts in the cluster.
See also: affinity; Network Load Balancing; single affinityThe Network Load Balancing cluster's IP address in standard Internet dotted notation (for example, w.x.y.z). The address is a virtual IP address used to address the cluster as a whole, and it should be the IP address that maps to the full Internet name that you specify for the cluster. In a Network Load Balancing cluster, this address must be set identically for all hosts in the cluster.
See also: Network Load Balancing; Network Load Balancing clusterAn optionally enabled trace record of Cluster service events on a node. Not synonymous with quorum log.
See also: cluster; node; quorum logThe network (media access control) address for the network adapter that is to be used for handling client-to-cluster traffic in a Network Load Balancing cluster.
See also: Network Load Balancing; Network Load Balancing clusterThe essential software component that controls all aspects of server cluster operation and manages the cluster database. Each node in a server cluster runs one instance of the Cluster service.
See also: cluster; node; server clusterStorage where one or more attached disks hold data used either by server applications running on the cluster or by applications for managing the cluster. Each disk on the cluster storage is owned by only one node of the cluster. The ownership of disks moves from one node to another when the disk group fails over or moves to the other node.
See also: cluster; failover; nodeAn application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.
See also: cluster; Cluster API; cluster-unaware application; server clusterAn application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.
See also: cluster; Cluster API; cluster-aware application; nodeAn alternative to using Cluster Administrator to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.
See also: cluster; Cluster AdministratorMultidimensional color space consisting of the cyan, magenta, yellow, and black intensities that make up a given color. Commercial color printing devices generally use this system of four-color process inks.
See also: color management; color spaceThe descriptive relative distinguished name for the schema object.
See also: distinguished name; schemaA means of providing support for character sets and keyboard layouts for different countries or regions. A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to characters on the display.
Hardware that can convert audio or video signals between analog and digital forms (coder/decoder), hardware or software that can compress and uncompress audio or video data (compression/decompression), or the combination of coder/decoder and compression/decompression. Generally, a codec compresses uncompressed digital data so that the data uses less memory.
The particular range of colors that a device is able to produce. A device such as a scanner, monitor, or printer can produce a unique range of colors, which is determined by the characteristics of the device itself.
See also: color profile; rendering intentProcess of producing accurate, consistent color among a variety of input and output devices. A color management system (CMS) maps colors between devices such as scanners, monitors, and printers; transforms colors from one color space to another (for example, RGB to CMYK); and provides accurate on-screen or print previews.
See also: CMYK color space; RGB color spaceA profile that contains the data needed for translating the values of a color gamut. This data includes information about color, hue, saturation, and brightness.
See also: color gamut; hue; saturationA set of three values that defines how a color can be represented on computer devices such as monitors, scanners, and printers. For example, in the LAB color space, the terms luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B) are used; in the HVC system, the terms are hue (H), value (V), and chroma (C). Color space refers to the three-dimensional space that is defined by the respective values, such as L, A, and B.
See also: CMYK color space; color space; RGB color spaceSoftware that supports distributed applications that use Hypertext Transfer Protocol (HTTP) to communicate through Internet Information Services (IIS).
See also: Hypertext Transfer Protocol (HTTP); Internet Information Services (IIS)A window displayed on the desktop used to interface with the
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups.
See also: groupA port on a computer that allows asynchronous communication of one byte at a time. Also called a serial port.
See also: asynchronous communication; serial portOperating parameters, such as bits per second (bps) and modem type, that apply to serial ports on a computer.
See also: bits per second (bps); modem (modulator/demodulator); serial portA name that identifies groups of Simple Network Management Protocol (SNMP) hosts. This name is placed in SNMP messages that are sent between SNMP-managed devices such as servers running Windows Server 2003 and SNMP management stations. Typically, all hosts belong to Public, which is the standard name for a common community of all SNMP hosts.
See also: host; Simple Network Management Protocol (SNMP); trapA 32-bit protected-mode file system that controls access to the contents of CD-ROM drives.
An object-based programming model designed to promote software interoperability; it allows two or more applications or components to easily cooperate with one another, even if they were written by different vendors, at different times, in different programming languages, or if they are running on different computers running different operating systems. OLE technology and ActiveX are both built on top of COM.
See also: ActiveX; OLEA protocol used in the negotiation process in a Point-to-Point Protocol (PPP) connection. CCP is one type of Network Control Protocol. Network Control Protocols are used to establish and configure different network protocol parameters for Internet Protocol (IP), Internetwork Packet Exchange (IPX), and NetBIOS Extended User Interface (NetBEUI).
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); NetBIOS Extended User Interface (NetBEUI); Network Control Protocol; Point-to-Point Protocol (PPP)An account that is stored in Active Directory and that uniquely identifies a computer in a domain. A computer account uses the same name as the computer joining the domain.
See also: Active Directory; domainA service that maintains an up-to-date list of computers that share resources on your network and that supplies the list to programs that request it. The Computer Browser service is used to view a list of available network resources.
See also: resource; serviceA component you can use to view and control many aspects of the computer configuration. Computer Management combines several administration utilities into a single console tree, providing easy access to a local or remote computer's administrative properties and tools.
See also: console treeA unique name of up to 15 uppercase characters that identifies a computer to the network. The name cannot be the same as any other computer or domain name in the network.
See also: domain nameFor Message Queuing, the storage size limit for messages on a computer, based on the total size of the messages. When a computer quota is reached, Message Queuing can no longer send messages to that computer until one or more messages are removed from queues. Message Queuing enforces the computer quota before it enforces the queue quota on a computer.
See also: Message Queuing; queue quotaThe practice of using a computer to control one or more telephone and communications functions.
For DHCP, an optional server-side mechanism for detecting if a scope IP address is in use on the network. When enabled, the DHCP server will ping an address first before offering that address to clients, and then it will briefly await a response. If the pinged address responds, a conflict is registered and that address is not offered to clients obtaining a lease from the server.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); lease; ping; scopeTo assign a drive letter, port, or computer name to a shared resource so that you can use it.
See also: shared resourceA user who has access to a computer or a resource across the network.
See also: resourceA user's status when a telephone connection has been established but authentication has not yet taken place. The user may be trying to prove security clearance, or the system may be idle. If this condition occurs, followed by the Waiting for Call phase, then the user was unable to provide a correct user name or password. If this phase is repeated, followed by the Waiting for Call phase, an unauthorized attempt to access the network may be under way.
See also: authentication; Waiting for CallAn Active Directory object that represents a replication connection from one domain controller to another. The connection object is a child of the replication destinations NTDS Settings object and identifies the replication source server, contains a replication schedule, and specifies a replication transport. Connection objects are created automatically by the Knowledge Consistency Checker (KCC), but they can also be created manually. Automatically generated connections must not be modified by the user unless they are first converted into manual connections.
See also: Active Directory; Knowledge Consistency Checker (KCC); replicationA set of conditions and profile settings that network administrators use to specify how Internet Authentication Service (IAS) servers handle incoming authentication and accounting request messages.
See also: authentication; Internet Authentication Service (IAS); remote access policyA type of network protocol that requires an end-to-end virtual connection between the sender and receiver before communicating across the network.
See also: protocolA network protocol in which a sender broadcasts traffic on the network to an intended receiver without first establishing a connection to the receiver.
See also: protocolFor Message Queuing, an application that enables Message Queuing computers to communicate with computers that use other messaging systems.
See also: connector queue; foreign computer; Message QueuingFor Message Queuing, a queue created on servers running a connector application. You can use the connector application to exchange messages with computers that are running other message-queuing products.
See also: connector application; foreign computer; Message QueuingA framework for hosting administrative tools, such as Microsoft Management Console (MMC). A console is defined by the items in its console tree, which might include folders or other containers, World Wide Web pages, and other administrative items. A console has windows that can provide views of the console tree and the administrative properties, services, and events that are acted on by the items in the console tree.
See also: console tree; details pane; Microsoft Management Console (MMC)The left pane in Microsoft Management Console (MMC) that displays the items contained in the console. The items in the console tree and their hierarchical organization determine the capabilities of a console.
See also: details pane; Microsoft Management Console (MMC)An asynchronous transfer mode (ATM) service type that supports constant bandwidth allocation. This service type is used for voice and video transmissions that require little or no cell loss and rigorous timing controls during transmission.
See also: asynchronous transfer mode (ATM); bandwidthThe ability to specify that a service or computer account can perform Kerberos delegation to a limited set of services.
See also: delegation; Kerberos V5 authentication protocol; serviceAn object that can logically contain other objects. For example, a folder is a container object.
See also: noncontainer object; objectThe process of stabilizing a system after changes occur in the network. For routing, if a route becomes unavailable, routers send update messages throughout the network, reestablishing information about preferred routes.
For Network Load Balancing, a process by which hosts exchange messages to determine a new, consistent state of the cluster and to elect the default host. During convergence, a new load distribution is determined for hosts that share the handling of network traffic for specific Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports.
See also: cluster; default host; host; Network Load Balancing; routing; User Datagram Protocol (UDP)A backup that copies all selected files but does not mark each file as having been backed up (in other words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.
See also: daily backup; differential backup; incremental backup; normal backupA duplicate of the media master that Remote Storage copies to a different tape or disk. Copy sets are typically used for backup purposes.
See also: media master; Remote StorageA loop that happens when a link in a network goes down and routers on the network update their routing tables with incorrect hop counts. For example, a loop can develop if the link to Router C goes down. Router B then advertises that the link is down and that it has no route to C. Because Router A has a route to C with a metric of 2, it responds to Router B and sends its link to C. Router B then updates its table to include a link with metric 3, and the routers continue to announce and update their links to C until they reach the number 16. This is a count to infinity.
See also: routerIn Task Manager, the total processor time, in seconds, used by a process since it started.
See also: Task ManagerIn Task Manager, the percentage of time that a process used the CPU since the last update. This percentage is displayed in Task Manager on the Processes tab, under the CPU column heading.
See also: Task ManagerA feature of shadow copy backups that ensures all files are backed up, regardless of their state.
See also: volume shadow copySpecifies the file format Dr. Watson will use to store the information. The Full format contains the entire memory space of the program, as well as the program image itself, the handle table, and other information that will be useful to the debugger. The Mini format may include the full memory and handle table, or it may simply contain information about a single thread. The Windows NT 4.0-compatible Full format provides you with the opportunity to use older tools to analyze the dump file. Crash Dump Type is only available when you have selected the Create Crash Dump File check box.
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.
A set of information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.
See also: certificate; password; smart cardAn optional extension in an X.509 v3 certificate that identifies how information is obtained. Also, a directory entry or other distribution source for certificate revocation lists.
See also: certificate; certificate revocation list (CRL); X.509 v3 certificateAn object in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.
See also: Active Directory; directory partition; Lightweight Directory Access Protocol (LDAP)An application programming interface (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allows applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as cryptographic service providers (CSPs).
See also: application programming interface (API); cryptographic service provider (CSP); private keyA mathematical value that is a result of a calculation involving a cryptographic algorithm and a cryptographic key. Also known as an integrity check value (ICV) or a message integrity code (MIC).
See also: cryptographyThe code that performs authentication, encoding, and encryption services that Windows-based applications access through CryptoAPI. A CSP is responsible for creating keys, destroying them, and using them to perform a variety of cryptographic operations. Each CSP provides a different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms, while others use hardware components, such as smart cards.
See also: authentication; CryptoAPI; encryption; service; smart cardThe processes, art, and science of keeping messages and data secure. Cryptography is used to enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.
See also: authentication; nonrepudiationTypically, files with extensions that have been created for special kinds of files. Custom file types are not tracked by the system registry.
See also: registryA separate channel of an Integrated Services Digital Network (ISDN) line that is used for ISDN signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. Also called data channel.
See also: Integrated Services Digital Network (ISDN); switch typeA backup that copies all selected files that have been modified the day the daily backup is performed. The backed-up files are not marked as having been backed up (in other words, the archive attribute is not cleared).
See also: copy backup; differential backup; incremental backup; normal backupOne of two types of hardware that are connected by an RS-232-C serial connection, the other being a Data Terminal Equipment (DTE) device. A DCE is an intermediary device that often transforms input from a DTE before sending it to a recipient. A modem, for example, is a DCE that modulates data from a microcomputer (DTE) and sends it along a telephone connection.
See also: Data Terminal Equipment (DTE); RS-232-C standardAn encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key.
See also: keyOne of two forks (resource fork and data fork) that make up each Macintosh file. The data fork holds most of the file's information and is shared between Macintosh and personal computer clients.
See also: resource forkA property of secure communications that allows a computer to verify that data has not been modified in transit from its source. For example, Internet Protocol security (IPSec)-protected data contains a cryptographic checksum that incorporates a secret key that is known only to the IPSec peers that are communicating. An intermediate node can modify the data, but without knowledge of the secret key, the node cannot recompute a correct cryptographic checksum.
See also: cryptographic checksum; Internet Protocol security (IPSec)An address that uniquely identifies a node on a network. Every network adapter has a DLC address or DLC identifier (DLCI). Some network protocols, such as Ethernet and Token Ring, use DLC addresses exclusively. Other protocols, such as TCP/IP, use a logical address at the OSI Network layer to identify nodes.
However, all network addresses must eventually be translated to DLC addresses. In TCP/IP networks, this translation is performed by the Address Resolution Protocol (ARP).
See also: Address Resolution Protocol (ARP); node; Open Systems Interconnection (OSI) reference modelA property of secure communications that allows a computer to verify that data originated from a valid source. For example, IPSec-protected data contains a cryptographic checksum that incorporates a secret key that is known only to the IPSec peers that are communicating. An invalid source can send data, but without knowledge of the secret key, the source cannot compute a correct cryptographic checksum.
See also: cryptographic checksum; cryptography; encryption; Internet Protocol security (IPSec); keyIn the RS-232-C hardware standard, any device, such as a remote access server or client, that has the ability to transmit information in digital form over a cable or a communications line.
See also: Data Communications Equipment (DCE); remote access server; RS-232-C standardA state in which the sending computer is transmitting characters faster than the receiving computer can accommodate them. If this problem persists, reduce the bits-per-second (bps) rate.
See also: bits per second (bps)One packet, or unit, of information that includes relevant delivery information, such as the destination address, that is sent through a packet-switching network.
See also: packetA Windows Support Tool that analyzes the state of domain controllers in a forest or enterprise and provides detailed information about how to identify abnormal behavior in a system. Domain controllers are identified and tested according to directives entered by the user at the command line. Also known as Domain Controller Diagnostic Tool.
Dcdiag executes tests in the following functional areas of the system:
For Message Queuing, a queue that stores nontransactional messages that are undeliverable or expired. These queues store failed messages on the computer on which the message expired. Messages in these queues are written to disk and are therefore recoverable.
See also: Message Queuing; queue; transactional dead-letter queue; transactional messageA program designed to aid in detecting, locating, and correcting errors in another program by allowing the programmer to step through the program, examine the data, and monitor conditions such as the values of variables.
See also: variableThe network adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles network traffic not related to cluster operations (the traffic for individual hosts on the network). This adapter is programmed with the host's dedicated IP address.
See also: cluster adapter; IP address; Network Load BalancingA communications channel that connects two or more geographic locations. Dedicated connections are private or leased lines, rather than public lines.
See also: channelThe IP address of a Network Load Balancing host used for network traffic that is not associated with the Network Load Balancing cluster (for example, Telnet access to a specific host within the cluster). This IP address is used to individually address each host in the cluster and therefore should be unique for each host.
See also: host; IP address; Network Load Balancing; Network Load Balancing clusterIn some dialog boxes, the command button that is selected or highlighted when the dialog box is initially displayed. The default button has a bold border, indicating that it will be chosen automatically if you press ENTER. You can override a default button by clicking Cancel or another command button.
The host with the highest host priority for which a drainstop command is not in progress. After convergence, the default host handles all of the network traffic for Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports that are not otherwise covered by port rules.
See also: convergence; drainstop; host; host priority; port rule; User Datagram Protocol (UDP)In the Macintosh environment, the physical network on which the processes of a server reside as nodes and on which the server appears to users. The default network of the server must be one to which that server is attached. Only servers on AppleTalk Phase 2 internets have default networks.
See also: AppleTalk Phase 2; internet; nodeThe printer to which a computer sends documents if you select the Print command without first specifying which printer you want to use with a program. You can have only one default printer; it should be the printer you use most often.
See also: printerFor software restriction policies, the default setting that defines whether software in a Group Policy object (GPO) is allowed to run. Exceptions can be made to the default security level by means of software restriction policies rules.
See also: Group Policy object (GPO); software restriction policies; software restriction policies ruleThe position of a User object in the file system of a Novell Directory Services (NDS) tree on a Novell NetWare network. The default tree and context is the default logon location in an NDS tree for a Microsoft Windows computer that is running Client Service for NetWare.
See also: Client Service for NetWare; Novell Directory Services (NDS); objectThe profile that serves as a basis for all user profiles. Every user profile begins as a copy of the default user profile.
See also: user profileThe zone to which all Macintosh clients on the network are assigned by default.
See also: zoneThe process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval.
In Active Directory, defragmentation rearranges how the data is written in the directory database file to compact it.
See also: Active Directory; fragmentationA method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources.
See also: authentication; client; server; serviceAn assignment of administrative responsibility to a user, computer, group, or organization.
For Active Directory, an assignment of responsibility that allows users without administrative credentials to complete specific administrative tasks or to manage specific directory objects. Responsibility is assigned through membership in a security group, the Delegation of Control Wizard, or Group Policy settings.
For DNS, an assignment of responsibility for a DNS zone. Delegation occurs when a name server (NS) resource record in a parent zone lists the DNS server that is authoritative for a child zone.
See also: Active Directory; administrative credentials; DNS server; Domain Name System (DNS); Group Policy; security group; zoneA document that lists certificates that have been revoked after the last full certificate revocation list (CRL) has been published. Delta CRLs are maintained and published by a certification authority (CA), and they are normally much smaller than a full CRL.
See also: certificate; certificate revocation list (CRL); certification authority (CA)A connection, typically using a circuit-switched wide area network link, that is initiated when data needs to be forwarded. The demand-dial connection is typically terminated when there is no traffic.
See also: wide area network (WAN)Routing that makes dial-up connections to connect networks based on need. For example, a branch office with a modem that dials and establishes a connection only when there is network traffic from one office to another.
See also: dial-up connection; modem (modulator/demodulator)An attack in which an attacker exploits a weakness or a design limitation of a network service to overload or halt the service, so that the service is not available for use. This type of attack is typically started to prevent other users from using a network service such as a Web server or a file server.
See also: service; Web serverA relationship of reliance between two resources that makes it necessary for them to run in the same group on the same node. For example, an application is dependent on the disks that contain its data resources.
See also: node; resourceA diagram for visualizing the dependency relationships between resources.
See also: dependency; resourceFor Message Queuing, a computer that requires synchronous access to a Message Queuing server to perform all standard message queuing operations, such as sending and receiving messages and creating queues.
See also: independent client; Message Queuing serverAll the subkeys that appear when a key in the registry is expanded. A descendent key is the same as a subkey.
See also: key; subkeyThe on-screen work area on which windows, icons, menus, and dialog boxes appear.
A design that appears across your desktop. You can create your own pattern or select a pattern provided by Windows.
See also: desktopThe document into which a package or a linked or embedded object is being inserted. For an embedded object, this is sometimes also called the container document.
See also: embedded objectThe right pane in Microsoft Management Console (MMC) that displays details for the selected item in the console tree. The details can be a list of items or they can be administrative properties, services, and events that are acted on by a snap-in.
See also: console tree; Microsoft Management Console (MMC); service; snap-inAny piece of equipment that can be attached to a network or computer, for example, a computer, printer, joystick, adapter, or modem card, or any other peripheral equipment. Devices normally require a device driver to function with
For Windows licensing, electronic equipment such as computers, workstations, terminals, and handheld computers that can access or use the services of Windows operating systems, including file sharing, print sharing, remote access, and authentication.
See also: device driverA conflict that occurs when the same system resources have been allocated to two or more devices. System resources include interrupt request (IRQ) lines, direct memory access (DMA) channels, input/output (I/O) ports, and memory addresses.
See also: direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ) lines; memory address; resourceA program that enables a specific device, such as a modem, network adapter, or printer, to communicate with the operating system. Although a device might be installed on your system, Windows cannot use the device until you have installed and configured the appropriate driver. Device drivers load automatically (for all enabled devices) when a computer is started, and thereafter they run invisibly.
See also: device; signed driver; unsigned driver; Windows CatalogAn administrative tool that you can use to manage the devices on your computer. Using Device Manager, you can view and change device properties, update device drivers, configure device settings, and uninstall devices.
See also: device; uninstallAn element in the Distributed File System (DFS) namespace that lies below the root and maps to one or more targets, each of which corresponds to a shared folder or another DFS root.
See also: DFS root; Distributed File System (DFS); domain DFSA namespace consisting of a root and many links and targets. The namespace starts with a root that maps to one or more root targets. Below the root are links that map to their own targets. The Distributed File System (DFS) namespace provides the user with a logical view of distributed network shares.
See also: Distributed File System (DFS); rootThe combination of a Distributed File System (DFS) root and a DFS link. An example of a DFS path is
The starting point of the Distributed File System (DFS) namespace. The root is often used to refer to the namespace as a whole. A root maps to one or more root targets, each of which corresponds to a shared folder on a server.
See also: DFS link; DFS namespace; Distributed File System (DFS)The overall logical hierarchy of the Distributed File System (DFS), including elements such as roots, links, shared folders, and replica sets, as depicted in the DFS administrative console. This is not to be confused with the DFS namespace, which is the logical view of shared resources seen by users.
See also: DFS link; DFS namespace; DFS root; Distributed File System (DFS); domain DFSA message sent by the DHCP server to a client to acknowledge and complete a client's request for leased configuration. This message will contain a committed IP address for the client to use for a stated period of time along with other optional client parameters. The DHCP acknowledgment message name is DHCPACK.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP)A special reserved option type used by DHCP clients to optionally identify membership in a specific DHCP option class, either a vendor or user class. For vendor class identification, hardware vendors can choose to predefine specific identifier values; for example, to identify a client's hardware configuration. For user class identification, values can be defined administratively to identify a logical group of DHCP clients, such as all clients in a particular building and floor location.
See also: DHCP client; DHCP option; Dynamic Host Configuration Protocol (DHCP)Any network-enabled device that supports the ability to communicate with a DHCP server for the purpose of obtaining dynamic leased IP configuration and related optional parameters information.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); leaseAn alternate static configuration option for TCP/IP network connections that provides simplified computer migration between networks.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)A message sent by a DHCP client to the DHCP server to decline the offer of an IP address on the network. This message is used when the client detects a potential conflict because the IP address is found to be already in use on the network. The DHCP decline message name is DHCPDECLINE.
See also: DHCP client; DHCP server; Dynamic Host Configuration Protocol (DHCP)A reserved DHCP message type used by computers on the network to request and obtain information from a DHCP server for use in their local configuration. When this message type is used, the sender is already externally configured for its IP address on the network, which may or may not have been obtained using DHCP. The DHCP information message name is DHCPINFORM.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP)A message sent by a DHCP server to a client to indicate that the IP address that the client requested is not correct for the local IP network served by the DHCP server. This message is most often used when the client computer was moved to a new location, but it could also indicate that the client's lease with the server has expired. The DHCP negative acknowledgment message name is DHCPNAK.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); leaseA message used by DHCP servers to offer the lease of an IP address to a DHCP client when it starts on the network. When this message is used, a client can receive more than one offer if multiple DHCP servers are contacted during the DHCP discovery phase, but the client will typically select the first address it is offered. The DHCP offer message name is DHCPOFFER.
See also: DHCP client; DHCP server; Dynamic Host Configuration Protocol (DHCP)Address configuration parameters that a DHCP service assigns to clients. Most DHCP options are predefined, based on optional parameters defined in Request for Comments (RFC) 1542, although extended options can be added by vendors or users.
See also: DHCP service; Dynamic Host Configuration Protocol (DHCP)A message sent by clients to the DHCP server to indicate release of its leased IP address. The client uses this message to cancel its currently active lease. You can perform address release manually using the ipconfig /release command at a command prompt. The DHCP release message name is DHCPRELEASE.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); leaseA message sent by clients to the DHCP server to request or renew lease of its IP address. The client uses this message under the following conditions:
The DHCP request message name is DHCPREQUEST.
See also: DHCP server; Dynamic Host Configuration Protocol (DHCP); leaseA computer running the Microsoft DHCP service that offers dynamic configuration of IP addresses and related information to DHCP-enabled clients.
See also: DHCP service; Dynamic Host Configuration Protocol (DHCP); IP addressA service that enables a computer to function as a DHCP server and configure DHCP-enabled clients on a network. DHCP runs on a server, enabling the automatic, centralized management of IP addresses and other TCP/IP configuration settings for network clients.
See also: Dynamic Host Configuration Protocol (DHCP); IP address; serviceA resource type that provides DHCP services from a cluster.
See also: cluster; Dynamic Host Configuration Protocol (DHCP)The agent program or component responsible for relaying Dynamic Host Configuration Protocol (DHCP) and bootstrap protocol (BOOTP) broadcast messages between a DHCP server and a client across an Internet Protocol (IP) router. A DHCP relay agent supports DHCP/BOOTP message relay as defined in RFCs 1541 and 2131. The DHCP Relay Agent service is managed using the Routing and Remote Access service.
See also: bootstrap protocol (BOOTP); DHCP server; Dynamic Host Configuration Protocol (DHCP); Request for Comments (RFC)The country code, area code, and specific dialing requirements for the place you are dialing from. Once you have created a dial location, you can select it to apply the dialing requirements to all your calls. To change dialing locations, select or create a different one.
Settings in a remote access policy that permit or deny access to remote access clients.
See also: remote access policyThe connection to your network if you use a device that uses the telephone network. This includes modems with a standard telephone line, ISDN cards with high-speed ISDN lines, or X.25 networks.
If you are a typical user, you might have one or two dial-up connections, for example, to the Internet and to your corporate network. In a more complex server situation, multiple network modem connections might be used to implement advanced routing.
See also: Integrated Services Digital Network (ISDN); modem (modulator/demodulator)A standard dial-up connection, such as telephone and Integrated Services Digital Network (ISDN) lines. Also called switched circuit.
See also: Integrated Services Digital Network (ISDN)A backup that copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup.
See also: copy backup; daily backup; incremental backup; normal backupSaved copies of changed data that can be applied to an original volume to generate a volume shadow copy.
See also: volume; volume shadow copyA cryptographic mechanism that allows two parties to establish a shared secret key without having any preestablished secrets between them. Diffie-Hellman is frequently used to establish the shared secret keys that are used by common applications of cryptography, such as Internet Protocol security (IPSec). It is not normally used for data protection.
See also: cryptography; Internet Protocol security (IPSec); keyAn authentication mechanism that hashes user name, password, and other data before transmitting it over the network.
See also: authentication; Basic authentication; encryption; hash; password; user nameA means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services.
See also: Digital Signature Standard (DSS); public key cryptography; service; time stampA standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.
See also: digital signature; Secure Hash Algorithm (SHA-1)A special communication line that uses modulation technology to maximize the amount of data that can be sent over copper wires. DSL is used for connections from telephone switching stations to a subscriber rather than between switching stations.
A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM disc, but it can store greater amounts of data. DVDs are often used to store full-length movies and other multimedia content that requires large amounts of storage space.
See also: DVD decoder; DVD driveA link between the input/output (I/O) ports of two computers created with a single cable rather than a modem or other interfacing devices. In most cases, a direct cable connection is made with a null modem cable.
See also: input/output (I/O) port; null modem cableFor Microsoft networking, the sending of file and print sharing traffic using the Server Message Block (SMB) protocol (also known as the Common Internet File System (CIFS) protocol) without the use of network basic input/output system (NetBIOS). Direct hosting for the Microsoft redirector (the Workstation service) and file server (the Server service) is supported over both TCP/IP and Internetwork Packet Exchange (IPX). Although direct hosting may be more efficient, a direct hosting client can connect only to a direct hosting server.
See also: Internetwork Packet Exchange (IPX); network basic input/output system (NetBIOS); NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink); Server Message Block (SMB); Transmission Control Protocol/Internet Protocol (TCP/IP)Memory access that does not involve the microprocessor. DMA is frequently used for data transfer directly between memory and a peripheral device such as a disk drive.
See also: hardware configurationAn information source that contains information about users, computer files, or other objects. In a file system, a directory stores information about files. In a distributed computing environment (such as a Windows domain), the directory stores information about objects such as printers, fax servers, applications, databases, and other users.
See also: domain; objectThe physical storage for each replica of Active Directory. Also called the store.
See also: Active Directory; replicaA contiguous subtree of Active Directory that is replicated as a unit to other domain controllers in the forest that contain a replica of the same subtree. In Active Directory, a single domain controller always holds at least three directory partitions: schema (class and attribute definitions for the directory), configuration (replication topology and related metadata), and domain (subtree that contains the per-domain objects for one domain). Domain controllers running Windows Server 2003 can also store one or more application directory partitions.
See also: Active Directory; application directory partition; attribute; domain; global catalog; replica; replication; schemaBoth the directory information source and the service that makes the information available and usable. A directory service enables the user to find an object when given any one of its attributes.
See also: Active Directory; attribute; directory; objectThe physical storage for Active Directory directory partition replicas on a specific domain controller. The store is implemented using the Extensible Storage Engine.
See also: Active Directory; directory partition; domain controller; replicaAn extension of the Microsoft Windows operating system. DirectX technology helps games and other programs use the advanced multimedia capabilites of your hardware.
A bit that is used to mark modified data in a cache so that the modifications may be carried over to primary memory.
For Windows file systems, a bit that is used to indicate that the file system is in an inconsistent and possibly corrupted state. When it is set, the file system's dirty bit triggers the chkdsk command to run when the computer is restarted.
See also: bit (binary digit); file systemTo make a device nonfunctional. For example, if you disable a device in a hardware configuration, you cannot use the device when your computer uses that hardware configuration. Disabling a device frees the resources that were allocated to the device.
See also: device; enable; hardware configurationThe part of an object's security descriptor that grants or denies specific users and groups permission to access the object. Only the owner of an object can change permissions granted or denied in a DACL; thus, access to the object is at the owner's discretion.
See also: access control entry (ACE); distribution group; object; security descriptor; security group; system access control list (SACL)Information in the Windows registry on assigned drive letters, simple volumes, striped volumes, mirrored volumes, spanned volumes, and RAID-5 volumes. You can change the disk configuration by using Disk Management.
See also: mirrored volume; RAID-5 volume; registry; simple volume; spanned volume; striped volume; volumeA set of software processes that maintains a backup copy of a volume at all times. Each mirror of a volume resides on a different disk; ideally, each disk has its own controller. If one mirror becomes unavailable (due to a disk failure, for example), you can use the other mirror to gain access to the volume's data.
See also: mirror; volumeA password that allows the user to open only previously saved capture (.cap) files.
See also: capture password; passwordA name that uniquely identifies an object by using the relative distinguished name for the object, plus the names of container objects and domains that contain the object. The distinguished name identifies the object as well as its location in a tree. Every object in Active Directory has a distinguished name. A typical distinguished name might be
CN=MyName,CN=Users,DC=Microsoft,DC=Com
This identifies the MyName user object in the microsoft.com domain.
See also: Active Directory; container object; domain; object; relative distinguished nameThe Microsoft Component Object Model (COM) specification that defines how components communicate over Windows-based networks. Use the DCOM Configuration tool to integrate client/server applications across multiple computers. DCOM can also be used to integrate robust Web browser applications.
See also: Component Object Model (COM)A service that allows system administrators to organize distributed network shares into a logical namespace, enabling users to access files without specifying their physical location and providing load sharing across network shares.
See also: serviceA group that is used solely for e-mail distribution and that is not security-enabled. Distribution groups cannot be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. Distribution groups can be used only with e-mail applications (such as Microsoft Exchange) to send e-mail to collections of users. If you do not need a group for security purposes, create a distribution group instead of a security group.
See also: discretionary access control list (DACL); security groupA client computer that queries DNS servers in an attempt to resolve DNS domain names. DNS clients maintain a temporary cache of resolved DNS domain names.
See also: client; DNS server; Domain Name System (DNS)DNS extensions that use digital signatures to provide data authentication and integrity to compliant DNS resolvers and applications.
See also: authentication; digital signature; Domain Name System (DNS); resolver; resource record (RR); secure zoneA server that maintains information about a portion of the DNS database and that responds to and resolves DNS queries.
See also: DNS client; Domain Name System (DNS); serverFor DNS, a character string that represents a domain name. The DNS suffix shows where a host is located relative to the DNS root, specifying a host’s location in the DNS hierarchy. Usually, the DNS suffix describes the latter portion of a DNS name, following one or more of the first labels of a DNS name.
See also: domain name; Domain Name System (DNS)In a DNS database, a contiguous portion of the DNS tree that is administered as a single, separate entity by a DNS server. The zone contains resource records for all the names within the zone.
See also: DNS server; Domain Name System (DNS); resource record (RR)A unit for housing a portable computer that contains a power connection, expansion slots, and connections to peripherals, such as a monitor, printer, full-sized keyboard, and mouse. The docking station turns the portable computer into a desktop computer.
Any self-contained piece of work created with an application program and, if saved on disk, given a unique file name by which it can be retrieved.
See also: filter; property cacheIn Active Directory, a collection of computer, user, and group objects defined by the administrator. These objects share a common directory database, security policies, and security relationships with other domains.
In DNS, any tree or subtree within the DNS namespace. Although the names for DNS domains often correspond to Active Directory domains, DNS domains should not be confused with Active Directory domains.
See also: Active Directory; directory database; Domain Name System (DNS); objectA person who is a member of the Domain Admins group. Domain administrators can create, delete, and manage all objects that reside within the domain in which they are administrators. They can also assign and reset passwords and delegate administrative authority for network resources to other trusted users.
See also: domain; object; resourceIn an Active Directory forest, a server that contains a writable copy of the Active Directory database, participates in Active Directory replication, and controls access to network resources. Administrators can manage user accounts, network access, shared resources, site topology, and other directory objects from any domain controller in the forest.
See also: Active Directory; authentication; directory; forest; shared resourceAn algorithm running in the context of the Net Logon service that enables a client to locate a domain controller. Locator can find domain controllers by using DNS or network basic input/output system (NetBIOS) names. The DNS service (SRV) resource records registered by Locator on behalf of domain controllers are also known as domain controller locator (Locator) resource records.
See also: domain controller; Domain Name System (DNS); network basic input/output system (NetBIOS); service (SRV) resource recordAn implementation of Distributed File System (DFS) in which DFS topological information is stored in Active Directory. Because this information is made available on multiple domain controllers in the domain, domain DFS provides fault tolerance for any distributed file system in the domain.
See also: Active Directory; DFS topology; Distributed File System (DFS); fault toleranceThe functional level of an Active Directory domain that has one or more domain controllers running Windows Server 2003. The functional level of a domain can be raised to enable new Active Directory features that will apply to that domain only. There are four domain functional levels: Windows 2000 mixed, Windows 2000 native, Windows Server 2003 interim, and Windows Server 2003. The default domain functional level is Windows 2000 mixed. When the domain functional level is raised to Windows 2000 native, Windows Server 2003 interim, or Windows Server 2003, advanced domain-wide Active Directory features are available.
See also: Active Directory; domain; domain controllerThe parent/child tree structure of domains.
See also: domainA security or distribution group that can contain universal groups, global groups, other domain local groups from its own domain, and accounts from any domain in the forest. Domain local security groups can be granted rights and permissions on resources that reside only in the same domain where the domain local group is located.
See also: distribution group; domain tree; forest; global group; security group; universal groupThe name given by an administrator to a collection of networked computers that share a common directory. Part of the DNS naming structure, domain names consist of a sequence of name labels separated by periods.
See also: domain; Domain Name System (DNS); labelA hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database.
See also: domain name; IP address; ping; service; Transmission Control Protocol/Internet Protocol (TCP/IP)The database structure used by DNS.
See also: Domain Name System (DNS)A domain controller that holds the domain naming operations master role in Active Directory. The domain naming master controls the addition or removal of domains in the forest. At any time, the domain naming master role can be assigned to only one domain controller in the forest.
See also: Active Directory; domain controller; operations masterThe parent DNS domain name that is used to root either a zone or a resource record within a zone. This name is joined to the end of unqualified or relative domain names to form a fully qualified domain name (FQDN) within the zone. In DNS Manager, the domain of origin will correspond to Zone name as it appears in the Add Zone Wizard or the name that appears in the Parent domain name field for any resource records created within the zone.
See also: domain; domain name; Domain Name System (DNS); fully qualified domain name (FQDN); relative name; resource record (RR); zoneA DFS namespace, for which the configuration information is stored in Active Directory. The path to access the root or a link starts with the host domain name. A domain root can have multiple root targets, which offer fault tolerance and load sharing at the root level.
See also: Active Directory; DFS namespace; root targetFor DNS, an optional parent domain name that can be appended to the end of a relative domain name used in a name query or host lookup. The domain suffix can be used to complete an alternate fully qualified DNS domain name to be searched when the first attempt to query a name fails.
See also: Domain Name System (DNS); fully qualified domain name (FQDN); parent domainIn DNS, the inverted hierarchical tree structure that is used to index domain names. Domain trees are similar in purpose and concept to the directory trees used by computer filing systems for disk storage. For example, when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections.
In Active Directory, a hierarchical structure of one or more domains, connected by transitive, bidirectional trusts, that forms a contiguous namespace. Multiple domain trees can belong to the same forest.
See also: Active Directory; domain; domain name; Domain Name System (DNS); forest; transitive trust; two-way trustThe standard used to measure screen and printer resolution, expressed as the number of dots that a device can display or print per linear inch. The greater the number of dots per inch, the better the resolution.
The case-insensitive handling of DNS domain names. Windows DNS servers use downcasing to convert any uppercase letters used in domain names to equivalent lowercase letters. For example, the name HOST.example.Microsoft.com would be downcased to host.example.microsoft.com.
See also: DNS server; domain name; Domain Name System (DNS); upcasingA set of characters stored on disk and sent (downloaded) to a printer's memory when needed for printing a document. Downloadable fonts are most commonly used with laser printers and other page printers, although many dot-matrix printers can accept some of them. Also called soft fonts.
See also: font; font cartridge; PostScript fontsTo move an item on the screen by selecting the item and then pressing and holding down the mouse button while moving the mouse. For example, you can move a window to another location on the screen by dragging its title bar.
For Network Load Balancing, a command that disables new traffic handling for the rule whose port range contains the specified port. All ports specified by the port rule are affected.
See also: cluster; drainstop; Network Load Balancing; port; port ruleFor Network Load Balancing, a command that disables all new traffic handling on the specified hosts. The hosts then enter draining mode to complete existing connections.
While draining, hosts remain in the cluster and stop their cluster operations when there are no more active connections. To terminate draining mode, explicitly stop cluster mode with the stop command, or restart new traffic handling with the start command. To drain connections from a specific port, use the drain command.
See also: drain; host; Network Load BalancingAn area of storage that is formatted with a file system and has a drive letter. The storage can be a floppy disk, a CD, a hard disk, or another type of disk. You can view the contents of a drive by clicking its icon in Windows Explorer or My Computer.
See also: drive letter; file system; volumeThe naming convention for disk drives on IBM and compatible computers. Drives are named by letter, beginning with A, followed by a colon.
See also: driveIn the Macintosh environment, a folder for which you have the Make Changes permission but not the See Files or See Folders permission. You can copy files into a drop folder, but you cannot see what files and subfolders the drop folder contains.
See also: Make ChangesA computer configuration that can start two different operating systems.
See also: boot; multiple boot; startup environmentA system capable of transmitting information in both directions over a communications channel.
See also: full-duplex; half-duplexA hardware or software component that allows a digital video disc (DVD) drive to display movies on your computer screen.
See also: digital video disc (DVD); DVD drive; hardware decoder; software decoderA disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both CD-ROM and DVDs; however, you must have a DVD decoder to display DVD movies on your computer screen.
See also: digital video disc (DVD); DVD decoderA data type that is composed of hexadecimal data with a maximum allotted space of 4 bytes.
A form of interprocess communication (IPC) implemented in the Microsoft Windows family of operating systems. Two or more programs that support dynamic data exchange (DDE) can exchange information and commands.
See also: Network DDE serviceA physical disk that provides features that basic disks do not, such as support for volumes that span multiple disks. Dynamic disks use a hidden database to track information about dynamic volumes on the disk and other dynamic disks in the computer. You convert basic disks to dynamic by using the Disk Management snap-in or the DiskPart command-line tool. When you convert a basic disk to dynamic, all existing basic volumes become dynamic volumes.
See also: active volume; basic disk; basic volume; dynamic volume; partition; volumeA TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process.
See also: DHCP client; DHCP server; IP address; lease; service; Transmission Control Protocol/Internet Protocol (TCP/IP)The use of routing protocols to update routing tables. Dynamic routing responds to changes in the internetwork topology.
See also: protocol; routingA storage method in Windows that allows disk and volume management without requiring operating system restart.
See also: basic storageAn update to the Domain Name System (DNS) standard that permits DNS clients to dynamically register and update their resource records in zones.
See also: DNS client; DNS server; Domain Name System (DNS); resource record (RR); zoneA volume that resides on a dynamic disk. Windows supports five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. A dynamic volume is formatted by using a file system, such as file allocation table (FAT) or NTFS, and has a drive letter assigned to it.
See also: basic disk; basic volume; dynamic disk; mirrored volume; RAID-5 volume; simple volume; spanned volume; striped volume; volumeAn operating system feature that allows executable routines (generally serving a specific function or set of functions) to be stored separately as files with .dll extensions. These routines are loaded only when needed by the program that calls them.
See also: Resource DLLOverall permissions that a user or group has on an object, taking into account group membership as well as inheritance from the parent object.
See also: group; inheritance; object; parent object; permissionOn Itanium-based computers, a portion on a GUID partition table (GPT) disk that is formatted with the file allocation table (FAT) file system and contains the files necessary to start the computer. Every Itanium-based computer must have at least one GPT disk with an EFI system partition. The EFI system partition serves the same purpose as the system volume found on x86-based computers.
See also: Extensible Firmware Interface (EFI); file allocation table (FAT); GUID partition table (GPT); Itanium; Microsoft Reserved (MSR) partition; system volume; x86Information created in another program that has been pasted inside your document. When information is embedded, you can edit the information in the new document using toolbars and menus from the original program.
To edit the embedded information, double-click it and the toolbars and menus from the program used to create the information appear. Embedded information is not linked to the original source. If you change information in one place, it is not updated in the other.
See also: linked object; OLE; package; source documentA logical ATM network that emulates the services of an Ethernet or Token Ring LAN.
See also: asynchronous transfer mode (ATM); local area network (LAN); Token RingTo make a device functional. For example, if a device in your hardware configuration settings is enabled, the device is available for use when your computer uses that hardware configuration.
See also: disable; hardware configurationA file that prints at the highest possible resolution for your printer. An EPS file may print faster than other graphical representations. Some Windows-based and non-Windows-based graphical programs can import EPS files.
See also: PostScriptAn Internet Protocol security (IPSec) protocol that provides confidentiality, in addition to authentication, integrity, and anti-replay. ESP can be used alone, in combination with Authentication Header (AH), or nested with the Layer Two Tunneling Protocol (L2TP). ESP does not normally sign the entire packet unless it is being tunneled. Ordinarily, just the data payload is protected, not the IP header.
See also: authentication; Authentication Header (AH); Internet Protocol security (IPSec); Layer Two Tunneling Protocol (L2TP)The method used to pass data from one protocol over a network within a different protocol. Data from one protocol is wrapped with the header of a different protocol. Encapsulation is described in RFC 1483.
See also: protocol; Request for Comments (RFC)A path or link through which encrypted information passes between two devices. This information typically includes the primary message content, not session configuration information.
See also: device; encryptionA password that is scrambled. Encrypted passwords are more secure than plaintext passwords, which are susceptible to network sniffers.
See also: encryption; passwordA feature in this version of Windows that enables users to encrypt files and folders on an NTFS volume disk to keep them safe from access by intruders.
See also: NTFS file system; recovery agentThe process of disguising a message or data in such a way as to hide its substance.
See also: public key encryption; symmetric encryptionIn Group Policy Management console (GPMC), to force the Group Policy object (GPO) links of the parent container to take precedence over the GPO links of the child containers. By default, the GPO links that are closest to the user or computer (links to the child container) have higher precedence than GPO links higher up (links to the parent container). Enforcement causes GPOs that are linked in parent containers to take precedence instead. In operating systems in the Windows Server 2003 family without GPMC, No Override is used instead of Enforce.
See also: block inheritance; Group Policy Management console (GPMC); Group Policy object link; inheritance; No Override; precedenceA standard that can be used with high-capacity hard disks, floppy disk drives, and tape drives to allow these devices to communicate with a computer at high speeds.
A certification authority (CA) that is fully integrated with Active Directory.
See also: Active Directory; certification authority (CA)A feature of Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, that allows you to run applications that take advantage of large amounts of physical memory. Enterprise Memory Architecture supports two types of memory enhancement: application memory tuning, also known as 4-gigabyte tuning (4GT), and Physical Address Extension (PAE) X86.
See also: application memory tuning; Physical Address Extension (PAE)The lowest level element in the registry. Entries appear in the details pane of a Registry Editor window. Each entry consists of an entry name, its data type, and its value. Entries store the configuration data that affects the operating system and the programs that run on the system. As such, they are different from registry subtrees, keys, and subkeys, which are containers.
See also: key; registry; subkey; subtreeA string consisting of environment information, such as a drive, path, or file name, associated with a symbolic name that can be used by Windows. You use System in Control Panel or the set command from the command prompt to define environment variables.
See also: string; variableA technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data.
Any significant occurrence in the system or an application that requires users to be notified or an entry to be added to a log.
A service that records events in the system, security, and application logs. The Event Log service is located in Event Viewer.
See also: event; event logging; Event Viewer; serviceThe process of recording an audit entry in the audit trail whenever certain events occur, such as services starting and stopping or users logging on and off and accessing resources.
See also: auditing; event; Event Viewer; serviceA component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events.
See also: event; event loggingIn the Macintosh environment, one of the user categories to which you assign permissions for a folder. Permissions granted to everyone apply to all users who use the server, including guests.
See also: permissionA small range of one or more IP addresses within a DHCP scope excluded from the DHCP service. Exclusion ranges ensure that these scope addresses will never be offered to clients by the DHCP server.
See also: DHCP server; DHCP service; scopeType of memory that can be added to IBM personal computers. The use of expanded memory is defined by the Expanded Memory Specification (EMS), which supports memory boards containing RAM that can be enabled or disabled by software.
See also: extended memoryA socket in a computer, designed to hold expansion boards and connect them to the system bus.
See also: busFor DNS, the number of seconds that DNS servers operating as secondary masters for a zone will use to determine if zone data should be expired when the zone is not refreshed and renewed.
See also: DNS server; Domain Name System (DNS); zoneObject permissions that are defined when the object is created, specifically assigned, or changed by the owner of the object.
See also: object; permissionFor Message Queuing, a message that uses fewer resources and is faster than a recoverable message. However, because express messages are mapped to memory, they are lost if the computer storing them fails.
See also: Message Queuing; recoverable messageMemory beyond one megabyte in 80286, 80386, 80486, and Pentium computers.
See also: expanded memoryA type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do not format an extended partition with a file system and then assign a drive letter to it. Instead, you create one or more logical drives within the extended partition. After you create a logical drive, you format it and assign it a drive letter. An MBR disk can have up to four primary partitions or three primary partitions, one extended partition, and multiple logical drives.
See also: basic disk; drive letter; logical drive; master boot record (MBR); partition; primary partition; unallocated space; volumeAn extension to the Point-to-Point Protocol (PPP) that allows for arbitrary authentication mechanisms to be employed for the validation of a PPP connection.
See also: Point-to-Point Protocol (PPP)In computers with the Intel Itanium processor, the interface between a computer's firmware, hardware, and the operating system. EFI defines a new partition style called GUID partition table (GPT). EFI serves the same purpose for Itanium-based computers as the basic input/output system (BIOS) found in x86-based computers. However, it has expanded capabilities that provide a consistent way to start any compatible operating system and an easy way to add EFI drivers for new bootable devices without the need to update the computer's firmware.
See also: basic input/output system (BIOS); GUID partition table (GPT); Itanium; x86A meta-markup language that provides a format for describing structured data. This facilitates more precise declarations of content and more meaningful search results across multiple platforms. In addition, XML enables a new generation of Web-based data viewing and manipulation applications.
See also: Hypertext Markup Language (HTML)The association of a file name extension with a Macintosh file type and file creator. By creating extension-type associations, you can choose which program starts automatically when you open a file with a particular extension. Services for Macintosh has many predefined extension-type associations.
A 4-byte hexadecimal number used for addressing and routing purposes on NetWare networks. The external network number is associated with physical network adapters and networks.
See also: internal network number; Internetwork Packet Exchange (IPX)A trust that is manually created between two Active Directory domains that are located in different forests or between an Active Directory domain and a Windows NT 4.0 or earlier domain. External trusts are nontransitive and one-way.
See also: Active Directory; domain; forest; nontransitive trust; one-way trust; trust relationshipA limited subset of computers or users on a public network, typically the Internet, that can access an organization's internal network. For example, the computers or users might belong to a partner organization.
The process of moving resources, either individually or in a group, back to their preferred node after the node has failed and come back online.
See also: failback policy; node; resourceParameters that an administrator can set using Cluster Administrator that affect failback operations.
See also: Cluster Administrator; failbackA state that applies to a resource or a node in a cluster. A resource or a node is placed in the failed state after an unsuccessful attempt has been made to bring it online.
See also: cluster; node; resourceIn server clusters, the process of taking resource groups offline on one node and bringing them online on another node. When failover occurs, all resources within a resource group fail over in a predefined order; resources that depend on other resources are taken offline before, and are brought back online after, the resources on which they depend.
See also: failover policy; node; offline; possible owner; server clusterParameters that an administrator can set, using Cluster Administrator, that affect failover operations.
See also: Cluster Administrator; failoverA derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.
See also: file allocation table (FAT)The ability of computer hardware or software to ensure data integrity when hardware failures occur. Fault-tolerant features appear in many server operating systems and include mirrored volumes, RAID-5 volumes, and server clusters.
See also: cluster; mirrored volume; RAID-5 volumeA system service that provides fax services to local and remote network clients. Fax services include receiving faxes and faxing documents, fax wizard messages, and e-mail messages.
See also: serviceA standard entitled Security Requirements for Cryptographic Modules. FIPS 140-1 (1994) and FIPS 140-2 (2001) describe government requirements for hardware and software cryptomodules used in the U.S. government.
See also: cryptographyA file system used by
A small block of memory temporarily assigned by a computer's operating system to hold information about a file that has been opened for use. An FCB typically contains such information as the file's identification, its location on disk, and a pointer that marks the user's current (or last) position in the file.
A four-character sequence that identifies which program was used to create a file. With Services for Macintosh, you can associate file name extensions with file creators and file types to specify which program starts automatically when you open a file with a particular extension.
See also: extension-type associationA pseudo-random cryptographic key that Encrypting File System (EFS) uses to encrypt a file. The FEK is encrypted by the public key of the user performing the encryption, and it is typically different for each encrypted file.
See also: Encrypting File System (EFS); encryption; key; public keyOne of two subfiles of a Macintosh file. When Macintosh files are stored on a computer running Services for Macintosh, each fork is stored as a separate file. Each fork can be independently opened by Macintosh users.
A service that provides multimaster file replication for designated directory trees between designated servers running Windows Server 2003. The designated directory trees must be on disk partitions formatted with the version of NTFS used with the Windows Server 2003 family. FRS is used by Distributed File System (DFS) to automatically synchronize content between assigned replicas and by Active Directory to automatically synchronize content of the system volume information across domain controllers.
See also: Active Directory; NTFS file system; replica; replication; serviceA service that allows users of Macintosh computers to store, access, and share files on servers running Services for Macintosh. Also called MacFile.
See also: serviceIn a server cluster, any folder that has an associated File Share resource and is managed by the Cluster service. The file share can fail over from one node to another, but to the end user, the folder looks like a regular folder that remains in one location. Multiple users can access a file share.
See also: cluster; resource; serviceA file share accessible by a network path that is supported as a cluster resource by a Resource DLL.
See also: Resource DLLIn an operating system, the overall structure in which files are named, stored, and organized. NTFS, FAT, and FAT32 are types of file systems.
See also: FAT; FAT32; NTFS file systemAn area of physical memory that holds frequently used pages. It allows applications and services to locate pages rapidly and reduces disk activity.
See also: cacheA member of the TCP/IP suite of protocols, used to copy files between two computers on the Internet. Both computers must support their respective FTP roles: one must be an FTP client and the other an FTP server.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)In the Windows environment, a designation of the operational or structural characteristics of a file. The file type identifies the program, such as Microsoft Word, that is used to open the file. File types are associated with a file name extension. For example, files that have the .txt or .log extension are of the Text Document type and can be opened using any text editor.
In the Macintosh environment, a four-character sequence that identifies the type of a Macintosh file. The Macintosh Finder uses the file type and file creator to determine the appropriate desktop icon for that file.
For Indexing Service, software that extracts content and property values from a document to index them.
For Internet Protocol security (IPSec), a specification of Internet Protocol (IP) traffic that provides the ability to trigger security negotiations for a communication based on the source, destination, and type of IP traffic.
For Internet Information Services (IIS), a feature of Internet Server Application Programming Interface (ISAPI) that allows preprocessing of requests and postprocessing of responses, permitting site-specific handling of Hypertext Transfer Protocol (HTTP) requests and responses.
In IP and Internetwork Packet Exchange (IPX) packet filtering, a definition in a series of definitions that indicates to the router the type of traffic allowed or disallowed on each interface.
See also: Indexing Service; Internet Information Services (IIS); Internet Protocol (IP); Internet Protocol security (IPSec); Internet Server Application Programming Interface (ISAPI); Internetwork Packet Exchange (IPX)For Network Load Balancing, the method by which network traffic inbound to a cluster is handled by the hosts within the cluster. Traffic can either be handled by a single server, load balanced among the hosts within the cluster, or disabled completely.
See also: cluster; host; load balancing; Network Load BalancingA combination of hardware and software that provides a security system, usually to prevent unauthorized access from outside to an internal network or intranet. A firewall prevents direct communication between network and external computers by routing communication through a proxy server outside the network. The proxy server determines whether it is safe to let a file pass through to the network. Also called a security-edge gateway.
See also: proxy serverSoftware routines and low-level input/output instructions stored in read-only memory (ROM). Unlike random-access memory (RAM), read-only memory stays intact even in the absence of electrical power.
See also: random access memory (RAM); read-only memory (ROM)A graphic design applied to a collection of numbers, symbols, and characters. A font describes a certain typeface, along with other qualities such as size, spacing, and pitch.
See also: OpenType fonts; PostScript fonts; screen font; Type 1 fontsA plug-in unit available for some printers that contains fonts in several styles and sizes. As with downloadable fonts, printers using font cartridges can produce characters in sizes and styles other than those created by the fonts built into it.
See also: downloadable fonts; fontThe program that runs in the active window (the uppermost window with the highlighted title bar). The foreground program responds to commands issued by the user.
See also: background program; title barA computer that uses another message queuing system but, through a connector application, can exchange messages with computers that run Message Queuing.
See also: connector application; Message QueuingAn object in a domain that represents a security principal that exists in a trusted domain located in a different forest. Foreign security principals are necessary for users in a domain to access resources that exist in a different forest.
See also: domain; forest; object; resource; security principalOne or more Active Directory domains that share the same class and attribute definitions (schema), site and replication information (configuration), and forest-wide search capabilities (global catalog). Domains in the same forest are linked with two-way, transitive trust relationships.
See also: Active Directory; domain; global catalog; schema; transitive trust; two-way trustThe functional level of an Active Directory forest that has one or more domain controllers running Windows Server 2003. The functional level of a forest can be raised to enable new Active Directory features that will apply to every domain in the forest. There are three forest functional levels: Windows 2000, Windows Server 2003 interim, and Windows Server 2003. The default forest functional level is Windows 2000. When the forest functional level is raised to Windows Server 2003 interim or Windows Server 2003, advanced forest-wide Active Directory features are available.
See also: Active Directory; domain; domain controller; forestThe first domain created in a new forest. The forest-wide administrative groups, Enterprise Admins and Schema Admins, are located in this domain. As a best practice, new domains are created as children of the forest root domain.
See also: child domain; domain; domain hierarchy; forestA trust between two Windows Server 2003 forests that forms trust relationships between every domain in both forests. A forest trust can be created only between the forest root domains in each forest. Forest trusts are transitive, and they can be one-way or two-way. An administrator must manually establish a forest trust, unlike an automatically established trust, such as a parent-child trust.
See also: domain; forest; one-way trust; parent-child trust; root domain; transitive trust; trust relationship; two-way trustThe specification of physical characteristics such as paper size (that is, letter or legal) and printer area margins of paper or other print media. For example, by default, the Letter form has a paper size of 8.5 inches by 11 inches and does not reserve space for margins.
A family of security products including PCMCIA-based cards, compatible serial port devices, combination cards (such as FORTEZZA/Modem and FORTEZZA/Ethernet), server boards, and others. FORTEZZA is a registered trademark held by the U.S. National Security Agency.
See also: serial portA DNS query for a DNS name.
See also: Domain Name System (DNS)A DNS server designated by other internal DNS servers to be used to forward queries for resolving external or offsite DNS domain names.
See also: DNS server; domain name; Domain Name System (DNS)The scattering of parts of the same disk file over different areas of the disk. Fragmentation occurs as files on a disk are deleted and new files are added. It slows disk access and degrades the overall performance of disk operations, although usually not severely.
See also: defragmentationIn synchronous communication, a package of information transmitted as a single unit from one device to another.
See also: captureThe way in which a network type, such as Ethernet, formats data to be sent over a network. When multiple frame types are allowed for a particular network type, the packets are structured differently and are, therefore, incompatible. All computers on a network must use the same frame type to communicate. Also called frame format.
See also: frame; packetA logical collection of unused data-storage media that can be used by applications or other media pools. When media are no longer needed by an application, they are returned to a free media pool so that they can be used again.
See also: media pool; Removable StorageAvailable space that you use to create logical drives within an extended partition.
See also: extended partition; logical drive; unallocated spaceIn communications, a computer that is located between communications lines and a main (host) computer and used to relieve the host of tasks related to communications; sometimes considered synonymous with communications controller. A front-end processor is dedicated entirely to handling transmitted information, including error detection and control; receipt, transmission, and possibly encoding of messages; and management of the lines running to and from other devices.
See also: hostA fully qualified domain name (FQDN). The full computer name is a concatenation of the computer name (for example, client1) and the primary DNS suffix of the computer (for example, reskit.com.). The same computer could be identified by more than one FQDN. However, it has only one full computer name.
See also: DNS suffix; fully qualified domain name (FQDN)An access control entry (ACE) that assigns all applicable rights to a file system or directory service object.
See also: access control entry (ACE); object; permissionA user's complete name, usually consisting of the last name, first name, and middle initial. The full name is information that Local Users and Groups or Active Directory Users and Computers can maintain as part of the information identifying and defining a user account.
See also: Active Directory Users and Computers; user accountThe standard query type supported by all DNS servers to update and synchronize zone data when the zone has been changed. When a DNS query is made using AXFR as the specified query type, the entire zone is transferred as the response.
See also: DNS server; zoneA system capable of simultaneously transmitting information in both directions over a communications channel.
See also: duplex; half-duplexA DNS name that has been stated to indicate its absolute location in the domain namespace tree. In contrast to relative names, an FQDN has a trailing period (.) to qualify its position to the root of the namespace (host.example.microsoft.com.).
See also: domain name; Domain Name System (DNS); domain namespace; relative nameA dedicated device (or a set of services running on a dedicated computer) that routes network traffic and enables communication between different networking protocols. A gateway is a multiprotocol Internet Protocol (IP) router that translates between different transport protocols or data formats.
See also: device; Internet Protocol (IP)Objects from the Graphics Device Interface (GDI) library of application programming interfaces (APIs) for graphics output devices. In Task Manager, the number of GDI objects currently used by a process.
See also: application programming interface (API); Task ManagerAn application that is supported as a cluster resource by a Resource DLL.
See also: Resource DLLA Windows service that is supported as a cluster resource by a Resource DLL.
See also: Resource DLL; serviceIn an Active Directory network, a normal user account in a user's domain. Most user accounts are global accounts. If there are multiple domains in the network, it is best if each user in the network has only one user account in only one domain, and each user's access to other domains is accomplished through the establishment of domain trust relationships.
In Microsoft Provisioning System, the Exchange server maintains a list of global catalogs, and it maintains a load balance across global catalogs.
See also: Active Directory; domain; global catalogA directory database that applications and clients can query to locate any object in a forest. The global catalog is hosted on one or more domain controllers in the forest. It contains a partial replica of every domain directory partition in the forest. These partial replicas include replicas of every object in the forest, as follows: the attributes most frequently used in search operations and the attributes required to locate a full replica of the object.
In Microsoft Provisioning System, the Exchange server maintains a list of global catalogs, and it maintains a load balance across global catalogs.
See also: Active Directory; attribute; domain controller; forest; replicationA security or distribution group that can contain users, groups, and computers from its own domain as members. Global security groups can be granted rights and permissions for resources in any domain in the forest.
See also: group; local group; member server; permission; user accountA 16-byte value generated from the unique identifier on a device, the current date and time, and a sequence number. A GUID is used to identify a particular device or component.
See also: deviceIn DNS, queries to resolve delegation name server (NS) resource records that do not have corresponding glue address (A) resource records in the same zone.
See also: address (A) resource record; delegation; Domain Name System (DNS); glue record; name server (NS) resource record; zoneIn DNS, a delegation resource record used for locating the authoritative DNS servers for a delegated zone. These records are used to glue zones together and provide an effective delegation and referral path for other DNS servers to follow when resolving a name.
See also: authoritative; delegation; DNS server; Domain Name System (DNS); glue chasing; resource record (RR); zoneA display mode in which lines and characters on the screen are drawn pixel by pixel. Graphics mode displays images by grouping individual dots into shapes, such as the arrowhead of a mouse pointer. It can also preview character formatting, such as boldface and italics, as it will appear in print.
See also: character modeAn Address Resolution Protocol (ARP) Request frame sent by a host for the host's own Internet Protocol version 4 (IPv4) address when the TCP/IP protocol obtains addressing information. Gratuitous ARPs are used to check for duplicate IPv4 addresses on the subnet. If the host receives a reply to the gratuitous ARP request from another host or computer, it detects a conflict for its configured IPv4 address and will not use it.
See also: Address Resolution Protocol (ARP); frame; host; IP address; subnetA collection of users, computers, contacts, and other groups. Groups can be used as security or as e-mail distribution collections. Distribution groups are used only for e-mail. Security groups are used both to grant access to resources and as e-mail distribution lists.
See also: domain; global group; local groupA collection of user accounts. By making a user account a member of a group, you give the related user all the rights and permissions granted to the group.
See also: group; user accountThe groups to which a user account belongs. Permissions and rights granted to a group are also provided to its members. In most cases, the actions a user can perform in Windows are determined by the group memberships of the user account to which the user is logged on.
See also: group; user accountThe infrastructure within Active Directory directory service that enables directory-based change and configuration management of user and computer settings, including security and user data. You use Group Policy to define configurations for groups of users and computers. With Group Policy, you can specify policy settings for registry-based policies, security, software installation, scripts, folder redirection, remote installation services, and Internet Explorer maintenance. The Group Policy settings that you create are contained in a Group Policy object (GPO). By associating a GPO with selected Active Directory system containers—sites, domains, and organizational units—you can apply the GPO's policy settings to the users and computers in those Active Directory containers. To create an individual GPO, use the Group Policy Object Editor. To manage Group Policy objects across an enterprise, you can use the Group Policy Management console.
See also: Active Directory; Group Policy Management console (GPMC); Group Policy object (GPO); Group Policy Object Editor; Group Policy object linkAn optional tool that unifies and centralizes administration of Group Policy.
See also: Group PolicyA collection of Group Policy settings. GPOs are essentially the documents created by the Group Policy Object Editor. GPOs are stored at the domain level, and they affect users and computers that are contained in sites, domains, and organizational units. In addition, each computer has exactly one group of policy settings stored locally, called the local Group Policy object.
See also: Group Policy; Group Policy Management console (GPMC); Group Policy Object Editor; Group Policy object linkThe Microsoft Management Console (MMC) snap-in that is used to edit Group Policy objects (GPOs).
See also: Group Policy Management console (GPMC); Group Policy object (GPO); Group Policy object link; Microsoft Management Console (MMC)A method of applying settings in a Group Policy object (GPO) to an Active Directory container (site, domain, or organizational unit). Linking a GPO applies the settings of that GPO to the users and computers in a site, domain, or organizational unit and, by default, to the users and computers in all child containers.
See also: Active Directory; Group Policy Management console (GPMC); Group Policy object (GPO); inheritance; precedenceThe subtrees of the Group Policy Object Editor that allow a security administrator to manually configure security levels assigned to a Group Policy object (GPO) or local computer policy.
See also: Group Policy object (GPO); Group Policy Object EditorA user who does not have a user account or who does not provide a password.
See also: password; user accountA built-in account used to log on to a computer running Windows when a user does not have an account on the computer or domain or in any of the domains trusted by the computer's domain.
See also: domain; user accountA disk-partitioning scheme that is used by the Extensible Firmware Interface (EFI) in Itanium-based computers. GPT offers more advantages than master boot record (MBR) partitioning because it allows up to 128 partitions per disk, provides support for volumes up to 18 exabytes in size, allows primary and backup partition tables for redundancy, and supports unique disk and partition IDs (GUIDs).
See also: Extensible Firmware Interface (EFI); Itanium; master boot record (MBR)The International Telecommunication Union - Telecommunication (ITU-T) standard for packet-based multimedia communications.
See also: International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T); packetA system capable of transmitting information in only one direction at a time over a communications channel.
See also: duplex; full-duplexIn the user interface, an interface added to an object that facilitates moving, sizing, reshaping, or other functions pertaining to an object. In programming, a pointer to a pointer, that is, a token that lets a program access an identified resource.
In Task Manager, the number of object handles in a process's object table.
See also: Task ManagerA series of signals acknowledging that communication can take place between computers or other devices. A hardware handshake is an exchange of signals over specific wires (other than the data wires), in which each device indicates its readiness to send or receive data. A software handshake consists of signals transmitted over the same wires used to transfer data, as in modem-to-modem communications over telephone lines.
See also: device; modem (modulator/demodulator)A hardware list that Microsoft compiled for specific products, including Windows 2000 and earlier versions of Windows. The list for a specific product, such as Windows 2000, includes the hardware devices and computer systems that are compatible with that version of the product. For products in the Windows Server 2003 family, you can find the equivalent information on the Windows Catalog Web site.
See also: device; Windows CatalogA feature available on some tape devices that automatically compresses the data that is being stored on the device. This is usually an option that is turned on or off in a backup program.
See also: backup; deviceResource settings that have been allocated for a specific device. Each device on your computer has a hardware configuration, which can consist of interrupt request (IRQ) lines, direct memory access (DMA), an input/output (I/O) port, or memory address settings.
See also: device; direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ) lines; memory addressA type of digital video disc (DVD) decoder that allows a DVD drive to display movies on your computer screen. A hardware decoder uses both software and hardware to display movies.
See also: DVD decoder; DVD drive; software decoderData that describes the configuration and characteristics of specific computer equipment. This information can be used to configure computers for using peripheral devices.
See also: deviceA classification for similar devices. For example, Imaging Device is a hardware type for digital cameras and scanners.
See also: deviceA fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing. Also called a message digest.
See also: authentication; hash algorithmAn algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1. Also called a hash function.
See also: Hash-based Message Authentication Mode (HMAC); MD2; MD4; MD5; message digest; Secure Hash Algorithm (SHA-1)A mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function (for example, MD5 and SHA-1) in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
See also: hash algorithm; MD5; Secure Hash Algorithm (SHA-1)The fifth byte in the asynchronous transfer mode (ATM) cell header used to detect and correct errors in the ATM header.
See also: asynchronous transfer mode (ATM)A message that is sent at regular intervals by one computer on a Network Load Balancing cluster or server cluster to another computer within the cluster to detect communication failures.
See also: Network Load Balancing; Network Load Balancing cluster; server clusterAn internetwork with servers and workstations running different operating systems, such as Microsoft Windows, Apple Macintosh, or Novell NetWare, using a mix of different transport protocols.
See also: protocol; serverA base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15).
For server clusters, the restarting of a failed application or the dispersion of the work to remaining computers when a computer or application in the server cluster fails.
See also: server clusterA chart consisting of horizontal or vertical bars, the widths or heights of which represent the values of certain data.
A file in which the system stores a portion of the registry (named for their resemblance to the cellular structure of a beehive). A hive is backed by a single file and a .log file, which are in either the systemroot\System32\Config folder or the systemroot\Profiles\username folder.
By default, most hive files (Default, SAM, Security, and System) are stored in the systemroot\System32\Config folder. The systemroot\Profiles folder contains the user profile for each user of the computer. Because a hive is a file, it can be moved from one system to another. However, you must use the Registry Editor, Regedit.exe, to edit the file.
See also: key; registry; systemrootA folder (usually on a file server) that administrators can assign to individual users or groups. Administrators use home folders to consolidate user files onto specific file servers for easy backup. Home folders are used by some programs as the default folder for the Open and Save As dialog boxes. Sometimes referred to as home directories.
See also: groupThe value in the Transport Control field that indicates the number of Internetwork Packet Exchange (IPX) routers that have processed the IPX packet.
See also: Internetwork Packet Exchange (IPX); packet; routerAny device on a TCP/IP network that has an Internet Protocol (IP) address. Examples of hosts include servers, workstations, network-interface print devices, and routers. Sometimes used to refer to a specific network computer that is running a service used by network or remote clients.
For Network Load Balancing, a cluster consists of multiple hosts connected over a local area network (LAN).
See also: client; cluster; local area network (LAN); Network Load Balancing; server; service; Transmission Control Protocol/Internet Protocol (TCP/IP)The portion of the IP address that identifies a computer within a particular network ID.
See also: IP addressThe DNS name of a device on a network. These names are used to locate computers on the network. To find another computer, its host name must either appear in the Hosts file or be known by a DNS server. For most Windows-based computers, the host name and the computer name are the same.
See also: DNS server; Domain Name System (DNS)For Network Load Balancing, a host's precedence for handling default network traffic for TCP and UDP ports. It is used if a host within the cluster goes offline, and it determines which host within the cluster will assume responsibility for the traffic previously handled by the offline host.
See also: cluster; host; Network Load Balancing; User Datagram Protocol (UDP)A local text file in the same format as the 4.3 Berkeley Software Distribution (BSD) UNIX /etc/hosts file. This file maps host names to IP addresses, and it is stored in the \
A common connection point for devices in a network. Typically used to connect segments of a local area network (LAN), a hub contains multiple ports. When data arrives at one port, it is copied to the other ports so that all segments of the LAN can see the data.
See also: local area network (LAN); port; switching hubA mode in which the Address Resolution Protocol/multicast address resolution service (ARP/MARS) provides asynchronous transfer mode (ATM) addresses to requesting clients in the form of a multicast server (MCS) list value. In this mode, ARP/MARS acts as a multicast server, providing active forwarding of all multicast and broadcast traffic destined for IP addresses contained within the ranges specified in the list.
See also: Address Resolution Protocol (ARP); asynchronous transfer mode (ATM); IP address; multicast address resolution service (MARS); multicast server (MCS); nonhubbed modeThe position of a color along the color spectrum. For example, green is between yellow and blue. This attribute can be set using Display in Control Panel.
See also: saturationA simple markup language used to create hypertext documents that are portable from one platform to another. HTML files are simple ASCII text files with codes embedded (indicated by markup tags) to denote formatting and hypertext links.
See also: American Standard Code for Information Interchange (ASCII)The protocol used to transfer information on the World Wide Web. An HTTP address (one kind of Uniform Resource Locator (URL)) takes the following form: http://www.microsoft.com.
See also: protocolA person or entity that must be verified by means of authentication, based on criteria such as a password or a certificate.
See also: authentication; certificate; passwordInstitute of Electrical and Electronics Engineers, founded in 1963. IEEE is an organization composed of engineers, scientists, and students, best known for developing standards for the computer and electronics industry.
A standard for high-speed serial devices such as digital video and digital audio editing equipment.
See also: deviceA server-instance designation used with Internet Information Services (IIS) that supports the WWW and FTP services. IIS server instances are supported as cluster resources by a Resource DLL. IIS Server Instance resources can have dependencies on IP Address resources, Network Name resources, and Physical Disk resources. Access information for server instances does not fail over.
See also: dependency; failover; Internet Information Services (IIS); Resource DLLThe name of a process as displayed in Task Manager.
See also: Task ManagerA circumstance that occurs when Windows allows one process to take on the security attributes of another.
See also: attribute; securityAn access token that captures the security information of a client process, allowing a service to "impersonate" the client process in security operations.
See also: access tokenA logical collection of data-storage media that has not been cataloged by Removable Storage. Media in an import media pool is cataloged as soon as possible so that they can be used by an application.
See also: media pool; Removable StorageA special top-level DNS domain reserved for reverse mapping of IP addresses to DNS host names.
See also: Domain Name System (DNS); reverse lookup; top-level domainsA connection between two computers that relies on a standard network, such as a local area network (LAN) or the Internet, and standard remote administration tools, such as Remote Desktop or Telnet. An in-band connection can only be used to manage computers remotely if both the local and remote computers are in a functional state and accessible on the network.
See also: local area network (LAN); out-of-band connection; TelnetA group whose members can create incoming, one-way forest trusts to the forest-root domain. For example, members of this group residing in forest A can create a one-way incoming forest trust from forest B. This one-way incoming forest trust allows users in forest A to access resources that are located in forest B. Members of this group are assigned the permission Create Inbound Forest Trust on the forest-root domain. This group has no default members.
See also: forest; forest root domain; forest trust; group; one-way trust; permission; resourceA backup that copies only those files created or changed since the last normal or incremental backup. It marks files as having been backed up (in other words, the archive attribute is cleared). If you use a combination of normal and incremental backups to restore your data, you will need to have the last normal backup and all incremental backup sets.
See also: copy backup; daily backup; differential backup; normal backupIn DNS, a zone transfer request involving only incremental resource record changes between each version of the zone. An IXFR contrasts with a full zone transfer (AXFR) request for all resource records.
See also: DNS server; Domain Name System (DNS); full zone transfer (AXFR); zone; zone transferA computer with Message Queuing installed that can host queues and store messages locally. Independent clients do not require synchronous access to a Message Queuing server to send and receive messages, but they can use Message Queuing servers with routing enabled for efficient message routing.
See also: dependent client; Message Queuing server; routing servicesSoftware that provides search functions for documents stored on disk, allowing users to search for specific document text or properties.
Light that is beyond red in the color spectrum. While the light is not visible to the human eye, infrared transmitters and receivers can send and receive infrared signals.
See also: Infrared Data Association (IrDA); infrared device; infrared portThe industry organization of computer, component, and telecommunications vendors who establish the standards for infrared communication between computers and peripheral devices, such as printers.
See also: infrared (IR)A computer, or a computer peripheral such as a printer, that can communicate by using infrared light.
See also: infrared (IR)Wireless file transfer between a computer and another computer or device using infrared light.
See also: infrared (IR)A direct or incoming network connection to a remote access server using an infrared port.
See also: infrared port; remote access serverAn optical port on a computer that enables communication with other computers or devices by using infrared light, without cables. Infrared ports can be found on some portable computers, printers, and cameras.
See also: infrared (IR); infrared device; portA domain controller that holds the infrastructure operations master role in Active Directory. The infrastructure master updates the group-to-user reference whenever group memberships change and replicates these changes across the domain. At any time, the infrastructure master role can be assigned to only one domain controller in each domain.
See also: Active Directory; domain controller; operations masterIn security, a mechanism that allows a specific access control entry (ACE) to be copied from the container where it was applied to all children of the container. Inheritance can be used to manage access to a whole subtree of objects in a single update operation.
In Active Directory, the ability to build new object classes from existing object classes. The new object is defined as a subclass of the original object class. The original object class becomes a superclass of the new object. A subclass inherits the attributes of the superclass, including structure rules and content rules.
In Group Policy, a mechanism that allows policy settings in Group Policy objects (GPOs) that are linked to parent containers to be applied to objects in child containers.
See also: access control entry (ACE); Active Directory; block inheritance; delegation; Enforce; Group Policy Management console (GPMC); Group Policy object (GPO); object class; precedencePermissions on an object that are automatically inherited from its parent object. Inherited permissions cannot be modified.
See also: object; parent object; permissionIn Disk Management, the process of detecting a disk or volume and assigning it a status (for example, healthy) and a type (for example, dynamic).
See also: basic disk; basic volume; dynamic disk; dynamic volumeA Regional and Language Options setting that specifies the combination of the language entered and the keyboard layout, Input Method Editor (IME), speech-to-text converter, or other device used to enter it. Formerly known as input locale.
See also: Input Method Editor (IME)A program used to enter the thousands of different characters in written Asian languages with a standard 101-key keyboard. An IME consists of both an engine that converts keystrokes into phonetic and ideographic characters and a dictionary of commonly used ideographic words. As the user enters keystrokes, the IME engine attempts to identify which character or characters that the keystrokes should be converted into.
A channel through which data is transferred between a device and the microprocessor. The port appears to the microprocessor as one or more memory addresses that it can use to send or receive data.
See also: device; memory address; portWhen referring to software, to add program files and folders to your hard disk and related data to your registry so that the software runs properly. Installing contrasts with upgrading, where existing program files, folders, and registry entries are updated to a more recent version.
When referring to hardware, to physically connect the device to your computer, to load device drivers onto your computer, and to configure device properties and settings.
See also: device driver; registry; uninstall; upgradeA type of disk-drive interface in which the controller electronics reside on the drive itself, eliminating the need for a separate adapter card. IDE offers advantages such as look-ahead caching to increase overall performance.
A limited set of Simple Network Management Protocol (SNMP) functions included in the asynchronous transfer mode (ATM) specification for the ATM user network interface (UNI).
See also: asynchronous transfer mode (ATM); Simple Network Management Protocol (SNMP); user-to-network interface (UNI)A digital phone line used to provide higher bandwidth. ISDN in North America is typically available in two forms: Basic Rate Interface (BRI) consists of 2 B-channels at 64 kilobits per second (Kbps) and a D-channel at 16 Kbps; Primary Rate Interface (PRI) consists of 23 B-channels at 64 Kbps and a D-channel at 64 Kbps. An ISDN line must be installed by the phone company at both the calling site and the called site.
See also: B-channel; D-channel; multilink dialing; Service Profile Identifier (SPID); switch typeA queuing mechanism used to optimize slow (low-capacity) network interfaces by reducing latency. In particular, it is designed for interfaces that forward traffic to modem links, Integrated Services Digital Network (ISDN) B-channels, and sub-T1 links.
See also: B-channel; Integrated Services Digital Network (ISDN)A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS).
See also: authentication protocol; Internet Information Services (IIS)A set of change and configuration management features based on Active Directory that enables management of user and computer data and settings, including security data. IntelliMirror also provides limited ability to deploy software to Windows 2000 and later workstations or servers.
See also: Active DirectoryA dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen.
See also: intermediary device; remote access server; static dialog boxA local logon process to a computer, when the user types information in the Log On to Windows dialog box that is displayed by the computer's operating system or inserts a smart card.
See also: smart cardA device other than a modem or X.25 PAD, located between a network connection and the remote access server. This device is typically a modem-pool switch or security host and requires either a static or interactive dialog box between the client and itself.
See also: interactive dialog box; PAD (packet assembler/disassembler); remote access server; static dialog boxA 4-byte hexadecimal number used for addressing and routing purposes. The internal network number identifies a virtual network inside a computer. The internal network number must be unique to the IPX internetwork. Also called virtual network number.
See also: external network number; Internetwork Packet Exchange (IPX)For Message Queuing, a queue that stores various types of administrative messages, or an interim queue for storing and forwarding messages in transit to a destination queue. Internal private queues are not displayed in Microsoft Management Console (MMC) snap-ins, and they cannot be deleted.
See also: Message Queuing; private queue; queueA router for which all the networks that it is connected to belong in the same area.
See also: routerDigits dialed before the country code to access the international phone service. The actual digits depend on the country or region in which you are dialing an international number. For example, in the United States of America, the prefix for international dialing is 011. To dial from the United States of America to Honduras, which has the country code 504, you would dial:
The sector of the International Telecommunication Union (ITU) responsible for telecommunication standards.
internet. Two or more network segments connected by routers. Another term for internetwork.
Internet. A worldwide network of computers. If you have access to the Internet, you can retrieve information from millions of sources, including schools, governments, businesses, and individuals.
See also: World Wide WebAn address for a resource on the Internet that is used by Web browsers to locate Internet resources. An Internet address typically starts with a protocol name, followed by the name of the organization that maintains the site; the suffix identifies the kind of organization it is. For example, the address http://www.yale.edu/ provides the following information:
The Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server and proxy, which provides authentication and accounting for network access.
See also: authentication; Certificate Services; Remote Access Service (RAS); Remote Authentication Dial-In User Service (RADIUS); service; virtual private network (VPN)A required maintenance protocol in the TCP/IP suite that reports errors and allows simple connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting.
See also: Internet Protocol (IP); protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)An open community of network designers, operators, vendors, and researchers concerned with the evolution of Internet architecture and the smooth operation of the Internet. Technical work is performed by working groups organized by topic areas (such as routing, transport, and security) and through mailing lists. Internet standards are developed in IETF Requests for Comments (RFCs), which are a series of notes that discuss many aspects of computing and computer communication, focusing on networking protocols, programs, and concepts.
See also: Request for Comments (RFC)A protocol used by Internet Protocol version 4 (IPv4) hosts to report their multicast group memberships to any immediately neighboring multicast routers.
See also: Internet Protocol multicasting; Multicast Listener Discovery (MLD); protocolA name known by a DNS service that includes a list of the specific addresses of systems that have registered the name.
See also: Domain Name System (DNS)Software services that support Web site creation, configuration, and management, along with other Internet functions. Internet Information Services include Network News Transfer Protocol (NNTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).
See also: File Transfer Protocol (FTP); Network News Transfer Protocol (NNTP); Simple Mail Transfer Protocol (SMTP)A protocol that establishes the security association and shared keys necessary for two parties to communicate by using Internet Protocol security (IPSec).
See also: Internet Protocol security (IPSec); protocolThe protocol that uses the Hypertext Transfer Protocol (HTTP) to send print jobs to printers throughout the world. Windows 2000, Windows XP, and the Windows Server 2003 family support Internet Printing Protocol (IPP) version 1.0.
See also: protocolA routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing, and the fragmentation and reassembly of IP packets.
See also: Compression Control Protocol (CCP); packet; Transmission Control Protocol/Internet Protocol (TCP/IP); voluntary tunnelThe extension of local area network multicasting technology to a TCP/IP network. Hosts send and receive multicast datagrams, the destination fields of which specify IP host group addresses rather than individual IP addresses. A host indicates that it is a member of a group by means of the Internet Group Management Protocol (IGMP).
See also: Internet Group Management Protocol (IGMP); Transmission Control Protocol/Internet Protocol (TCP/IP)A set of industry-standard, cryptography-based protection services and protocols. IPSec protects all protocols in the TCP/IP protocol suite and Internet communications by using Layer Two Tunneling Protocol (L2TP).
See also: Layer Two Tunneling Protocol (L2TP); protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)An application programming interface (API) that resides on a server computer for initiating software services tuned for Windows operating systems.
In Microsoft Provisioning System, ISAPI resides on the Web server.
See also: application programming interface (API)A company that provides individuals or companies access to the Internet and the World Wide Web. An ISP provides a telephone number, a user name, a password, and other connection information so users can connect their computers to the ISP's computers. An ISP typically charges a monthly or hourly connection fee.
See also: Web serverA network protocol native to NetWare that controls addressing and routing of packets within and between local area networks (LANs). IPX does not guarantee that a message will be complete (no lost packets).
See also: Compression Control Protocol (CCP); Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX); local area network (LAN); Routing Information Protocol over IPX (RIPX)Transport protocols used in Novell NetWare networks, which together correspond to the combination of TCP and IP in the TCP/IP protocol suite. Windows implements IPX through NWLink.
See also: Internetwork Packet Exchange (IPX); NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink); Transmission Control Protocol/Internet Protocol (TCP/IP)A request for attention from the processor. When the processor receives an interrupt, it suspends its current operations, saves the status of its work, and transfers control to a special routine known as an interrupt handler, which contains the instructions for dealing with the particular situation that caused the interrupt.
See also: interrupt request (IRQ)A signal sent by a device to get the attention of the processor when the device is ready to accept or send information. Each device sends its interrupt requests over a specific hardware line. Each device must be assigned a unique IRQ number.
See also: interruptHardware lines over which devices can send signals to get the attention of the processor when the device is ready to accept or send information. Each device must have a unique IRQ line.
See also: device; interrupt request (IRQ)A service that supports transports for asynchronous, site-to-site messaging. Each transport serves two major roles: send/receive and topology queries (such as, what are the various sites connected by this transport, and at what cost?). The intersite messaging services shipped in Windows are remote procedure call (RPC) and Simple Mail Transfer Protocol (SMTP) (mail).
See also: remote procedure call (RPC); service; Simple Mail Transfer Protocol (SMTP)In Active Directory, the replication of directory partition updates between sites. Intersite replication occurs between bridgehead servers that store the same domain or application directory partition. One bridgehead server per domain or application directory partition and per replication transport is designated automatically in each site. If two sites have no domains or application directory partitions in common, a bridgehead server in each site replicates both the configuration and schema directory partitions between the two sites.
See also: Active Directory; bridgehead server; directory partition; intrasite replication; replication; siteAn Active Directory process that runs on one domain controller in a site that considers the cost of intersite connections, checks if previously available domain controllers are no longer available, and checks if new domain controllers have been added. The Knowledge Consistency Checker (KCC) process then updates the intersite replication topology accordingly.
See also: Active Directory; domain controller; Knowledge Consistency Checker (KCC); replication topology; siteIn Active Directory, the replication of directory partition updates that occurs between two or more domain controllers that store the same domain or application directory partition and that reside within the same site.
See also: Active Directory; directory partition; domain controller; intersite replication; siteFor Internet Protocol version 4 (IPv4), a 32-bit address used to identify a node on an IPv4 internetwork. Each node on the IP internetwork must be assigned a unique IPv4 address, which is made up of the network ID, plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for example, 192.168.7.27). You can configure the IP address statically or dynamically by using Dynamic Host Configuration Protocol (DHCP).
For Internet Protocol version 6 (IPv6), an identifier that is assigned at the IPv6 layer to an interface or set of interfaces and that can be used as the source or destination of IPv6 packets.
See also: Dynamic Host Configuration Protocol (DHCP); Internet Protocol (IP); node; scopeA 32-bit number in dotted decimal format that represents an Internet Protocol (IP) address and is supported as a cluster resource by a Resource DLL provided with Windows.
See also: IP address; Resource DLLConfiguration policy that defines which traffic Internet Protocol security (IPSec) examines, how that traffic is secured and encrypted, and how IPSec peers are authenticated.
See also: authentication; encryption; Internet Protocol security (IPSec); policyAn Intel microprocessor that uses explicitly parallel instruction set computing and 64-bit memory addressing.
Itanium-based refers to systems or platforms that are based on the Itanium processor. Itanium 2-based refers to systems or platforms that are based on the Itanium 2 processor. Itanium architecture-based refers to systems or platforms that are based on the Itanium and Itanium 2 processors.
A query made to a DNS server for the best answer the server can provide without seeking further help from other DNS servers. Also called a nonrecursive query.
See also: DNS server; Domain Name System (DNS); recursive query; referralA system-level structure that allows processes to be grouped together and managed as a single unit.
See also: processFor Message Queuing, a queue where journal messages are stored.
See also: journal quota; Message Queuing; queue; source journaling; target journalingFor Message Queuing, a property that specifies the cumulative limit for journal messages in a journal queue. The limit is based on cumulative journal message size. When a journal queue's quota is reached, messages are no longer stored.
See also: journal; Message Queuing; propertyA physical location on a hard disk that points to data located at another location on your hard disk or another storage device. Junction points are created when you create a mounted drive. You can also create a junction point using the linkd command.
See also: mounted driveAn authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPSec) can use the Kerberos protocol for authentication.
See also: Internet Protocol security (IPSec); Key Distribution Center (KDC); realm; service ticket; ticket-granting service (TGS); ticket-granting ticket (TGT)A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware. Also known as supervisor mode, protected mode, or Ring 0.
In Registry Editor, a folder that appears in the left pane of the Registry Editor window. A key can contain subkeys and entries. For example, Environment is a key of HKEY_CURRENT_USER.
In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data. Key settings for IPSec are configurable to provide greater security.
See also: entry; Internet Protocol security (IPSec); registry; subkeyA network service that supplies session tickets and temporary session keys used in the Kerberos V5 authentication protocol.
See also: Kerberos V5 authentication protocol; ticket-granting service (TGS); ticket-granting ticket (TGT)The arrangement that accommodates the special characters and symbols used in different languages. Keyboard layouts affect which characters appear when you press the keys on your keyboard. After you change your keyboard layout, the characters that appear on your screen may no longer correspond to the characters that are printed on your keyboard keys.
A built-in process that runs on all domain controllers and generates the replication topology for the Active Directory forest. At specified intervals, the KCC reviews and makes modifications to the replication topology to ensure propagation of data either directly or transitively.
See also: Active Directory; domain controller; forest; replication topologyIn DNS, each part of a DNS domain name that represents a node in the domain namespace tree. For example, the three labels example, microsoft, and com make up the DNS domain name example.microsoft.com. Each label used in a DNS name cannot exceed 63 octets, 255 bytes including the terminating dot, for the fully qualified domain name (FQDN).
See also: domain name; Domain Name System (DNS); fully qualified domain name (FQDN); nodeA group of software components that allows asynchronous transfer mode (ATM) to work with legacy networks and applications. With LANE, you can run your traditional local area network (LAN)-aware applications and protocols on an ATM network without modification. LANE makes the ATM protocol layers appear to be an Ethernet or Token Ring LAN to overlying protocols and applications. LANE provides an intermediate step between fully exploiting ATM and not using ATM at all.
See also: asynchronous transfer mode (ATM); local area network (LAN); protocol; Token RingThe client on an emulated local area network (ELAN) that performs data forwarding, address resolution, and other control functions. The LEC resides on end stations in an ELAN.
See also: client; emulated local area network (ELAN); LAN emulation (LANE)The service that assigns individual local area network emulation (LANE) clients to particular emulated local area networks (ELANs) by directing them to the LAN emulation server (LES).
See also: emulated local area network (ELAN); LAN emulation (LANE); LAN emulation server (LES); serviceThe central control point for an emulated local area network (ELAN). LES enables LAN emulation (LANE) clients to join the ELAN, and it resolves local area network (LAN) addresses to asynchronous transfer mode (ATM) addresses.
See also: asynchronous transfer mode (ATM); emulated local area network (ELAN); LAN emulation (LANE); local area network (LAN)A hardware configuration that is available by pressing F8 during startup. If the current hardware settings prevent the computer from starting, Last Known Good Configuration can allow you to start the computer and examine the configuration. When Last Known Good Configuration is used, later configuration changes are lost.
See also: Safe ModeIn Active Directory replication, the delay between the time an update is applied to a given replica and the time it is applied to some other replica. Sometimes referred to as propagation delay.
See also: Active Directory; replica; replicationAn industry-standard Internet tunneling protocol that provides encapsulation for sending Point-to-Point Protocol (PPP) frames across packet-oriented media. For IP networks, L2TP traffic is sent as User Datagram Protocol (UDP) messages. In Microsoft operating systems, L2TP is used in conjunction with Internet Protocol security (IPSec) as a virtual private network (VPN) technology to provide remote access or router-to-router VPN connections. L2TP is described in RFC 2661.
See also: frame; Internet Protocol security (IPSec); Point-to-Point Protocol (PPP); tunnel; User Datagram Protocol (UDP)A virtual private network (VPN) connection method that provides session authentication, address encapsulation, and strong encryption of private data between remote access servers and clients. L2TP provides address encapsulation and user authentication, and Internet Protocol security (IPSec) provides computer authentication and encryption of the L2TP session.
See also: authentication; encapsulation; encryption; Internet Protocol security (IPSec); Layer Two Tunneling Protocol (L2TP); virtual private network (VPN)A draft Internet standard for a file format that can be used to perform batch operations on directories that conform to Lightweight Directory Access Protocol (LDAP) standards.
See also: batch program; Lightweight Directory Access Protocol (LDAP)The length of time for which a DHCP client can use a dynamically assigned IP address configuration. Before the lease time expires, the client must either renew or obtain a new lease with DHCP.
See also: DHCP client; Dynamic Host Configuration Protocol (DHCP); IP addressA data-storage system, usually managed by Removable Storage. A library consists of removable media (such as tapes or discs) and a hardware device that can read from or write to the media. There are two major types of libraries: robotic libraries (automated multiple-media, multidrive devices) and stand-alone drive libraries (manually operated, single-drive devices). A robotic library is also called a jukebox or changer.
See also: Removable StorageThe primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3.
See also: Active Directory; directory service; Internet Engineering Task Force (IETF); protocolA service on a print server that receives print jobs from Line Printer Remote (LPR) tools that are running on client computers.
See also: Line Printer Remote (LPR); print job; print server; serviceA connectivity tool that runs on client computers and that is used to print files to a computer running a Line Printer Daemon (LPD) server.
See also: Line Printer Daemon (LPD)A map of an area maintained by Open Shortest Path First (OSPF) routers. It is updated after any change in the network topology. The link state database is used to compute Internet Protocol (IP) routes, which must be computed again after any change in the topology.
See also: adjacency; Internet Protocol (IP); Open Shortest Path First (OSPF)An object that is inserted into a document but still exists in the source file. When information is linked, the new document is updated automatically if the information in the original document changes. If you want to edit the linked information, double-click it. The toolbars and menus from the original program will appear. If the original document is on your computer, changes that you make to the linked information will also appear in the original document.
See also: embedded object; OLE; package; source documentA local text file that maps network basic input/output (NetBIOS) names (commonly used for computer names) to IP addresses for hosts that are not located on the local subnet. In this version of Windows, this file is stored in the systemroot\System32\Drivers\Etc folder.
See also: host; IP address; network basic input/output system (NetBIOS); systemrootA technique used by Windows Clustering to scale the performance of a server-based program (such as a Web server) by distributing its client requests across multiple servers within the cluster. Each host can specify the load percentage that it will handle, or the load can be equally distributed across all the hosts. If a host fails, Windows Clustering dynamically redistributes the load among the remaining hosts.
See also: cluster; hostA Network Load Balancing parameter that specifies the relative amount of load-balanced network traffic that the host handles for the associated port rule. Allowed values range from 0 (zero) to 100. To prevent a host from handling any network traffic, set the load weight to 0 (zero).
See also: Network Load Balancing; Network Load Balancing clusterA communications network connecting a group of computers, printers, and other devices located within a relatively limited area (for example, a building). A LAN enables any connected device to interact with any other on the network.
See also: NetBIOS Extended User Interface (NetBEUI); network basic input/output system (NetBIOS); virtual local area network (VLAN); workgroupThe computer that you are currently logged on to as a user. More generally, a local computer is a computer that you can access directly without using a communications line or a communications device, such as a network adapter or a modem.
See also: remote computerA security group that can be granted rights and permissions on only resources on the computer on which the group is created. Local groups can have any user accounts that are local to the computer as members, as well as users, groups, and computers from a domain to which the computer belongs.
See also: global group; member server; user accountA printer that is directly connected to one of the ports on a computer.
See also: portA protected subsystem that authenticates and logs users on to the local computer. In addition, the LSA maintains information about all aspects of local security on a computer (collectively known as the local security policy), and it provides various services for translation between names and identifiers.
See also: securitySecurity information about all aspects of local security on a computer. The local security policy identifies who is assigned privileges and what security auditing is to be performed.
See also: auditing; securityA service that performs a specific operating system function for other local processes on the computer.
See also: serviceA predefined local account that is used to start a service and provide the security context for that service. The name of the account is NT AUTHORITY\LocalService. The Local Service account has limited access to the local computer and Anonymous access to network resources.
See also: access control list (ACL); Local System account; Network Service account; serviceFor the Windows Server 2003 family, NTFS file system disk volumes used as primary data storage. Such disk volumes can be managed by Remote Storage by copying infrequently accessed files to remote (secondary) storage.
See also: NTFS file system; Remote Storage; volumeA predefined local account that is used to start a service and provide the security context for that service. The name of the account is NT AUTHORITY\System. This account does not have a password, and any password information that you supply is ignored. The Local System account has full access to the system, including the directory service on domain controllers. Because the Local System account acts as a computer on the network, it has access to network resources.
See also: directory service; domain controller; Local Service account; Network Service account; serviceA computer-based record about an authorized user that is created automatically on the computer the first time a user logs on to a workstation or server computer.
The Apple networking hardware built into every Macintosh computer. LocalTalk includes the cables and connector boxes that connect components and network devices that are part of the AppleTalk network system. Formerly known as AppleTalk Personal Network.
A file that stores messages generated by an application, service, or operating system. These messages are used to track the operations performed. For example, Web servers maintain log files listing every request made to the server. Log files are usually plain text (ASCII) files and often have a .log extension.
In Backup, a file that contains a record of the date the tapes were created and the names of files and directories successfully backed up and restored. The Performance Logs and Alerts service also creates log files.
See also: American Standard Code for Information Interchange (ASCII); serviceA volume that you create within an extended partition on a basic master boot record (MBR) disk. Logical drives are similar to primary partitions, except that you are limited to four primary partitions per disk, whereas you can create an unlimited number of logical drives per disk. A logical drive can be formatted and assigned a drive letter.
See also: basic disk; basic volume; drive letter; extended partition; master boot record (MBR); primary partition; volumeA group of Internet Protocol (IP) hosts that belong to the same IP subnet.
See also: host; Internet Protocol (IP); subnetThe software interface between the operating system and the printer in Windows. While a printer is the device that does the actual printing, a logical printer is its software interface on the print server. This software interface determines how a print job is processed and how it is routed to its destination (to a local or network port, to a file, or to a remote print share). When you print a document, it is spooled (or stored) on the logical printer before it is sent to the printer itself.
See also: printer; spoolingIn auditing, a group of events that are logged when a user attempts to log on to or log off from a computer.
See also: auditing; eventUser rights that are assigned to a user and that specify the ways in which a user can log on to a system. An example of a logon right is the right to log on to a system remotely.
See also: user rightsA file, typically a batch file, that runs automatically every time a user logs on to a computer or network. It can be used to configure a user's working environment whenever a user logs on, and it allows an administrator to influence a user's environment without managing all aspects of it. A logon script can be assigned to one or more user accounts.
See also: batch program; logon script path; user accountA sequence of directory names that specifies the location of the logon script. When a user logs on, the authenticating computer locates the specified logon script (if one has been assigned to that user account) by following that computer's local logon script path (usually systemroot\System32\Repl\Import\Scripts).
See also: logon script; systemroot; user accountDigits dialed before the area or city code to access a long distance phone service. For example, in the United States of America, you dial a 1 before the area or city code:
A folder name or file name longer than the 8.3 file name standard (up to eight characters followed by a period and an extension of up to three characters) of the file allocation table (FAT) file system. This version of Windows supports file names up to 255 characters and automatically translates long names of files and folders to 8.3 names for
An advanced Group Policy setting that is useful in certain closely managed environments, such as laboratories, classrooms, public kiosks, and reception areas. You can find the setting and its description in the Group Policy console tree under Computer Configuration\Administrative Templates\System\Group Policy. The full name of this setting is User Group Policy loopback processing mode.
See also: console tree; Group PolicyA form of domain name checking DNS uses that examines characters in DNS names for valid American National Standards Institute (ANSI) character compliance. However, loose name checking does not check for compliance with DNS naming requirements and valid character usage for Internet host names, as specified in RFC 1123, Requirements for Internet Hosts - Applications and Support.
For RFC compliance, DNS domain names will use name labels made up only of valid uppercase and lowercase letters, number characters, and hyphens (A through Z, a through z, 0 through 9, and -) separated by periods.
See also: domain name; Domain Name System (DNS); label; Request for Comments (RFC)The brightness of a color based on a scale from black to white on your monitor.
A service model that requires specific computers and services be used to complete a task. If a user must connect to a specific computer to access a service, then that service is considered machine-centric.
See also: service; service-centricStorage space on the server used for folders and files of Macintosh users. A Macintosh-accessible volume is equivalent to a shared folder for Windows users. Each Macintosh-accessible volume on a computer running Services for Macintosh will correspond to a folder. Both Windows users and Macintosh users can be given access to files located in a folder that is designated as both a shared folder and a Macintosh-accessible volume.
See also: shared folder; volumeFolder and volume permissions that are similar to the access privileges used on a Macintosh.
See also: permission; privilege; volumeA cluster configuration that has two or more nodes and that is configured so that the nodes may or may not be attached to one or more cluster storage devices. The cluster configuration data is stored on multiple disks across the cluster, and the Cluster service makes sure that this data is kept consistent across the different disks. There are advantages and limitations for each cluster configuration (single node server cluster, single quorum device server cluster, and majority node set server cluster).
See also: cluster; cluster storage; node; single node server cluster; single quorum device server clusterThe Macintosh-style privilege that allows you to change the contents of folders for which you have this privilege. If you have the Make Changes privilege, you can modify, rename, move, create, and delete files in folders for which you have that privilege. When Services for Macintosh translates Macintosh-style privileges into Windows permissions, you are granted Write and Delete permissions for any folders for which you have the Make Changes privilege.
See also: privilegeAny program that is created to do intentional harm to or compromise the security of a computer. Examples of malicious programs include trojan horses and computer viruses.
See also: Trojan horse; virusA person who has legitimate access to a system and poses a security threat to it, such as someone who tries to elevate their user rights to gain access to unauthorized data.
See also: security; user rightsA security attack in which an attacker intercepts and possibly modifies data that is transmitted between two users. The attacker pretends to be the other person to each user. In a successful man-in-the-middle attack, the users are unaware that there is an attacker between them, intercepting and modifying their data. Also referred to as a bucket brigade attack.
See also: securityA local NTFS file system 5.0 volume whose disk space is managed by Remote Storage. Remote Storage frees up disk space by automatically moving infrequently accessed files to a remote storage device.
See also: local storage; NTFS file system; Remote Storage; volumeSoftware components that include utilities for network management and monitoring, along with services that support client dialing and the updating of client phone books. Also included is the Simple Network Management Protocol (SNMP).
See also: Simple Network Management Protocol (SNMP)A set of objects that represent various types of information about a device, used by Simple Network Management Protocol (SNMP) to manage the device. Because different network management services are used for different types of devices and protocols, each service has its own set of objects.
See also: service; Simple Network Management Protocol (SNMP)A network-enabled host running Simple Network Management Protocol (SNMP) management software. This software requests information from SNMP agents. Also called a management console.
See also: host; Simple Network Management Protocol (SNMP)A user profile that is not updated when the user logs off. It is downloaded to the user's desktop each time the user logs on, and it is created by an administrator and assigned to one or more users to create consistent or job-specific user profiles. Only members of the Administrators group can change profiles.
See also: roaming user profile; user profileTo translate one value into another. In virtual memory systems, a computer might map a virtual address into a physical address.
See also: virtual memoryThe first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code.
See also: partition boot sector; Recovery ConsoleAn NTFS system file on NTFS-formatted volumes that contains information about each file and folder on the volume. The MFT is the first file on an NTFS volume.
See also: file allocation table (FAT); NTFS file system; volumeAn authoritative DNS server for a zone. Master servers can vary and are one of two types (either primary or secondary masters), depending on how the server obtains its zone data.
See also: authoritative; DNS server; primary master; zone; zone transferTo enlarge a window to its largest size by clicking the Maximize button (at the right of the title bar), or by pressing ALT+SPACEBAR and then pressing X.
See also: minimize; title barThe period of time a password can be used before the system requires the user to change it.
See also: passwordA hash algorithm that creates a 128-bit hash value and was developed by RSA Data Security, Inc.
See also: hash algorithmA hash algorithm that creates a 128-bit hash value and was developed by RSA Data Security, Inc.
See also: hash algorithmAn industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication. A hashing scheme is a method for transforming data (for example, a password) in such a way that the result is unique and cannot be changed back to its original form. The Challenge Handshake Authentication Protocol (CHAP) uses challenge-response with one-way MD5 hashing on the response. In this way, you can prove to the server that you know your password without actually sending the password over the network.
See also: Challenge Handshake Authentication Protocol (CHAP); hash algorithm; MD5; message digestAny fixed or removable objects that store computer data. Examples include hard disks, floppy disks, tapes, and compact discs.
The address that is used for communication between network adapters on the same subnet. Each network adapter has an associated MAC address.
See also: multicast media access control (MAC) address; network adapter; subnetThe original set of files that are copied to a tape or disk from local storage. Remote Storage can make up to three copies of the media master on different storage media. Each copy of the media master is called a copy set.
See also: copy set; media; Remote StorageA logical collection of removable media that have the same management policies. Media pools are used by applications to control access to specific tapes or discs within libraries managed by Removable Storage.
See also: backup media pool; media; Removable StorageA feature that, when it detects a network cable connection failure, removes the bound protocols from the failed network adapter until the cable connection is reestablished. Without these bound protocols, the network interface connected through the failed network adapter is not available for cluster communication.
See also: network adapter; protocolA server that is joined to a domain but is not a domain controller. Member servers typically function as file servers, application servers, database servers, Web servers, certificate servers, firewalls, or remote access servers.
See also: domain; domain controller; stand-alone server; Web serverA portion of computer memory that can be allocated to a device or used by a program or the operating system. Devices are usually allocated a range of memory addresses.
See also: deviceIn Task Manager, the current working set of a process, in kilobytes. The current working set is the number of pages currently resident in memory. On the Task Manager Processes tab, the column heading is Mem Usage.
See also: Task ManagerIn Task Manager, the change in memory, in kilobytes, used since the last update.
See also: Task ManagerFor Message Queuing, a unit of information sent between computers running Message Queuing. The message can contain text or binary data as defined by the sending application. All messages, including status messages, are stored in queues on Message Queuing computers.
See also: Message QueuingAn algorithm that ensures the quality of a block of data.
A message queuing and routing system for Windows that enables distributed applications running at different times to communicate across heterogeneous networks and with computers that may be offline. Message Queuing provides guaranteed message delivery, efficient routing, security, and priority-based messaging. Formerly known as MSMQ.
See also: Microsoft Distributed Transaction Coordinator (MS DTC); MSMQA resource type that can use Message Queuing in a cluster.
See also: cluster; Message Queuing; resource typesFor Message Queuing (formerly known as MSMQ), a computer that can provide message queuing, routing, and directory services to client computers. Message Queuing servers can be used to:
The application programming interface (API) for which Active Directory provides support for backward compatibility with Microsoft Exchange applications. New applications should use Active Directory Service Interfaces (ADSI) for accessing Active Directory.
See also: Active Directory; Active Directory Service Interfaces (ADSI); application programming interface (API)A service that sends and receives messages sent by administrators or by the Alerter service.
See also: Alerter service; performance alert; serviceData about data. For example, the title, subject, author, and size of a file constitute the file's metadata.
A number used to indicate the cost of a route in the Internet Protocol (IP) routing table that enables the selection of the best route among possible multiple routes to the same destination.
See also: Internet Protocol (IP); routingA data-compression standard that allows modems to increase throughput by compressing data before transmission. Data can be compressed with a ratio of up to 2:1. MNP5 sometimes expands data that has already been compressed, resulting in poorer performance in those cases. If you have an MNP5 modem, do not turn on modem compression and software compression at the same time. To turn on MNP5 compression, you must also turn on MNP4 error control.
See also: Microcom Networking Protocol Four (MNP4)An industry-standard communication protocol that allows modems to automatically retransmit corrupted data, assuring that only error-free data passes through the modem. MNP2 and MNP3 standards are included in MNP4.
See also: Microcom Networking Protocol Five (MNP5)A transaction manager that coordinates transactions that span multiple resource managers, such as Message Queuing and Microsoft SQL Server. MS DTC is automatically installed when Message Queuing is installed.
See also: Message Queuing; transactionA framework for hosting administrative tools called snap-ins. A console might contain tools, folders or other containers, World Wide Web pages, and other administrative items. These items are displayed in the left pane of the console, called a console tree. A console has one or more windows that can provide views of the console tree. The main MMC window provides commands and tools for authoring consoles. The authoring features of MMC and the console tree itself might be hidden when a console is in User Mode.
See also: console tree; details pane; snap-inA 128-bit key or 40-bit key encryption algorithm using RSA RC4. MPPE provides for packet confidentiality between the remote access client and the remote access or tunnel server, and it is useful where Internet Protocol security (IPSec) is not available. MPPE 40-bit keys are used to satisfy current North American export restrictions. MPPE is compatible with Network Address Translation.
See also: remote access server; tunnel serverA required partition on every GUID partition table (GPT) disk. System components can allocate portions of the MSR partition into new partitions for their own use. For example, when you convert a basic GPT disk to dynamic, the system allocates a portion of the MSR partition to be used as the Logical Disk Manager (LDM) metadata partition. The MSR partition varies in size based on the size of the GPT disk. For disks smaller than 16 GB, the MSR partition is 32 MB. For disks larger than 16 GB, the MSR partition is 128 MB. The MSR partition is not visible in Disk Management, and you cannot store data on the MSR partition or delete it.
See also: GUID partition table (GPT); partitionThe setup that specifies the type of Musical Instrument Digital Interface (MIDI) device you are using, the channel and patch settings needed to play MIDI files, and the port your device is using.
See also: Musical Instrument Digital Interface (MIDI)To reduce a window to a button on the taskbar by clicking the Minimize button (at the right of the title bar), or by pressing ALT+SPACEBAR and then pressing N.
See also: maximize; title barThe fewest characters a password can contain.
See also: passwordIn DNS, a default Time to Live (TTL) value that is set in seconds and used with all resource records in a zone. This value is set in the start of authority (SOA) resource record for each zone. By default, the DNS server includes this value in query responses. It is used to inform recipients how long they can store and use resource records, which are provided in the query answer, before they must expire the stored records data. When TTL values are set for individual resource records, those values override the minimum TTL.
See also: DNS server; Domain Name System (DNS); resource record (RR); start-of-authority (SOA) resource record; Time to Live (TTL); zoneOne of the two volumes that make up a mirrored volume. Each mirror of a mirrored volume resides on a different disk. If one mirror becomes unavailable (due to a disk failure, for example), Windows can use the remaining mirror to gain access to the volume's data.
See also: fault tolerance; mirrored volume; volumeA fault-tolerant volume that duplicates data on two physical disks. A mirrored volume provides data redundancy by using two identical volumes, which are called mirrors, to duplicate the information contained on the volume. A mirror is always located on a different disk. If one of the physical disks fails, the data on the failed disk becomes unavailable, but the system continues to operate in the mirror on the remaining disk. You can create mirrored volumes only on dynamic disks on computers running the Windows 2000 Server or Windows Server 2003 families of operating systems. You cannot extend mirrored volumes.
See also: dynamic disk; dynamic volume; fault tolerance; RAID-5 volume; volumeIn a Windows 2000 domain, the default domain mode setting. Mixed mode enables Windows NT-based backup domain controllers to coexist with Windows 2000-based domain controllers. Mixed mode does not support universal groups or the nesting of groups. You can change the domain mode setting to native mode when all Windows NT-based domain controllers are removed from a domain.
In Windows Server 2003 domains, mixed mode is referred to as Windows 2000 mixed, and it is one of three domain functional levels available.
See also: Active Directory; backup domain controller (BDC); domain functionality; native mode; universal groupA device that enables computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a telephone line. The receiving modem translates the analog signals back to digital form.
See also: modem compression; null modem cable; port; Telephony API (TAPI); Waiting for CallA technique used to reduce the number of characters transmitted without losing data content. The transmitting modem compresses the data and the receiving computer or modem decompresses the data back to its original state.
See also: modem (modulator/demodulator)Protocols that determine how modems convert digital data into analog signals that can be transmitted over telephone lines.
Initially, Bell created modulation standards used in the United States, and the CCITT created international recommendations. The
A drive attached to an empty folder on an NTFS volume. Mounted drives function the same as any other drive, but are assigned a label or name instead of a drive letter. The mounted drive's name is resolved to a full file system path instead of just a drive letter. Members of the Administrators group can use Disk Management to create mounted drives or reassign drive letters.
See also: drive; mount; NTFS file system; volumeAn operating system used on all personal computers and compatibles. As with other operating systems, it translates user keyboard input into operations the computer can perform.
A program that is designed to run with
The message queuing and routing system for Windows NT 4.0, Windows 95, and Windows 98. For Windows 2000, Windows XP, and the Windows Server 2003 family, this feature is called Message Queuing.
See also: Message QueuingA character set that may consist of both one-byte and two-byte characters. A multibyte-character string may contain a mixture of single-byte and double-byte characters. Windows Server 2003 DNS uses the Unicode Transformation Format 8 (UTF-8) encoding scheme described in RFC 2044 to interpret and transform multibyte characters into single-byte characters of 8-bit length.
See also: Domain Name System (DNS); UCS Transformation Format 8 (UTF-8)An extension to the DHCP protocol standard used to support dynamic assignment and configuration of IP multicast addresses on TCP/IP-based networks.
See also: Dynamic Host Configuration Protocol (DHCP); multicasting; Transmission Control Protocol/Internet Protocol (TCP/IP)A service for resolving multicast IP addresses to the asynchronous transfer mode (ATM) addresses of the clients that have joined that multicast group. MARS can work in conjunction with the multicast server (MCS) and clients to distribute multicast data through point-to-multipoint connections.
See also: asynchronous transfer mode (ATM); IP address; multicast server (MCS); multicastingAn Internet Protocol (IP) datagram sent to a select multicast group of hosts. Each datagram is sent from a single host source for transmission and delivery to multiple host destinations using the Class D IP address reserved for a specified multicast group.
See also: datagram; host; Internet Protocol (IP); multicastingA protocol used by Internet Protocol version 6 (IPv6) hosts to report their multicast group memberships to any immediately neighboring multicast routers.
See also: multicasting; protocolA type of media access control address used by multiple, networked computers to receive the same incoming network frames concurrently. Network Load Balancing uses multicast MAC addresses to efficiently distribute incoming network traffic to cluster hosts.
See also: media access control (MAC) address; multicasting; Network Load BalancingA range of multicast group IP addresses in the Class D address range that are available to be leased or assigned to multicast DHCP clients by DHCP.
See also: address class; Dynamic Host Configuration Protocol (DHCP); IP address; lease; multicastingA service that manages zero or more multicast groups and distributes multicast data sent to it by clients of those multicast groups through point-to-multipoint connections.
See also: multicasting; nonhubbed mode; serviceThe process of sending a message simultaneously to more than one destination on a network.
See also: multicast server (MCS)A computer that has multiple network adapters or that has been configured with multiple IP addresses for a single network adapter.
See also: IP address; network adapter; virtual IP addressThe combination of two or more physical communications links' bandwidth into a single logical link to increase your remote access bandwidth and throughput by using remote access Multilink. Based on the Internet Engineering Task Force (IETF) standard RFC 1990, Multilink combines analog modem paths, Integrated Services Digital Network (ISDN) B-channels, and mixed analog and digital communications links on both your client and server computers. This increases your Internet and intranet access speed and decreases the amount of time you are connected to a remote computer.
See also: bandwidth; B-channel; Integrated Services Digital Network (ISDN)A replication model in which any domain controller accepts and replicates directory changes. This model differs from single-master replication models, in which one domain controller stores the single modifiable copy of the directory and other domain controllers store backup copies.
See also: domain controller; replicationPlaying audio and video immediately as it is downloaded from a network, rather than storing it in a file first.
A computer configuration that runs two or more operating systems.
See also: dual boot; startup environmentA protocol that enables routing over Internet Protocol (IP) and Internetwork Packet Exchange (IPX) networks by connecting local area networks (LANs) or by connecting LANs to wide area networks (WANs).
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); local area network (LAN); wide area network (WAN)A serial interface standard that allows for the connection of music synthesizers, musical instruments, and computers. The MIDI standard is based partly on hardware and partly on a description of the way in which music and sound are encoded and communicated between MIDI devices. The information transmitted between MIDI devices is in a form called a MIDI message, which encodes aspects of sound, such as pitch and volume, as 8-bit bytes of digital information.
MIDI devices can be used for creating, recording, and playing back music. Using MIDI, computers, synthesizers, and sequencers can communicate with each other, either keeping time or actually controlling the music created by other connected equipment.
See also: MIDI setupA folder that provides you with a convenient place to store documents, graphics, or other files you want to access quickly. When you save a file in a program such as WordPad or Paint, the file is automatically saved in My Documents, unless you choose a different folder.
See also: home folderThe identifier of your computer on the network.
The process of having software translate between names that are easy for users to work with and numerical IP addresses, which are difficult for users but necessary for TCP/IP communications. Name resolution can be provided by software components such as DNS or WINS.
See also: Domain Name System (DNS); Transmission Control Protocol/Internet Protocol (TCP/IP); Windows Internet Name Service (WINS)A service, such as that provided by WINS or DNS, that allows friendly names to be resolved to an address, or other specially defined resource data used to locate network resources of various types and purposes.
See also: Domain Name System (DNS); service; Windows Internet Name Service (WINS)A resource record used in a zone to designate the DNS domain names for authoritative DNS servers for the zone.
See also: DNS server; Domain Name System (DNS); resource record (RR); zoneA portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer).
See also: shared resourceA naming convention that defines a set of unique names for resources in a network. For DNS, a hierarchical naming structure that identifies each network resource and its place in the hierarchy of the namespace. For WINS, a flat naming structure that identifies each network resource using a single, unique name.
See also: Domain Name System (DNS); Windows Internet Name Service (WINS)In Windows 2000 domains, the domain mode in which all domain controllers in a domain are running Windows 2000 and a domain administrator has switched the domain operation mode from mixed mode to native mode. Native mode supports universal groups and nesting of groups. In native mode, domain controllers running Windows NT 4.0 or earlier are not supported.
In Windows Server 2003 domains, native mode is referred to as Windows 2000 native, and it is one of three domain functional levels available.
See also: Active Directory; domain functionality; mixed mode; universal groupIn DNS, client caching of failed responses to a query. Negative caching improves the response time for successive queries for the same name.
See also: cache; Domain Name System (DNS)A user-mode service that runs in the Windows security subsystem. The Net Logon service passes the user's credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Net Logon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery.
See also: user mode; user rightsA network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard.
See also: Compression Control Protocol (CCP); local area network (LAN); network basic input/output system (NetBIOS); protocol; Token RingA 16-byte name of a process using network basic input/output system (NetBIOS). The NetBIOS name is a name that is recognized by WINS, which maps the name to an IP address.
See also: IP address; network basic input/output system (NetBIOS); Windows Internet Name Service (WINS)A tool that allows management of Windows domains and trust relationships from the command line.
See also: domain; trust relationshipA method DNS uses to give ordering and preference to IP addresses on the same network when a requesting client queries for a host name that has multiple host address (A) type resource records. This is designed so that the client program will attempt to connect to a host using the closest (and fastest) IP address available.
See also: address (A) resource record; Domain Name System (DNS); host; IP addressThe file-sharing protocol that governs communications about resources (such as disk and printer), bindery, and Novell Directory Services (NDS) operations between server and client computers on a Novell NetWare network.
See also: bindery; Internetwork Packet Exchange (IPX); Novell Directory Services (NDS); protocolThe device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves.
See also: Point-to-Point Protocol (PPP)A device that connects your computer to a network. Sometimes called an adapter card or network interface card.
See also: deviceA device driver that works directly with the network adapter, acting as an intermediary between the adapter and the protocol driver.
See also: device driver; network adapterAn Internet Protocol (IP) translation process that allows a network with private addresses to access information on the Internet.
See also: Internet Protocol (IP)A person responsible for planning, configuring, and managing the day-to-day operation of the network. Also called a system administrator.
See also: administratorAn application programming interface (API) that can be used by programs on a local area network (LAN). NetBIOS provides programs with a uniform set of commands for requesting the lower-level services required to manage names, conduct sessions, and send datagrams between nodes on a network.
See also: application programming interface (API); basic input/output system (BIOS); datagram; local area network (LAN); node; serviceA device that connects networks using the same communications protocols so that information can be passed from one network to the other. Also, a device that connects two local area networks (LANs), whether or not they use the same protocols. A network bridge operates at the ISO/OSI data-link layer.
See also: local area network (LAN); protocolA component you can use to gain access to network resources and functionality, whether you are physically at the network location or in a remote location. By using the Network Connections folder you can create, configure, store, and monitor connections. Formerly called Network and Dial-up Connections or Dial-Up Networking.
A protocol within the Point-to-Point Protocol (PPP) suite that negotiates the parameters of an individual local area network (LAN) protocol such as TCP/IP or Internetwork Packet Exchange (IPX).
See also: Internetwork Packet Exchange (IPX); local area network (LAN); Point-to-Point Protocol (PPP); Transmission Control Protocol/Internet Protocol (TCP/IP)A service that provides network transport and security for dynamic data exchange (DDE) conversations.
See also: dynamic data exchange (DDE); serviceA Microsoft/3Com specification establishing a common shared interface for Microsoft operating systems to support protocol-independent transport of multiple network transport protocols (such as TCP/IP, NetBEUI, IPX/SPX, and AppleTalk). NDIS allows more than one transport protocol to be bound and to operate simultaneously over a single network adapter.
See also: Internetwork Packet Exchange (IPX); Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX); NetBIOS Extended User Interface (NetBEUI); Transmission Control Protocol/Internet Protocol (TCP/IP)A service for distributed computing systems that provides a distributed file system, eliminating the need for keeping multiple copies of files on separate computers.
See also: serviceA device that connects networks using different communications protocols so that information can be passed from one network to the other. A network gateway both transfers information and converts it to a form that is compatible with the protocols being used by the receiving network.
See also: device; protocolA number used to identify the systems that are located on the same physical network bounded by routers. The network ID should be unique to the internetwork.
See also: routerA service for distributed computing systems that provides a distributed database system for common configuration files.
See also: serviceA Windows network component that uses a distributed algorithm to load-balance Internet Protocol (IP) traffic across a number of hosts, helping to enhance the scalability and availability of mission-critical, IP-based services, such as Terminal Services, Web services, virtual private networking, and streaming media. It also provides high availability by detecting host failures and automatically redistributing traffic to the surviving hosts.
See also: availability; cluster; host; scalabilityUp to 32 Web servers from which Network Load Balancing presents a single IP address to Web clients and among which Network Load Balancing distributes incoming Web requests.
See also: IP address; Network Load Balancing; Web serverThe type of physical wiring and lower-layer protocols used for transmitting and receiving packets, for example, Ethernet, Fiber Distributed Data Interface (FDDI), and Token Ring.
See also: packet; protocol; Token RingThe name of a device that exists on a network and is supported as a cluster resource by a Resource DLL provided with Windows.
See also: Resource DLLA member of the TCP/IP suite of protocols used to distribute network news messages to NNTP servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)In the Macintosh environment, the routing address or range of addresses assigned to the physical network that AppleTalk Phase 2 routers use to direct information to the appropriate network. Also called network range and cable range.
See also: routerA state in which one or more of the nodes in a cluster cannot communicate with the other cluster nodes.
See also: cluster; nodeA folder on a Web server. You can view files and folders on Web servers just as you would view files and folders on network servers. However, when you save a file to a network place, the file is saved on a Web server, not on your computer's hard disk. You can create network places by using the Add Network Place Wizard, which is located in My Network Places. Network places are available only on Web servers that support Web Extender Client (WEC), FrontPage extensions, and Distributed Authoring and Versioning (DAV) protocols.
See also: Web serverA predefined local account that is used to start a service and provide the security context for that service. The name of the account is NT AUTHORITY\NetworkService. The Network Service account has limited access to the local computer and authenticated access (as the computer account) to network resources.
See also: access control list (ACL); Local Service account; Local System account; serviceAn interface that defines how switches in a network communicate with each other.
An IP address that includes a subnet bit-mask. Active Directory uses the subnet bit-mask to recognize sites and establish how replication of directory information will occur.
See also: Active Directory; IP address; replication; site; subnetIn Group Policy in the Windows Server 2003 family, to force the Group Policy object (GPO) links of the parent container to take precedence over the GPO links of the child containers. By default, the GPO links that are closest to the user or computer (links to the child container) have higher precedence than GPO links higher up (links to the parent container). Enforcement causes GPOs that are linked in parent containers to take precedence instead. In Group Policy Management console (GPMC), Enforce is used instead of No Override.
See also: block inheritance; Enforce; Group Policy; Group Policy Management console (GPMC); Group Policy object link; inheritance; precedenceFor tree structures, a location on the tree that can have links to one or more items below it.
For local area networks (LANs), a device that is connected to the network and is capable of communicating with other network devices.
For server clusters, a computer system that is an active or inactive member of a cluster.
See also: local area network (LAN); server clusterOperating systems that are not Windows-brand operating systems.
A restore operation performed on an Active Directory domain controller in which the objects in the restored directory are not treated as authoritative. The restored objects are updated with changes held on other domain controllers in the domain.
See also: Active Directory; authoritative restoreAn object that cannot logically contain other objects. For example, a file is a noncontainer object.
See also: container object; objectA namespace based on different DNS root domain names, such as that of multiple trees in the same forest.
See also: domain name; Domain Name System (DNS); forest; namespaceA mode in which asynchronous transfer mode (ATM) Address Resolution Protocol/multicast address resolution service (ARP/MARS) does not forward multicast and broadcast traffic for multicast group clients. In this mode, the service returns a dynamic listing of ATM hosts currently registered for the multicast group address to requesting clients. Clients then use this list to initiate and establish their own point-to-multipoint virtual connections with each of the members in the multicast list.
See also: Address Resolution Protocol (ARP); asynchronous transfer mode (ATM); hubbed mode; multicast address resolution service (MARS); multicast server (MCS)Memory that cannot be paged to disk. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk.
See also: paging file; random access memory (RAM)Operating system memory that is never paged to disk. Paging is the moving of infrequently used parts of a program's working memory from RAM to another storage medium, usually the hard disk. In Task Manager, the amount of memory used by a process, in kilobytes.
See also: paging file; Task ManagerA basic security function of cryptography that ensures that a party in a communication cannot falsely deny that a part of the communication occurred. Without nonrepudiation, someone can communicate and then later deny the communication or claim that the communication occurred at a different time.
See also: cryptographyA trust relationship in a multiple-domain environment that is restricted to just two domains. For example, if domain A has a nontransitive trust with domain B, and domain B trusts domain C, then there is no trust relationship between domain A and domain C. Nontransitive trusts can be one-way or two-way.
See also: forest; nontransitive trust; one-way trust; trust relationship; two-way trustA backup that copies all selected files and marks each file as having been backed up (in other words, the archive attribute is cleared). With normal backups, you need only the most recent copy of the backup file or tape to restore all of the files. You usually perform a normal backup the first time you create a backup set.
See also: copy backup; daily backup; differential backup; incremental backupThe area on the taskbar to the right of the taskbar buttons. The notification area displays the time and can also contain shortcuts that provide quick access to programs, such as Volume Control and Power Options. Other shortcuts can appear temporarily, providing information about the status of activities. For example, the printer shortcut icon appears after a document has been sent to the printer and disappears when printing is complete.
See also: taskbarA list maintained by the primary master for a zone of other DNS servers that should be notified when zone changes occur. The notify list is made up of IP addresses for DNS servers configured as secondary masters for the zone. When the listed servers are notified of a change to the zone, they will initiate a zone transfer with another DNS server and update the zone.
See also: DNS server; IP address; primary master; zone; zone transferOn networks running Novell NetWare 4.x and higher, a distributed database that maintains information about every resource on the network and that provides access to these resources.
See also: resourceA command-line tool used to diagnose DNS infrastructure.
See also: Domain Name System (DNS)An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of file allocation table (FAT). For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. NTFS also provides advanced features, such as file and folder permissions, encryption, disk quotas, and compression.
See also: FAT32; file allocation table (FAT); file systemThe settings that administrators apply to access control entries (ACEs) for managing access to files and folders under the NTFS file system. Take Ownership is an example of an NTFS permission.
See also: access control entry (ACE); access control list (ACL); NTFS file system; permissionA group of NetWare servers. Accounts used to create a gateway must belong to this group.
See also: gatewayA challenge/response authentication protocol. The NTLM authentication protocol is supported in Windows 2000, Windows XP, and the Windows Server 2003 family, but it is not the default. It was the default authentication protocol for earlier versions of Windows.
See also: authentication; protocolSpecial cabling that eliminates the modem's need for asynchronous communications between two computers over short distances. A null modem cable emulates modem communication.
See also: modem (modulator/demodulator)The Microsoft implementation of the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol used on NetWare networks. NWLink allows connectivity between Windows-based computers and NetWare networks running IPX/SPX. NWLink also provides network basic input/output system (NetBIOS) functionality and the Routing Information Protocol (RIP).
See also: Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX); network basic input/output system (NetBIOS); Routing Information Protocol over IPX (RIPX)An entity, such as a file, folder, shared folder, printer, or Active Directory object, described by a distinct, named set of attributes. For example, the attributes of a File object include its name, location, and size; the attributes of an Active Directory User object might include the user's first name, last name, and
For OLE and ActiveX, an object can also be any piece of information that can be linked to, or embedded into, another object.
See also: Active Directory; attribute; child object; OLE; parent objectIn auditing, a group of events that are logged when an object, such as a file or folder, is accessed by means of an action for which auditing has been enabled. For example, object access events might be logged when a file is opened, modified, or deleted.
See also: auditing; event; objectA distinct, named set of attributes that represents a specific type of entity stored in the directory, such as users, printers, or applications. The attributes include data describing the thing that is identified by the directory object. Attributes of a user might include the user's first name, last name, and e-mail address.
See also: attribute; directory; objectA number that identifies an object class or attribute. Object identifiers (OIDs) are organized into an industry-wide global hierarchy. An object identifier is represented as a dotted decimal string, such as 1.2.3.4, with each dot representing a new branch in the hierarchy. National registration authorities issue root object identifiers to individuals or organizations, who manage the hierarchy below their root object identifier.
See also: attribute; object classA state that marks a component in a cluster as unavailable. A node in an offline state is either inactive or not running. Resources and groups also have an offline state.
See also: group; node; online; pending; resourceFor Message Queuing, a condition in which a computer that belongs to a domain is temporarily unable to communicate with a domain controller. This occurs when the computer itself is offline, all domain controllers in the site are offline, or when an attempt is made to access a remote computer and the remote computer is temporarily unable to query a domain controller for authentication.
See also: Message QueuingA way to transfer and share information between applications by pasting information created in one application into a document created in another application, such as a spreadsheet or word processing file.
See also: embedded object; linked object; packageInformation stored on a local disk drive. The on-disk catalog contains a list of files and folders that have been backed up in a backup set.
See also: backup set; on-media catalogInformation stored on backup storage media. The on-media catalog contains a list of files and folders that have been backed up in a backup set.
See also: backup set; on-disk catalogA trust relationship between two domains in which only one of the two domains trusts the other domain. For example, domain A trusts domain B, and domain B does not trust domain A. One-way trusts are often used to enable authenticated access to resource domains.
See also: authentication; domain; trust relationship; two-way trustA state that marks a component in a cluster as available. When a node is online, it is an active member of the cluster and can own and run groups as well as honor cluster database updates, contribute votes to the quorum algorithm, and maintain heartbeats. Resources and groups also have an online state.
See also: cluster; group; heartbeat; node; offline; pending; resourceAn application programming interface (API) that enables database applications to access data from a variety of existing data sources.
See also: application programming interface (API)A routing protocol used in medium-sized and large networks. This protocol is more complex than Routing Information Protocol (RIP), but it allows better control and is more efficient in propagation of routing information.
See also: protocol; routing; Routing Information Protocol (RIP)A networking model introduced by the International Organization for Standardization (ISO) to promote multi-vendor interoperability. OSI is a seven-layered conceptual model consisting of the application, presentation, session, transport, network, data-link, and physical layers.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)Outline fonts that are rendered from line and curve commands, and can be scaled and rotated. OpenType fonts are clear and readable in all sizes and on all output devices supported by Windows. OpenType is an extension of TrueType font technology.
See also: font; TrueType fontsA domain controller that has been assigned one or more special roles in an Active Directory domain. The domain controllers assigned these roles perform operations that are single-master (not permitted to occur at different places on the network at the same time). Examples of these operations include resource identifier allocation, schema modification, PDC emulation, adding and removing domains to and from the forest, and tracking changes to security principals across all domains in a forest.
See also: Active Directory; domain controller; domain naming master; infrastructure master; PDC emulator master; schema masterIn mathematics and in programming and computer applications, a symbol or other character indicating an operation that acts on one or more elements. You can use the following four operators in standard calculations:
/ divide
* multiply
- subtract
+ add
For Indexing Service, a word or character that specifies a relationship in a query.
See also: Indexing ServiceAn Active Directory container object used within domains. An organizational unit is a logical container into which users, groups, computers, and other organizational units are placed. It can contain objects only from its parent domain. An organizational unit is the smallest scope to which a Group Policy object (GPO) can be linked, or over which administrative authority can be delegated.
See also: Active Directory; container object; Group Policy object (GPO); parent domainA company that typically purchases computer components from other manufacturers, uses the components to build a personal computer, preinstalls Windows onto that computer, and then sells the computer to the public.
A member of a mirrored volume or a RAID-5 volume that has failed due to a severe cause, such as a loss of power or a complete hard-disk head failure. When this happens, the fault-tolerant driver determines that it can no longer use the orphaned member and directs all new reads and writes to the remaining members of the fault-tolerant volume.
See also: fault tolerance; mirrored volume; RAID-5 volumeA file that is stored inside My Briefcase and not linked to any file outside My Briefcase. When you update files, the orphan file is not synchronized with any other file.
A protected-mode, virtual memory, multitasking operating system for personal computers based on the Intel 80286, 80386, i486, and Pentium processors. OS/2 can run most
The client-side wizard that walks a user through the installation of an operating system or provides access to maintenance and troubleshooting utilities.
See also: clientA connection between two computers that relies on a nonstandard network connection, such as a serial port connection, and nonstandard remote administration tools, such as Special Administration Console (SAC). An out-of-band connection is usually used only when a remote computer cannot access a network or is not in a functional state because of hardware or software failure.
See also: in-band connection; remote computer; serial portIn a Windows environment, the person who controls how permissions are set on objects and can grant permissions to others.
In the Macintosh environment, an owner is the user responsible for setting permissions for a folder on a server. A Macintosh user who creates a folder on the server automatically becomes the owner of the folder, and can then transfer ownership to someone else. Each Macintosh-accessible volume on the server also has an owner.
See also: permissionIn the Macintosh environment, the user category to which you assign permissions for the owner of a folder or a Macintosh volume.
See also: permission; volumeA network basic input/output system (NetBIOS) implementation that uses point-to-point communication with a WINS server to resolve names as IP addresses.
See also: IP address; network basic input/output system (NetBIOS); Windows Internet Name Service (WINS)An icon that represents embedded or linked information. That information may consist of a complete file, such as a Paint bitmap, or part of a file, such as a spreadsheet cell. When you choose the package, the application used to create the object either plays the object (for example, a sound file) or opens and displays the object. If you change the original information, linked information is automatically updated. However, you must manually update embedded information.
See also: embedded object; linked object; OLEAn Open Systems Interconnection (OSI) network layer transmission unit that consists of binary information representing both data and a header containing an identification number, source and destination addresses, and error-control data.
See also: Open Systems Interconnection (OSI) reference modelPrevents certain types of network packets from either being sent or received. This can be employed for security reasons (to prevent access from unauthorized users) or to improve performance by disallowing unnecessary packets from going over a slow connection.
See also: packetIn network protocol communications, a specially reserved field of a defined bit length that is attached to the front of a packet for carry and transfer of control information. When the packet arrives at its destination, the field is then detached and discarded as the packet is processed and disassembled in a corresponding reverse order for each protocol layer.
See also: packetA technology for breaking data into packets and then sending the packets over a network. Each packet has a header containing its source and destination, a sequence number to reassemble the information, a block of data content, and an error-checking code. The data packets may take different routes to their destination, where the original information is reassembled after the packets arrive. The international standard for packet switching networks is X.25.
See also: packetA device that connects a non-X.25 device such as a modem to an X.25 packet switching network.
See also: packetIn virtual memory systems, a unit of data storage that is brought into random access memory (RAM), typically from a hard drive, when a requested item of data is not already in RAM.
See also: virtual memoryThe interrupt that occurs when software attempts to read from or write to a virtual memory location that is marked not present.
In Task Manager, page fault is the number of times data has to be retrieved from disk for a process because it was not found in memory. The page fault value accumulates from the time the process started.
See also: Page Faults Delta; Task Manager; virtual memoryIn Task Manager, the change in the number of page faults since the last update.
See also: page fault; Task ManagerA computer language that describes the arrangement of text and graphics on a printed page.
See also: PostScript; PostScript fonts; Printer Control Language (PCL); Printer Job Language (PJL)The system-allocated virtual memory that has been charged to a process and that can be paged. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk.
In Task Manager, the amount of system-allocated virtual memory, in kilobytes, used by a process.
See also: registry size limit (RSL); Task Manager; virtual memoryA hidden file or files on the hard disk that Windows uses to hold parts of programs and data files that do not fit in memory. The paging file and physical memory, or random access memory (RAM), comprise virtual memory. Windows moves data from the paging file to memory as needed and moves data from memory to the paging file to make room for new data. Also known as a swap file.
See also: Peak Memory Usage; registry size limit (RSL); virtual memoryThe location (such as Upper Paper Tray or Envelope Feeder) of the paper at the printer.
See also: printerThe input/output connector for a parallel interface device. Printers are generally plugged into a parallel port.
See also: port; serial portFor DNS and Active Directory, domains that are located in the namespace tree directly above other derivative domain names (child domains). For example, microsoft.com would be the parent domain for example.microsoft.com, a child domain.
See also: Active Directory; child domain; domain; Domain Name System (DNS)An object in which another object resides. For example, a folder is a parent object in which a file, or child object, resides. An object can be both a parent and a child object. For example, a subfolder that contains files is both the child of the parent folder and the parent folder of the files.
See also: child object; objectA trust that is automatically established when a new domain (the child domain) is added, or becomes subordinate, to an existing domain (the parent domain). Parent-child trusts are transitive and two-way.
See also: child domain; parent domain; transitive trust; two-way trustA calculated value that is used to reconstruct data after a failure. RAID-5 volumes stripe data and parity intermittently across a set of disks. When a disk fails, some server operating systems use the parity information together with the data on good disks to recreate the data on the failed disk.
See also: fault tolerance; RAID-5 volume; striped volumeIn asynchronous communications, an extra bit used in checking for errors in groups of data bits transferred within or between computer systems. In modem-to-modem communications, a parity bit is often used to check the accuracy with which each character is transmitted.
See also: parityA portion of a physical disk that functions as though it were a physically separate disk. After you create a partition, you must format it and assign it a drive letter before you can store data on it.
On basic disks, partitions are known as basic volumes, which include primary partitions and logical drives. On dynamic disks, partitions are known as dynamic volumes, which include simple, striped, spanned, mirrored, and RAID-5 volumes.
See also: basic disk; basic volume; drive letter; dynamic volume; extended partition; primary partition; system partitionA portion of a hard disk partition that contains information about the disk's file system and a short machine language program that loads the Windows operating system.
See also: partitionA user authentication mechanism that uses standard Web technologies to enable single sign-on access to multiple Web resources.
See also: .NET Passport; authenticationA security measure used to restrict logon names to user accounts and access to computer systems and resources. A password is a string of characters that must be provided before a logon name or an access is authorized. A password can be made up of letters, numbers, and symbols, and it is case sensitive.
See also: maximum password age; minimum password length; user accountA simple, plaintext authentication scheme for authenticating Point-to-Point Protocol (PPP) connections. The user name and password are requested by the remote access server and returned by the remote access client in plaintext.
See also: authentication; password; plaintext; Point-to-Point Protocol (PPP); remote access serverA collection of policy settings that define the password requirements for a Group Policy object (GPO).
See also: Group Policy object (GPO); passwordA sequence of directory (or folder) names that specifies the location of a directory, file, or folder within the Windows directory tree. Each directory name and file name within the path must be preceded by a backslash (\). For example, to specify the path of a file named Readme.doc located in the Windows directory on drive C, type C:\Windows\Readme.doc.
See also: directoryA state that applies to a node in a cluster. The node is a fully active member in the cluster but cannot accept new resource groups (for example, a resource group cannot fail over or fail back to a paused node). You can administer and maintain a paused node.
See also: cluster; failback; failover; node; offlineA removable device, approximately the size of a credit card, that can be plugged into a Personal Computer Memory Card International Association (PCMCIA) slot in a portable computer. PCMCIA devices can include modems, network cards, and hard disk drives.
See also: modem (modulator/demodulator)A domain controller that holds the PDC emulator operations master role in Active Directory. The PDC emulator services network clients that do not have Active Directory client software installed, and it replicates directory changes to any Windows NT backup domain controllers (BDCs) in the domain.
The PDC emulator handles password authentication requests involving passwords that have recently changed and not yet been replicated throughout the domain. At any time, the PDC emulator master role can be assigned to only one domain controller in each domain.
See also: Active Directory; backup domain controller (BDC); domain controller; operations master; primary domain controller (PDC)In Task Manager, the peak amount of physical memory resident in a process since it started.
See also: Task ManagerA state that refers to a resource in a cluster when the resource is in the process of being brought online or taken offline.
See also: offline; online; resourceA licensing mode that requires a separate device-based or user-based Client Access License (CAL) for each device or user that accesses a server running Windows Server 2003, regardless of the number of concurrent connections.
See also: client; device; Per Server LicensingA licensing mode that requires a separate device-based or user-based Client Access License (CAL) for each concurrent connection to a server running Windows Server 2003.
See also: client; device; Per Device or Per User LicensingA feature that detects when a predefined counter value rises above or falls below the configured threshold and notifies a user by means of the Messenger service.
See also: Messenger serviceIn System Monitor, a data item that is associated with a performance object. For each counter selected, System Monitor presents a value corresponding to a particular aspect of the performance that is defined for the performance object.
See also: performance objectIn System Monitor, a logical collection of counters that is associated with a resource or service that can be monitored.
See also: performance counterIn System Monitor, a term used to distinguish between multiple performance objects of the same type on a computer.
See also: performance objectAn Internet Protocol (IP) network segment that contains resources, such as Web servers and virtual private network (VPN) servers, that are available to Internet users. Also known as screened subnet or demilitarized zone (DMZ).
See also: Internet Authentication Service (IAS); Internet Protocol (IP); virtual private network (VPN)A virtual circuit assigned to a preconfigured static route.
See also: static routesA rule associated with an object to regulate which users can gain access to the object and in what manner. Permissions are assigned or denied by the object's owner.
See also: object; privilegeA secret identification code that is used to protect smart cards from misuse. The PIN is similar to a password and is known only to the owner of the card. The smart card can be used only by someone who possesses the smart card and knows the PIN.
See also: smart cardA feature of x86-based servers that allows computers running Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, to support more than 4 gigabytes (GB) of physical memory. Physical Address Extension (PAE) allows up to 64 GB of physical memory to be used as regular 4-kilobyte (KB) pages and expands the number of bits that can be used by the kernel to address physical memory from 32 to 36.
See also: x86A disk on a cluster storage device. Physical disks are supported as cluster resources by a Resource DLL.
See also: Resource DLLThe protection of critical data repositories and paths through the use of physical barriers. Physical barriers range in effectiveness and complexity from locked doors to multilayer access control systems involving proof of identity and explicit access permissions.
See also: securityA utility that verifies connections to one or more remote hosts. The ping command uses Internet Control Message Protocol (ICMP) echo request and echo reply packets to determine whether a particular Internet Protocol (IP) system on a network is functional. Ping is useful for diagnosing IP network or router failures.
See also: host; Internet Control Message Protocol (ICMP); Internet Protocol (IP); packetShort for picture element, one spot in a rectilinear grid of thousands of such spots that form an image produced on the screen by a computer or on paper by a printer. A pixel is the smallest element that display or print hardware and software can manipulate to create letters, numbers, or graphics. Also called a pel.
See also: screen resolutionThe Certification Request Syntax Standard, developed and maintained by RSA Data Security, Inc.
See also: certificate; Public Key Cryptography Standards (PKCS); Rivest-Shamir-Adleman (RSA) cryptographic algorithmsPersonal Information Exchange Syntax Standard, developed and maintained by RSA Data Security, Inc. This standard primarily provides a format for storing keys or a certificate in a file.
See also: certificate; Public Key Cryptography Standards (PKCS); Rivest-Shamir-Adleman (RSA) cryptographic algorithmsThe Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital signatures and encryption. It also provides a syntax for disseminating certificates or certificate revocation lists.
See also: certificate; certificate revocation list (CRL); encryption; Public Key Cryptography Standards (PKCS)Data that is not encrypted. Sometimes also called cleartext.
See also: encryptionA font created by a series of dots connected by lines. Plotter fonts can be scaled to any size and are most often printed on plotters. Some dot-matrix printers also support plotter fonts.
See also: fontA set of specifications developed by Intel Corporation that enables a computer to detect and configure a device automatically and install the appropriate device drivers.
See also: universal serial bus (USB)The local access point for a network provider. Each POP provides a telephone number that allows users to make a local call for access to online services.
Basic dial telephone connections to the public switched network, without any added features or functions. Also called plain old telephone service.
An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams. PPP is documented in RFC 1661.
See also: Compression Control Protocol (CCP); remote access; Request for Comments (RFC); Transmission Control Protocol/Internet Protocol (TCP/IP); voluntary tunnelNetworking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP), Internetwork Packet Exchange (IPX), or NetBIOS Extended User Interface (NetBEUI) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols.
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); NetBIOS Extended User Interface (NetBEUI); packet; tunnel; virtual private network (VPN)A DNS resource record used in a reverse lookup zone to map an IP address to a DNS name.
See also: Domain Name System (DNS); in-addr.arpa domain; IP address; resource record (RR); reverse lookup; zoneA process that, used with split horizon, improves Routing Information Protocol (RIP) convergence over simple split horizon by advertising all network IDs. However, the network IDs learned in a given direction are advertised with a hop count of 16, indicating that the network is unavailable.
See also: hop count; Routing Information Protocol (RIP); split horizonThe mechanism by which computer settings are configured automatically, as defined by the administrator. Depending on context, this can refer to Group Policy or Windows NT 4.0 System Policy.
See also: Group Policy; Group Policy object (GPO); System PolicyThe frequency the Resource Monitor checks that the resource is available and operating. There are two levels of polling: Looks Alive and Is Alive. The server cluster requests a more thorough check of the resource's state at each Is Alive interval than it does at each Looks Alive interval; therefore, the Is Alive polling interval is typically longer than the Looks Alive polling interval. You can specify the two polling intervals and a time-out value for resources.
See also: resource; Resource MonitorA popular protocol used for receiving e-mail messages. This protocol is often used by Internet service providers (ISPs). POP3 servers allow access to a single Inbox in contrast to Internet Message Access Protocol (IMAP) servers, which provide access to multiple server-side folders.
See also: Internet service provider (ISP); Simple Mail Transfer Protocol (SMTP)A connection point on your computer where you can connect devices that pass data into and out of a computer. For example, a printer is typically connected to a parallel port (also called an LPT port), and a modem is typically connected to a serial port (also called a COM port).
See also: parallel port; serial port; universal serial bus (USB)A form of network access control that uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices that are attached to a LAN port and to prevent access to that port if the authentication process fails. This form of network access control is used in 802.1X authentication.
See also: 802.1X authentication; access control; authentication; local area network (LAN); portThe method that Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) use to specify which program running on the system is sending or receiving the data.
See also: User Datagram Protocol (UDP)For Network Load Balancing, a set of configuration parameters that determine the filtering mode to be applied to a range of ports.
See also: filtering mode; Network Load Balancing; portA method that is used to identify services or programs that respond to service requests that are made over a network port.
See also: port; serviceAn Institute of Electrical and Electronics Engineers (IEEE) standard that defines a set of operating-system services. Programs that adhere to the POSIX standard can be easily ported from one system to another. POSIX was based on UNIX system services, but it was created in a way that allows it to be implemented by other operating systems.
See also: serviceA node in a cluster that can run a specific resource. By default, all nodes appear as possible owners, so the resource can run on any node. In most cases, it is appropriate to use this default setting. If you want the resource to be able to fail over, at least two nodes must be designated as possible owners.
See also: cluster; failover; node; resourceA page-description language (PDL), developed by Adobe Systems for printing on laser printers. PostScript offers flexible font capability and high-quality graphics. It is the standard for desktop publishing because it is supported by imagesetters, the high-resolution printers used by printing services for commercial typesetting.
See also: page-description language (PDL); PostScript fonts; PostScript printer; Printer Control Language (PCL); Printer Job Language (PJL); service; Type 1 fontsFonts that are defined in terms of the PostScript page-description language (PDL) rules and are intended to be printed on a PostScript-compatible printer. When a document displayed in a screen font is sent to a PostScript printer, the printer uses the PostScript version if the font exists. If the font doesn't exist but a version is installed on the computer, that font is downloaded to the printer. If there is no PostScript font installed in either the printer or the computer, the bit-mapped (raster) font is translated into PostScript and the printer produces text using the bit-mapped font. PostScript fonts are distinguished from bit-mapped fonts by their smoothness, detail, and faithfulness to standards of quality established in the typographic industry.
See also: downloadable fonts; font; page-description language (PDL); PostScript; raster fontsA printer that uses the PostScript page-description language (PDL) to create text and graphics on the output medium, such as paper or overhead transparency. Examples of PostScript printers include the Apple LaserWriter, the NEC LC-890, and the QMS PS-810.
See also: page-description language (PDL); PostScript; virtual printer memoryA feature of an uninterruptible power supply (UPS) that removes spikes, surges, sags, and noise from the power supply.
See also: uninterruptible power supply (UPS)A group whose members can manage accounts, resources, and applications that are installed on a workstation, stand-alone server, or member server. This group does not exist on domain controllers. Administrative tasks that can be performed by members of this group include creating local users and groups; modifying and deleting accounts that they have created; removing users from the Power Users, Users, and Guests groups; installing most applications; and creating and deleting file shares.
See also: domain controller; group; member server; stand-alone serverIn Group Policy, the application hierarchy, based on the order in which Group Policy objects (GPOs) are applied. The GPO that is applied last takes precedence over all other objects.
See also: Group Policy Management console (GPMC); Group Policy object (GPO); Group Policy object link; inheritanceA key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key.
See also: hive; key; registryThe node on which you prefer each group to run. For example, the static load balancing model performs best when groups are appropriately balanced between two nodes. When a node fails, the remaining node takes over the groups from the failed node, but performance is diminished. By setting those groups to fail back to their preferred server (the failed node), you automatically restore maximum performance when failback occurs. A group does not fail back if a preferred owner is not selected.
You will not always choose a preferred owner because it may not matter where the group resides; all that matters is that the group is still running on one of the two nodes. Or, the nodes may be equally capable of handling the load required to use some or all of the resources.
See also: failback; group; node; resourceThe NetWare server that you connect to by default when you log on to your computer. The preferred server validates your user credentials and is queried when you request information about resources available on the NetWare network.
See also: credentials; resourceA form of security in which a remote access server verifies users by calling them back at numbers supplied by the network administrator at the time user privileges are granted. Only a network administrator can change a preset callback number. This ensures that no one can borrow a user's password and connect to the server from a location other than the user's normal one.
See also: callback number; remote access serverAn Internet Protocol security (IPSec) technology in which a shared, secret key is used for authentication in IPSec policy.
See also: authentication; Internet Protocol security (IPSec); IPSec policy; keyTo create a computer account in Active Directory before an operating system has been installed on the computer that will use the account. Prestaging is a part of supporting Remote Installation Services (RIS) for the client computer, and it ensures smooth client installations because the newly installed client computer is immediately recognized as having an account in Active Directory. The computer account information must include the globally unique identifier (GUID), which RIS uses to identify the client computer. An administrator can also use prestaging to control which computers can be installed through RIS.
See also: Active Directory; computer account; globally unique identifier (GUID); Remote Installation Services (RIS)The hard disk drive that contains the system and boot partitions used to start Windows.
See also: boot partition; system partitionIn a Windows NT domain, a domain controller running Windows NT Server 4.0 or earlier that authenticates domain logon attempts and updates user, computer, and group accounts in a domain. The PDC contains the master read-write copy of the directory database for the domain. A domain has only one PDC.
In a Windows 2000 or Windows Server 2003 domain, the PDC emulator master supports compatibility with client computers that are not running Windows 2000 or Windows XP Professional.
See also: Active Directory; backup domain controller (BDC); mixed mode; PDC emulator masterThe group with which a Macintosh user usually shares documents stored on a server. You specify a user's primary group in the user's account. When a user creates a folder on the server, the user's primary group is set by default as the folder's associated group.
See also: groupAn authoritative DNS server for a zone that can be used as a point of update for the zone. Only primary masters have the ability to be updated directly to process zone updates, which include adding, removing, or modifying resource records that are stored as zone data. Primary masters are also used as the first sources for replicating the zone to other DNS servers.
See also: DNS server; replication; resource record (RR); zoneA type of partition that you can create on basic disks. A primary partition is a portion of a physical disk that functions as though it were a physically separate disk. On basic master boot record (MBR) disks, you can create up to four primary partitions on a basic disk, or three primary partitions and an extended partition with multiple logical drives. On basic GUID partition table (GPT) disks, you can create up to 128 primary partitions. Also known as a volume.
See also: basic disk; extended partition; GUID partition table (GPT); logical drive; master boot record (MBR); partition; volumeThe security guideline that a user should have the minimum privileges necessary to perform a specific task. This helps to ensure that, if a user is compromised, the impact is minimized by the limited privileges held by that user. In practice, a user runs within the security context of a normal user. When a task requires additional privileges, the user can use a tool such as Run as to start a specific process with those additional privileges or to log on as a user with the necessary privileges.
See also: privilege; securityThe source code that contains both the data to be printed and the commands for print. Print jobs are classified into data types based on what modifications, if any, the spooler must make to the job for it to print correctly.
See also: print spooler; Printer window; printing poolThe component that, working in conjunction with the printer driver, receives and alters print jobs, as necessary, according to their data type to ensure that the jobs print correctly.
See also: print job; printer driverA computer that is dedicated to managing the printers on a network. The print server can be any computer on the network.
See also: printerA service that enables Macintosh clients to send and spool documents to printers attached to a computer running Windows NT Server; Windows 2000 Server; or an operating system in the Windows Server 2003 family, excluding 64-bit editions, and that enables clients to send documents to printers anywhere on an AppleTalk network. Also known as MacPrint.
See also: serviceSoftware that accepts a document sent to a printer and then stores it on disk or in memory until the printer is ready for it.
See also: printer; spoolingPrinter queues providing access to a network printer connected to the network by an IP address rather than by an individual name. Print spoolers are supported as cluster resources by a Resource DLL.
See also: IP address; print spooler; Resource DLLA device that puts text or images on paper or other print media. Examples are laser printers or dot-matrix printers.
See also: logical printer; print spooler; printing poolThe page-description language (PDL) developed by Hewlett-Packard for their laser and inkjet printers. Because of the widespread use of laser printers, this command language has become a standard in many printers.
See also: page-description language (PDL); PostScript; Printer Job Language (PJL)A program designed to allow other programs to work with a particular printer without concerning themselves with the specifics of the printer's hardware and internal language. By using printer drivers that handle the subtleties of each printer, programs can communicate properly with a variety of printers.
See also: device driverFonts residing in or intended for a printer. A printer font, usually located in the printer's read-only memory (ROM), can be internal, downloaded, or on a font cartridge.
See also: device fonts; downloadable fonts; font; font cartridgeThe printer command language developed by Hewlett Packard that provides printer control at the print-job level. Using PJL commands, you can change default printer settings such as number of copies to print. PJL commands also permit switching printer languages between print jobs without action by the user. If bi-directional communication is supported, a PJL-compatible printer can send information such as printer model and job status to the print server.
See also: page-description language (PDL); PostScript; Printer Control Language (PCL)Permissions that specify the type of access that a user or group has to a printer. The printer permissions are Print, Manage Printers, and Manage Documents.
See also: permissionA window that shows information about any pending print jobs for the printer. For each printer you have installed or to which you are connected, you can view information such as how many documents are waiting to be printed, who owns them, and how large they are. Also called the queue view.
See also: print jobThe folder in Control Panel that contains the Add Printer Wizard and icons for all the printers installed on your computer.
See also: printerTwo or more identical printers that are connected to one print server and act as a single printer. In this case, when you print a document, the print job will be sent to the first available printer in the pool.
See also: print job; printerAn automatic telephone switching system that enables users within an organization to place calls to each other without going through the public telephone network. Users can also place calls to outside numbers.
The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key.
See also: public key; public key encryptionThe ATM Forum standard that defines the interface between asynchronous transfer mode (ATM) switches in a private network or a public network.
See also: asynchronous transfer mode (ATM)For Message Queuing, a queue that is not published in Active Directory and that can be accessed only by applications that have access to the full format name of the queue.
See also: Active Directory; internal private queue; Message Queuing; public queueA Macintosh-accessible volume that is accessible by only one Macintosh user. For a volume to be a private volume, the permissions on its root directory must give the volume's owner all three permissions (Make Changes, See Files, and See Folders), while giving the primary group and everyone categories no permissions at all. When a private volume's owner uses the Chooser to view the volumes available on the server, the private volume is listed; however, no other users can see the private volume when viewing the volumes available on the server.
See also: Chooser; permission; volumeA user's right to perform a specific task, usually one that affects an entire computer system rather than a particular object. Privileges are assigned by administrators to individual users or groups of users as part of the security settings for the computer.
See also: object; permission; user rightsThe virtual address space and the control information necessary for the execution of a program.
See also: socketA numerical identifier that uniquely distinguishes a process while it runs. Use Task Manager to view PIDs.
See also: process; Task ManagerA complete, self-contained set of computer instructions that you use to perform a specific task, such as word processing, accounting, or data management. Also called an application.
A file that provides information to Windows about how best to run
A characteristic or parameter of a class of objects or devices. For example, properties of Microsoft Word files include Size, Created, and Characters.
See also: device; object; property cache; property value; tagFor Indexing Service, a file that stores values for document properties.
See also: document; Indexing Service; propertyA specific characteristic or parameter that defines a property. For example, property values of a specific Microsoft Word document could include Size = 10,000 bytes, Created = Jan 2, 1999, and Characters = 5,250.
See also: propertyThe first sector of a GUID partition table (GPT) disk that is structured like the first sector of a master boot record (MBR) disk to prevent x86-based disk utilities from destroying GPT partitions. The Protective MBR contains one partition that reserves the entire space used on the disk by GPT partitions.
See also: Extensible Firmware Interface (EFI); GUID partition table (GPT); master boot record (MBR); x86A set of rules and conventions for sending information over a network. These rules govern the content, format, timing, sequencing, and error control of messages exchanged among network devices.
See also: Internet Protocol (IP); Transmission Control Protocol/Internet Protocol (TCP/IP)A dynamic-link library (DLL) that identifies the protocols used to send a frame onto the network.
See also: dynamic-link library (DLL); frame; protocolA firewall component that manages Internet traffic to and from a local area network (LAN) and that can provide other features, such as document caching and access control. A proxy server can improve performance by supplying frequently requested data, such as a popular Web page, and it can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files.
See also: firewall; local area network (LAN)The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key.
See also: key; private key; Public Key Cryptography Standards (PKCS); public key encryption; recovery agentA family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc.
See also: certificate; public key cryptographyA method of encryption that uses two encryption keys that are mathematically related. One key is called the private key and is kept confidential. The other is called the public key and is freely given out to all potential correspondents. In a typical scenario, a sender uses the receiver's public key to encrypt a message. Only the receiver has the related private key to decrypt the message. The complexity of the relationship between the public key and the private key means that, provided the keys are long enough, it is computationally infeasible to determine one from the other. Also called asymmetric encryption.
See also: encryption; private key; public key; symmetric encryptionThe laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce.
See also: certificate; certification authority (CA); public keyA cluster network that supports client-to-cluster communication (either with or without supporting node-to-node communication).
See also: cluster; nodeFor Message Queuing, a queue that is published in Active Directory and replicated throughout a Windows enterprise. Public queues can, therefore, be located by any computer running Message Queuing within the enterprise.
See also: Active Directory; Message Queuing; private queue; queueStandard analog telephone lines, available worldwide.
A WINS component that requests replication of updated WINS database entries from its push partner.
See also: push partner; replica; Windows Internet Name Service (WINS)A form of dialing that enters a phone number by means of pulse frequencies. The user typically hears a series of clicking sounds when dialing. Old-fashioned rotary dial phones use pulse dialing.
See also: touch-tone dialingA WINS component that notifies its pull partner when updated WINS database entries are available for replication.
See also: pull partner; replica; Windows Internet Name Service (WINS)An extension of a standard certification authority (CA) that allows you to place certificate issuance constraints on subordinate CAs and to place usage constraints on the certificates that are issued by subordinate CAs.
See also: certificate; certification authority (CA); public key infrastructure (PKI)A set of quality assurance standards and mechanisms for data transmission, implemented in this version of Windows.
For Indexing Service, a structured statement that specifies the documents you want to find. The simplest query is a single word.
See also: Indexing Service; tag; vector; wildcard characterA list of programs or tasks waiting for execution. In Windows printing terminology, a queue refers to a group of documents waiting to be printed. In NetWare and OS/2 environments, queues are the primary software interface between the application and print device; users submit documents to a queue. With Windows, however, the printer is that interface; the document is sent to a printer, not a queue.
See also: printer; transactional messageFor Message Queuing, the storage size limit for messages in public queues. When a queue quota is reached, Message Queuing can no longer send messages to that queue until one or more messages are removed from the queue. Message Queuing enforces the computer quota before it enforces the queue quota on a computer.
See also: computer quota; Message Queuing; queueFor Message Queuing, a globally unique identifier (GUID) specified by the application that created the queue.
See also: globally unique identifier (GUID); Message Queuing; queueA telephone-answering protocol in which incoming calls are answered with silence instead of a tone signal. Some telephone-switching systems use quiet answering. These switching systems expect the caller to provide another phone number, code, or extension after the quiet answer.
See also: protocolThe log where the quorum resource stores data. This data is maintained by the clustering software. Also known as the recovery log or change log.
See also: quorum resource; server clusterThe quorum-capable resource selected to maintain the configuration data necessary for recovery of the cluster. This data contains details of all of the changes that have been applied to the cluster database. The quorum resource is generally accessible to other cluster resources so that any cluster node has access to the most recent database changes. By default there is only one quorum resource per cluster.
See also: node; server clusterIn a majority node set server cluster, the replication traffic between nodes in a cluster. This replication traffic contains the cluster configuration data and ensures that the cluster quorum information is kept in sync across all nodes.
See also: cluster; majority node set server cluster; node; quorum resource; replicationThe amount of disk space available to a user.
See also: warning levelA fault-tolerant volume with data and parity striped intermittently across three or more physical disks. Parity is a calculated value that is used to reconstruct data after a failure. If a portion of a physical disk fails, Windows recreates the data that was on the failed portion from the remaining data and parity. You can create
Memory that can be read from or written to by a computer or other devices. Information stored in RAM is lost when the computer is turned off.
See also: virtual memoryFonts that are stored as bitmaps. Raster fonts are designed with a specific size and resolution for a specific printer and cannot be scaled or rotated. If a printer does not support raster fonts, it will not print them. The five raster fonts are Courier, MS Sans Serif, MS Serif, Small, and Symbol. Also called bit-mapped fonts.
See also: font; printerA socket that provides direct access to lower-level network protocols.
See also: socketA semiconductor circuit that contains information that cannot be modified.
An Internet protocol for transporting real-time traffic over multicast and unicast network services.
See also: protocol; unicastA set of security principles, in a non-Windows networked environment, that are subject to Kerberos authentication.
See also: Kerberos V5 authentication protocolAn identifying prefix or suffix appended to a user name to enable appropriate routing and authentication during a remote logon process.
See also: authentication; routing; user nameA trust between non-Windows Kerberos V5 realms, such as a UNIX realm, and Active Directory domains. Realm trusts can be transitive, nontransitive, one-way, or two-way.
See also: Active Directory; domain; Kerberos V5 authentication protocol; nontransitive trust; one-way trust; realm; transitive trust; two-way trustA state used by DHCP clients to extend and renew their address lease when the current lease is close to expiring. In this state, the client broadcasts to the network to locate any DHCP server that can either renew or replace its currently leased configuration. The rebinding state begins when 87.5 percent of the client's lease time has elapsed.
See also: Dynamic Host Configuration Protocol (DHCP); leaseThe process of making the client lease information stored in the DHCP server database consistent with a duplicate copy of this same information stored in the Windows registry. Using the DHCP Microsoft Management Console (MMC), reconciliation helps restore or recover the contents of the DHCP server database file, Dhcp.mdb, located by default in the
For Message Queuing, a message that can be recovered no matter which computer fails, but that uses more resources and is slower than an express message.
See also: express message; Message QueuingA person who is issued a public key certificate for the purpose of recovering user data that is encrypted with Encrypting File System (EFS).
See also: certificate; Encrypting File System (EFS); public keyA command-line interface that provides a limited set of administrative commands that are useful for repairing a computer.
See also: NTFS file systemA type of public key Group Policy object (GPO) used by Encrypting File System (EFS) that provides for one or more user accounts to be designated as recovery agents.
See also: Encrypting File System (EFS); Group Policy object (GPO); public key; recovery agent; user accountA query made to a DNS server in which the requester asks the server to assume the full workload and responsibility for providing a complete answer to the query. The DNS server will then use separate iterative queries to other DNS servers on behalf of the requester to assist in completing an answer for the recursive query.
See also: DNS server; iterative query; recursive resolutionOne of the two process types (iterative and recursive) for DNS name resolution. In this process, a resolver (a DNS client) will request that a DNS server provide a complete answer to a query that does not include pointers to other DNS servers. When a client makes a query and requests that the server use recursive resolution to answer, it effectively shifts the workload of resolving the query from the client to the DNS server. If the DNS server supports and uses recursive resolution, it contacts other DNS servers as necessary (using iterative queries on behalf of the client) until it obtains a definitive answer to the query. This type of resolution allows the client resolver to be small and simple.
See also: DNS server; Domain Name System (DNS); iteration; iterative query; recursive queryThe place in which Windows stores deleted files. You can retrieve files you deleted in error, or you can empty the Recycle Bin to create more disk space.
A method used to standardize and categorize fault-tolerant disk systems. RAID levels provide various mixes of performance, reliability, and cost. Some servers provide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level 5 (RAID-5).
See also: fault tolerance; RAID-5 volumeA list of targets, transparent to the user, that a client receives from Distributed File System (DFS) when the user is accessing a root or a link in the DFS namespace. The referral information is cached on the client for a time period specified in the DFS configuration.
See also: DFS namespace; Distributed File System (DFS); iterationA server that responds to requests for service from remote installation clients. It refers clients to other remote installation servers where they can install Windows desktop operating systems. The referral server does not directly host client computers for installing the operating system.
To update displayed information with current data.
See also: refresh rateAn interval of time used by secondary masters of a zone to determine how often to check if their zone data needs to be refreshed. When the refresh interval expires, the secondary master checks with its source for the zone to see if its zone data is still current or if it needs to be updated using a zone transfer. This interval is set in the start-of-authority (SOA) resource record for each zone.
See also: start-of-authority (SOA) resource record; zone; zone transferThe frequency with which the video screen is retraced to prevent the image from flickering. The entire image area of most monitors is refreshed approximately 60 times per second.
See also: refreshContiguous chunks of storage on a disk.
See also: diskFile types that are tracked by the system registry and are recognized by the programs you have installed on your computer.
See also: file type; registryA computer that is configured for an administrator to request and retrieve issued certificates on behalf of other users. An RA does not require that a certification authority be installed on the same computer.
See also: certificate; certification authority (CA)A database repository for information about a computer's configuration. The registry contains information that Windows continually references during operation, such as:
The registry is organized hierarchically as a tree, and it is made up of keys and their subkeys, hives, and entries.
See also: entry; hive; key; registry size limit (RSL); subkeyThe default boot option used by most Windows DNS servers. When registry boot is used, DNS is started and initialized using DNS parameters and their values as they are stored in the Windows registry. You can use a Berkeley Internet Name Domain (BIND) boot file as an alternative to this method of boot configuration for DNS.
See also: BIND boot file; DNS server; Domain Name System (DNS)A universal maximum for the space that registry files (hives) can consume in the paged pool. This maximum prevents an application from filling the paged pool with registry data.
See also: hive; paged pool; registryThe part of the object name that identifies the object as unique from its siblings at its level in the naming hierarchy. For example, in the distinguished name CN=My Name,CN=Users,DC=Microsoft,DC=Com the relative distinguished name of the user object is My Name. The relative distinguished name of the user object's parent object is Users.
See also: distinguished name; objectThe part of a security ID (SID) that uniquely identifies an account or group within a domain.
See also: domain; forest; group; RID master; security ID (SID)The partial DNS domain name configured in individual resource records to locate and qualify the record within a zone. The relative name is joined to the front of the parent domain (domain of origin) for each resource record to form a fully qualified domain name (FQDN) within the zone. In DNS Manager, the relative name will correspond to fields that use record-specific name properties, such as the Host computer name field used in an address (A) resource record.
See also: address (A) resource record; Domain Name System (DNS); fully qualified domain name (FQDN); resource record (RR); zonePart of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access.
See also: remote access server; response; Serial Line Internet Protocol (SLIP); serviceA set of conditions and connection parameters that define the characteristics of the incoming connection and the set of constraints imposed on it. Remote access policy determines whether a specific connection attempt is authorized to be accepted.
A Windows-based computer running the Routing and Remote Access service and configured to provide remote access.
See also: remote access; set-by-caller callbackA Windows NT 4.0 service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple offices.
The management of one computer by an administrator working at another computer that is connected to the first computer across a network.
See also: remotely administered serverA security authentication protocol based on a client/server model and widely used by Internet service providers (ISPs). RADIUS is the most popular means of authenticating and authorizing dial-up and tunneled network users today. A RADIUS client is included in the Routing and Remote Access service that ships with the Windows Server 2003 family. A RADIUS server, named Internet Authentication Service (IAS), is included in Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition.
See also: authentication; Internet Authentication Service (IAS); tunnelA computer that you can access only by using a communications line or a communications device, such as a network card or a modem.
See also: local computerSoftware services that allow an administrator to set up new client computers remotely, without having to visit each client. The target clients must support remote booting.
See also: Single Instance Store (SIS)A message-passing facility that allows a distributed application to call services that are available on various computers on a network. Used during remote administration of computers.
See also: serviceA data management service used to migrate infrequently accessed files from local storage to remote storage. Migrated files are recalled transparently when the user opens the file.
See also: local storage; service; validationA server that you can administer by using a different computer. You typically access this type of server by using a network connection. A remotely administered server can have a local keyboard, mouse, or video card and monitor. If it does not have these peripherals attached, it is also known as a headless server. Such servers are often housed in a physically secure location.
See also: physical security; remote administration; serverStorage media such as a tape or disk that can easily be removed for transport, backup, or offsite storage.
A service used for managing removable media (such as tapes and discs) and storage devices (libraries). Removable Storage allows applications to access and share the same media resources.
See also: library; serviceIn color management, the approach used to map the colors specified in an image file to the color gamut of your monitor or printer. The color gamut is the range of color that a device can produce.
See also: color gamutClient service referral behavior performed using a DNS query to resolve domain names to locate host computers that are service providers for well-known TCP/IP-based network services. Rendezvous for clients uses queries for resource record types such as mail exchanger (MX) or service (SRV) records.
See also: Domain Name System (DNS); resource record (RR); serviceNTFS file system objects that have a definable attribute containing user-controlled data and that are used to extend functionality in the input/output (I/O) subsystem.
See also: attribute; NTFS file system; objectIn Active Directory replication, one instance of a logical Active Directory partition that is synchronized by means of replication between domain controllers that hold copies of the same directory partition. Replica can also refer to an instance of an object or attribute in a distributed directory.
In the File Replication service (FRS), a computer that has been included in the configuration of a specific replica set.
See also: Active Directory; File Replication service (FRS); replica set; replication topologyThe process of copying updated data from a data store or file system on a source computer to a matching data store or file system on one or more destination computers to synchronize the data.
In Active Directory, replication synchronizes schema, configuration, application, and domain directory partitions between domain controllers.
In Distributed File System (DFS), replication synchronizes files and folders between DFS roots and root targets.
See also: Active Directory; DFS root; directory partition; Distributed File System (DFS); File Replication service (FRS); multimaster replication; replica; replication policy; topologyIn Active Directory replication, the delay between the time an update is applied to a given replica of a directory partition and the time it is applied to some other replica of the same directory partition. A server receives changes no sooner than either it is notified of a change from its neighbor in the same site or its periodic replication timer expires. Sometimes referred to as propagation delay.
See also: Active Directory replication; directory partition; replicaA domain controller that acts as a replication source for a given domain controller. The Knowledge Consistency Checker (KCC) determines which servers are best suited to replicate with each other, and it generates the list of domain controllers that are candidates for replication partners from the list of domain controllers in the site on the basis of connectivity, history of successful replication, and matching of full and partial replicas. A domain controller has some number of direct replication partners with which it replicates for a given directory partition. The other domain controllers in the site replicate transitively with this domain controller.
See also: directory partition; domain controller; Knowledge Consistency Checker (KCC); siteRules that define how and when replication is performed.
See also: replicationIn Active Directory replication, the set of physical connections that domain controllers use to replicate directory updates among domain controllers within sites and between sites.
In the File Replication service (FRS), the interconnections between replica set members. These interconnections determine the path that data takes as it replicates to all replica set members.
See also: Active Directory; Distributed File System (DFS); domain controller; File Replication service (FRS); replica; replica set; replicationFor Message Queuing, a message that contains status information and is sent to report queues on the source computer. Examples include test messages and route tracking messages.
See also: Message Queuing; report queueFor Message Queuing, a queue on the source computer that contains report messages. Report queues can be used when sending test messages and tracking message routes.
See also: Message Queuing; report messageAn official document of the Internet Engineering Task Force (IETF) that specifies the details for protocols included in the TCP/IP family.
See also: Internet Engineering Task Force (IETF); protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)A specific IP address within a scope permanently reserved for leased use to a specific DHCP client. Client reservations are made in the DHCP database using DHCP Manager and based on a unique client device identifier for each reserved entry.
See also: Dynamic Host Configuration Protocol (DHCP); IP address; lease; scopeDNS client programs used to look up DNS name information. Resolvers can be either a small stub (a limited set of programming routines that provide basic query functionality) or larger programs that provide additional lookup DNS client functions, such as caching.
See also: caching; caching resolver; Domain Name System (DNS)Generally, any part of a computer system or network, such as a disk drive, printer, or memory, that can be allotted to a running program or a process.
For Device Manager, any of four system components that control how the devices on a computer work. These four system resources are interrupt request (IRQ) lines, direct memory access (DMA) channels, input/output (I/O) ports, and memory addresses.
For server clusters, a physical or logical entity that is capable of being managed by a cluster, brought online and taken offline, and moved between nodes. A resource can be owned only by a single node at any point in time.
See also: direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ) lines; memory address; node; offline; online; server clusterThe process of distributing a computer system's facilities to different components of a job in order to perform the job.
A dynamic-link library (DLL) containing an implementation of the Resource application programming interface (API) for a specific type of resource. The Resource DLL is loaded into the address space of its Resource Monitor.
See also: application programming interface (API); dynamic-link library (DLL)One of two forks (resource fork and data fork) that make up each Macintosh file. The resource fork holds Macintosh operating system resources, such as code, menu, font, and icon definitions. Resource forks have no relevance to personal computers, so the resource forks of files on the server are never accessed by personal computer clients.
See also: data forkIn a server cluster, a defined collection of resources. Resources that are dependent on each other are typically placed within the same resource group.
See also: node; resource; server clusterA cluster software component that facilitates communication between a node's server cluster and one or more of its resources.
See also: node; resource; server clusterA standard DNS database structure containing information used to process DNS queries. For example, an address (A) resource record contains an IP address corresponding to a host name. Most of the basic resource record types are defined in RFC 1035, but additional RR types have been defined in other RFCs and approved for use with DNS.
See also: Domain Name System (DNS); Request for Comments (RFC); retry interval; zoneA collection of more than one resource record returned in a query response by a DNS server. RRsets are used in responses where more than one record is part of the answer.
See also: DNS server; resource record (RR)Classes of resources, such as print spooler, physical disk, and file share, organized by the server cluster. Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, provide Resource DLL files for the most common types of resources. Using the application programming interface (API) provided in the Microsoft Platform Software Development Kit (SDK), other vendors can add support for other resource types.
See also: print spooler; Resource DLL; server cluster; storage-class resourceIn Windows remote access, strings expected from the device, which can contain macros.
See also: remote access; stringFor Message Queuing, a message sent by a receiving application to the response queue specified by a sending application. Any available queue can be specified as a response queue.
See also: Message Queuing; queue; response queueFor Message Queuing, a queue that is created by the sending application and used by the receiving application to reply to messages. For example, an application might send a response message to a response queue every time the application receives a message.
See also: Message Queuing; queue; response messageAn access token with restricted access to securable objects or performing privileged tasks.
See also: access token; object; privilege; security ID (SID)A feature that simplifies Group Policy implementation and troubleshooting. RSoP uses Windows Management Instrumentation (WMI) to determine how policy settings are applied to users and computers. RSoP has two modes: logging mode and planning mode. Logging mode determines the resultant effect of policy settings that have been applied to an existing user and computer based on a site, domain, and organizational unit. Planning mode simulates the resultant effect of policy settings that are applied to a user and computer.
See also: Group Policy; Group Policy Management console (GPMC); Microsoft Management Console (MMC); Windows Management Instrumentation (WMI)The time, in seconds after the refresh interval expires, used by secondary masters of a zone to determine how often to try and retry contacting its source for zone data to see if its replicated zone data needs to be refreshed. This interval is set in the start-of-authority (SOA) resource record for each zone.
See also: refresh interval; replication; start-of-authority (SOA) resource record; zoneA mechanism that stores an encrypted password in such a way that the original password can be unencrypted and retrieved. Some applications require the unencrypted password so that they can perform certain tasks.
See also: encrypted passwordMultidimensional color space consisting of the red, green, and blue intensities that make up a given color. This system is typically used in scanners, digital cameras, computer monitors, and computer printers.
See also: color management; color spaceA domain controller that holds the RID operations master role in Active Directory. The RID master is assigned to allocate unique sequences of relative IDs to each domain controller in its domain. As the domain controllers use the IDs allocated, they contact the RID master and are allocated additional sequences as needed. At any time, the RID master role can be assigned to only one domain controller in each domain.
See also: Active Directory; domain controller; operations master; relative ID (RID); security ID (SID); security principalA widely used set of public key algorithms that were published by RSA Data Security, Inc. The RSA cryptographic algorithms are supported by the Microsoft Base Cryptographic Service Provider and the Microsoft Enhanced Cryptographic Service Provider.
See also: cryptographic service provider (CSP); public key cryptographyA server-based user profile that is downloaded to the local computer when a user logs on and that is updated both locally and on the server when the user logs off. A roaming user profile is available from the server when logging on to a workstation or server computer. When logging on, the user can use the local user profile if it is more current than the copy on the server.
See also: local user profile; mandatory user profile; user profileA management technique that is characterized by the use of collections of settings that are based on an object’s role within an organization. Role-based administration can be used to manage users, computers, and other file system and directory service objects.
See also: access control entry (ACE); authorization; objectIn a cluster, the process of systematically upgrading cluster nodes one node at a time. During the upgrade, the remaining cluster nodes continue to provide service.
See also: cluster; nodeThe highest or uppermost level in a hierarchically organized set of information. The root is the point from which further subsets are branched in a logical sequence that moves from a broad or general focus to narrower perspectives.
See also: DFS root; root certificate; root certification authority; root hints; root servers; root targetA self-signed certification authority certificate. It is called a root certificate because it is the certificate for the root authority. The root authority must sign its own certificate because by definition there is no higher certifying authority in the certification hierarchy.
See also: certificate; certification authority (CA); certification hierarchy; root certification authorityThe most trusted certification authority (CA), which is at the top of a certification hierarchy. The root CA has a self-signed certificate. Also called the root authority.
See also: certification authority (CA); certification hierarchy; rootThe top-level directory (or folder) on a computer, partition or volume, or Macintosh-accessible volume.
See also: Macintosh-accessible volume; partition; volumeThe beginning of the DNS namespace. In Active Directory, the initial domain in an Active Directory tree. Also, the initial domain of a forest.
See also: Active Directory; domain; Domain Name System (DNS); forest; namespaceDNS data stored on a DNS server that identifies the authoritative DNS servers for the root zone of the DNS namespace. The root hints are stored in the file Cache.dns, located in the systemroot\System32\Dns folder.
See also: DNS server; Domain Name System (DNS); root servers; systemrootDNS servers that are authoritative for the root of the namespace.
See also: authoritative; DNS server; rootThe mapping destination of a DFS root, which corresponds to a shared folder on a server.
See also: DFS root; targetA simple mechanism used by DNS servers to share and distribute loads for network resources. Round robin is used to rotate the order of resource records (RRs) returned in a response to a query when multiple RRs of the same type exist for a queried DNS domain name.
See also: DNS server; resource record (RR)A scripting utility for the Routing and Remote Access service that is a command-line alternative to the router administration user interface available through the Routing and Remote Access Manager.
Hardware that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and connectivity and that can link LANs that have different network topologies (such as Ethernet and Token Ring). Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance.
See also: local area network (LAN); packet header; routing; Routing Information Protocol over IPX (RIPX); static routes; Token Ring; wide area network (WAN)The process of forwarding a packet through an internetwork from a source host to a destination host.
See also: host; packetAn industry standard, distance vector routing protocol used in small- to medium-sized Internet Protocol (IP) and Internetwork Packet Exchange (IPX) internetworks.
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); protocolA protocol used by routers to exchange information between routers on an Internetwork Packet Exchange (IPX) network and by hosts to determine the best router to use when forwarding IPX traffic to a remote IPX network.
See also: host; Internetwork Packet Exchange (IPX); NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink); protocol; routerFor Message Queuing, a communications link established between Windows sites for routing messages. Specially configured Message Queuing servers with routing services enabled are used to create a routing link between sites.
See also: Message Queuing; routing services; routing-link cost; siteAny of several protocols that enable the exchange of routing table information between routers. Typically, medium- to large-sized TCP/IP internetworks implement routing protocols to simplify the administration of routing tables.
See also: router; routingFor Message Queuing, a service on a Message Queuing server that provides message routing services. If so configured, this feature can be used on a Message Queuing server to:
For Message Queuing, a number used to determine the route messages can take between two sites. This number represents the relative monetary cost of communication over a link. A routing link has a default routing-link cost of 1 and should not be changed unless you have multiple routing links between two sites and you want to enforce message routing over a specific routing link.
See also: Message Queuing; routing link; siteAn accepted industry standard for serial communication connections. Adopted by the Electric Industries Association, this Recommended Standard (RS) defines the specific lines and signal characteristics used by serial communications controllers to standardize the transmission of serial data between devices. The letter C signifies the third in a series.
See also: deviceA feature that provides users with a secondary logon capability. By using Run as, users can run applications or commands in a different security context without having to log off. Run as prompts the user for different credentials before running the application or command.
See also: secondary logon; security contextIn Remote Storage, the setting that prohibits a user or an application from recalling files from Remote Storage more than the specified number of times in succession with less than 10 seconds between each recall. Otherwise, applications such as those for virus checking, data backup, indexing, and searching typically read all files on your computer and can cause excessive file recalls and slow performance.
See also: Remote StorageA method of starting Windows using basic files and drivers only, without networking. Safe Mode is available by pressing the F8 key when prompted during startup. This allows you to start your computer when a problem prevents it from starting normally.
See also: Safe Mode with Command Prompt; Safe Mode with NetworkingA method of starting Windows using basic files and drivers only, without networking, and with only a command prompt displayed. This mode is available by pressing the F8 key when prompted during startup. This allows you to start your computer when a problem prevents it from starting normally.
See also: Safe Mode; Safe Mode with NetworkingA method of starting Windows using only basic files, drivers, and networking. This mode is available by pressing the F8 key when prompted during startup. This allows you to start your computer when a problem prevents it from starting normally.
See also: Safe Mode; Safe Mode with Command PromptA domain-unique security principal name in Windows NT 4.0 and earlier.
See also: Security Accounts Manager (SAM); security principal nameIn color management, the purity of a color's hue, moving from gray to the pure color.
See also: hueA measure of how well a computer, service, or application can grow to meet increasing performance demands. For server clusters, the ability to incrementally add one or more systems to an existing cluster when the overall load of the cluster exceeds its capabilities.
See also: server clusterThe process of cleaning and removing extinct or outdated names data from the WINS database.
See also: Windows Internet Name Service (WINS)The set of definitions for the universe of objects that can be stored in a directory. For each object class, the schema defines which attributes an instance of the class must have, which additional attributes it can have, and which other object classes can be its parent object class.
See also: attribute; directory partition; object; object class; parent objectA domain controller that holds the schema operations master role in Active Directory. The schema master performs write operations to the directory schema and replicates updates to all other domain controllers in the forest. At any time, the schema master role can be assigned to only one domain controller in the forest.
See also: Active Directory; domain controller; operations master; schemaA range of IP addresses that are available to be leased or assigned to DHCP clients by the DHCP service.
See also: Dynamic Host Configuration Protocol (DHCP); IP address; leaseIn a domain environment, a site, domain, or organizational unit; in a workgroup environment, the local disk.
See also: domain; organizational unit; siteIn Group Policy, any Active Directory container to which you can link a Group Policy object (GPO). These containers can be sites, domains, or organizational units.
See also: Active Directory; Group Policy; Group Policy object (GPO)A typeface designed for display on a computer monitor screen. A screen font often has an accompanying PostScript font for printing to PostScript-compatible printers.
See also: font; PostScriptThe setting that determines the amount of information that appears on your screen, measured in pixels. Low resolution, such as 640 x 480, makes items on the screen appear large, although the screen area is small. High resolution, such as 1024 x 768, makes the overall screen area large, although individual items appear small.
See also: pixelA moving picture or pattern that appears on your screen when you have not used the mouse or keyboard for a specified period of time.
A DNS domain name that is rooted hierarchically at the second tier of the domain namespace, directly beneath the top-level domain names. Top-level domain names include .com and .org. When DNS is used on the Internet, second-level domains are names that are registered and delegated to individual organizations and businesses.
See also: domain name; Domain Name System (DNS); parent domain; top-level domainsA specific virtual IP address assigned to a Network Load Balancing cluster (the "primary cluster"). The secondary cluster's virtual IP address is different than the primary cluster's virtual IP address. Secondary clusters allow you to configure an independent set of port rules for each virtual IP address in your Network Load Balancing (primary) cluster. Also known as a virtual cluster.
See also: cluster; Network Load Balancing; virtual IP addressThe practice of logging on by using one security context and then, within the initial logon session, authenticating and using a second account. In Windows 2000, Windows XP Professional, and the Windows Server 2003 family, secondary logon is enabled by the RunAs.exe program and service.
See also: authenticationA read-only copy of a DNS zone that is transferred from an authoritative DNS server to another DNS server to provide redundancy.
See also: authoritative; DNS server; DNS zone; Domain Name System (DNS); primary zone; zoneA 512-byte unit of physical storage on a hard disk. Windows file systems allocate storage in clusters, where a cluster is one or more contiguous sectors.
See also: cluster; file systemA Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols.
See also: authentication protocol; Secure Sockets Layer (SSL); Transport Layer Security (TLS)The process in which a DNS client submits a dynamic update request to a DNS server and the DNS server performs the update only if the client is authenticated.
See also: authentication; DNS client; DNS server; dynamic updateAn algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places.
See also: Digital Signature Standard (DSS); hash algorithmA protocol that provides a secure Hypertext Transfer Protocol (HTTP) connection.
See also: Hypertext Transfer Protocol (HTTP); protocolA proposed open standard for establishing a secure communications channel to prevent the interception of critical information, such as credit card numbers. Primarily, it enables secure electronic financial transactions on the World Wide Web, although it is designed to work on other Internet services as well.
See also: internetA DNS zone that is stored in Active Directory and to which access control list (ACL) security features are applied.
See also: access control list (ACL); Active Directory; DNS zone; Domain Name System (DNS)An extension of MIME that supports secure mail. It enables message originators to digitally sign e-mail messages to provide proof of message origin and data integrity. It also enables messages to be transmitted in encrypted format to provide confidential communications.
See also: public key encryptionOn a network, protection of a computer system and its data from harm or loss, implemented especially so that only authorized users can gain access to shared files.
See also: authorizationA Windows service used during the logon process. SAM maintains user account information, including groups to which a user belongs.
See also: group; service; user accountA combination of identifiers, which together define Internet Protocol security (IPSec) that protects communication between sender and receiver. An SA is identified by the combination of a Security Parameters Index (SPI), destination IP address, and security protocol (Authentication Header (AH) or Encapsulating Security Payload (ESP)). An SA must be negotiated before secured data can be sent.
See also: Authentication Header (AH); Encapsulating Security Payload (ESP); Internet Protocol security (IPSec); IP address; Security Parameters Index (SPI)The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object.
See also: access token; object; security descriptorA data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited.
See also: discretionary access control list (DACL); group; object; permission; system access control list (SACL)An event that is logged in the security log in Event Viewer. All events that are logged in the security log are auditing events, and they can be divided into the following event categories: account logon, account management, directory service access, logon, object access, policy change, privilege use, process tracking, or system.
See also: auditing; event; Event Viewer; security logA method of applying the settings of a Group Policy object (GPO) based on security principals.
See also: Group Policy object (GPO); security principalA group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group.
See also: discretionary access control list (DACL); groupAn authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server.
See also: authentication; remote access; remote access serverA data structure of variable length that identifies user, group, and computer accounts. Every account on a network is issued a unique SID when the account is first created. Internal processes in Windows refer to an account's SID rather than the account's user or group name.
See also: group account; user account; user nameAn event log containing information on security events that are specified in the audit policy.
See also: audit policy; eventA unique, identifying value in the security association (SA) used to distinguish among multiple SAs existing at the receiving computer.
See also: security association (SA)An account holder that is automatically assigned a security identifier (SID) to control access to resources. A security principal can be a user, group, service, or computer.
See also: group; resource; security ID (SID); serviceA name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains.
See also: domain; group; security principalA physical file representation of a security configuration that can be applied to a local computer or imported to a Group Policy object (GPO) in Active Directory. When you import a security template to a GPO, Group Policy processes the template and makes the corresponding changes to the members of that GPO, which can be users or computers.
See also: Active Directory; Group Policy; Group Policy object (GPO)The Macintosh-style privilege that allows you to see any files in the folders for which you have this privilege. When Services for Macintosh translates Macintosh-style privileges into Windows permissions, you are granted Read permission for any folders for which you have the See Files and See Folders privileges.
See also: See FoldersThe Macintosh-style privilege that allows you to see folders for which you have this privilege but not any files those folders might contain. When Services for Macintosh translates Macintosh-style privileges into Windows permissions, you are granted Read permission for any folders for which you have the See Files and See Folders privileges.
See also: See FilesA router that initializes and broadcasts network numbers and zones about one or more physical AppleTalk networks. Servers that are running the AppleTalk protocol can function as seed routers. You can also use hardware routers from other companies as seed routers.
See also: router; zoneAn older industry standard that is part of Windows remote access client to ensure interoperability with other remote access software.
See also: remote accessAn interface on the computer that allows asynchronous transmission of data characters one bit at a time. Also called a communication port or COM port.
See also: communication port; portIn general, a computer that provides shared resources to network users.
See also: client; shared resourceApplication software running on a cluster node, regardless of whether it does service registration.
See also: nodeA group of computers, known as nodes, working together as a single system to ensure that mission-critical applications and resources remain available to clients. A server cluster presents the appearance of a single server to a client.
See also: cluster; nodeA file-sharing protocol designed to allow networked computers to transparently access files that reside on remote systems over a variety of networks. The SMB protocol defines a series of commands that pass information between computers. SMB uses four message types: session control, file, printer, and message.
See also: protocolA group whose members can manage all domain controllers in a single domain. This group does not exist on workstations, stand-alone servers, or member servers. Administrative tasks that can be performed by members of this group include logging on locally, creating and deleting network shared resources, starting and stopping services, backing up and restoring files, formatting the hard disk of the computer, and shutting down the computer.
See also: domain; domain controller; group; member server; service; stand-alone serverThe AppleTalk zone on which a server appears. On a Phase 2 network, a server appears in the default zone of the server's default network.
See also: server; zoneAn extension of Secure Sockets Layer (SSL) that enables organizations, such as financial institutions, that have export versions of Internet Information Services (IIS) to use strong encryption (for example, 128-bit encryption).
See also: cryptography; Internet Information Services (IIS); Secure Sockets Layer (SSL)A program, routine, or process that performs a specific system function to support other programs, particularly at a low (close to the hardware) level. When services are provided over a network, they can be published in Active Directory, facilitating service-centric administration and usage. Some examples of services are the Security Accounts Manager service, File Replication service, and Routing and Remote Access service.
See also: File Replication service (FRS); Security Accounts Manager (SAM)A DNS resource record used to identify computers that host specific services, specified in RFC 2782. SRV resource records are used to locate domain controllers for Active Directory.
See also: Active Directory; domain controller; Domain Name System (DNS); Request for Comments (RFC); resource record (RR)A NetWare protocol used to identify the services and addresses of servers attached to the network. When a server starts, it uses the protocol to advertise its service. When the same server goes offline, it uses the protocol to announce that it is no longer available. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink) uses SAP to locate NetWare servers and services.
See also: NWLink IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink); protocolA software upgrade to an existing software distribution that contains updated files consisting of patches and hot fixes.
A way of referring to a service principal. The SPN structures generally follow Internet Engineering Task Force (IETF) naming conventions, and they often include the name of the computer on which the service is running. SPNs may be used to request Kerberos tickets, and they are required for mutual authentication.
See also: authentication; Internet Engineering Task Force (IETF); service; ticketAn 8-digit to 14-digit number that identifies the services that you order for each B-channel. For example, when you order Primary Rate ISDN, you obtain two phone numbers and two SPIDs from your Integrated Services Digital Network (ISDN) provider. Typical ISDN adapters cannot operate without configuring SPIDs.
See also: B-channel; Integrated Services Digital Network (ISDN); serviceCalling conventions that back-end services use to make themselves accessible to front-end applications.
See also: serviceA ticket issued by the Kerberos V5 ticket-granting service (TGS) that allows a user to authenticate to a specific service in the domain.
See also: Kerberos V5 authentication protocol; ticket; ticket-granting service (TGS)A service model that does not require that a specific computer be used to complete a task. In a service-centric environment, users need to know only what service they want to use. They do not need to know what computer that service resides on to use it successfully.
See also: machine-centric; serviceA logical connection created between two hosts to exchange data. Typically, sessions use sequencing and acknowledgments to send data reliably.
In the context of load balancing TCP/IP traffic, a set of client requests directed to a server. These requests can be invoked with multiple, possibly concurrent, TCP connections. The server program sometimes maintains state information between requests. To preserve access to the server state, Network Load Balancing needs to direct all requests within a session to the same cluster host when load balancing.
See also: client request; host; load balancing; Network Load Balancing; server; Transmission Control Protocol/Internet Protocol (TCP/IP)For Message Queuing, a feature that typically reduces network bandwidth within a site and the number of sessions between sites. Specially configured Message Queuing servers with routing services provide session concentration.
See also: bandwidth; Message Queuing; Message Queuing server; routing services; session; siteA protocol that Telephony API (TAPI) uses to advertise Internet Protocol (IP) multicast conferences. This protocol describes multimedia sessions for the purposes of session announcement, session invitation, and other forms of session initiation. SDP descriptors are stored in Active Directory. SDP is described in RFC 2327 of the Internet Engineering Task Force (IETF).
See also: Active Directory; Internet Engineering Task Force (IETF); protocol; Request for Comments (RFC); Telephony API (TAPI)In Internet Protocol security (IPSec), a value that is used in combination with an algorithm to encrypt or decrypt data that is transferred between computers. A session key is created for every pair of computers to provide enhanced security on computers that have multiple simultaneous active sessions.
See also: algorithm; encryption; Internet Protocol security (IPSec); key; sessionIn Network Connections, a form of callback in which the user supplies the telephone number that the remote access server uses for callback. This setting spares the user any long-distance telephone charges.
See also: Network Connections; remote access serverThe program that installs Windows. Also known as unattended installation, Winnt32.exe, and Winnt.exe.
To make resources, such as folders and printers, available to others.
See also: resource; shared folderA folder on another computer that has been made available for other people to use on the network.
See also: sharePermissions that restrict a shared resource's availability over the network to only certain users.
See also: permission; shared resourceA printer that receives input from more than one computer. For example, a printer attached to another computer on the network can be shared so that it is available for you to use. Also called a network printer.
See also: printer; shareAny device, data, or program that is used by more than one program or one other device. For Windows, shared resource refers to any resource that is made available to network users, such as folders, files, printers, and named pipes. Shared resource can also refer to a resource on a server that is available to network users.
See also: device; named pipe; resource; server; shareA link to any item accessible on your computer or on a network, such as a program, file, folder, disk drive, Web page, printer, or another computer. You can put shortcuts in various areas, such as on the desktop, on the Start menu, or in specific folders.
See also: desktopA trust that is manually created between two domains in the same forest. The purpose of a shortcut trust is to optimize the interdomain authentication process by shortening the trust path. Shortcut trusts are transitive and can be one-way or two-way.
See also: Active Directory; domain; forest; one-way trust; trust path; trust relationship; two-way trustA protocol that uses signaling to request, route, accept, and tear down virtual circuits.
See also: protocolA driver that meets the criteria of the Windows Logo Program. For performance and stability, Microsoft strongly recommends that you use only signed drivers for new or updated drivers.
See also: unsigned driver; Windows Logo ProgramA member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.
See also: protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)A network protocol used to manage TCP/IP networks. In Windows, the SNMP service is used to provide status information about a host on a TCP/IP network.
See also: agent; protocol; service; Transmission Control Protocol/Internet Protocol (TCP/IP)An XML/HTTP-based protocol for platform-independent access to objects and services on the Web. SOAP defines a message format in XML that travels over the Internet using Hypertext Transfer Protocol (HTTP). By using existing Web protocols (HTTP) and languages (XML), SOAP runs over the existing Internet infrastructure without being tied to any operating system, language, or object model.
See also: Extensible Markup Language (XML); Hypertext Transfer Protocol (HTTP); object; serviceFour TCP/IP services: Character Generator, Daytime Discard, Echo, and Quote of the Day.
See also: service; Transmission Control Protocol/Internet Protocol (TCP/IP)A dynamic volume made up of disk space from a single dynamic disk. A simple volume can consist of a single region on a disk or multiple regions of the same disk that are linked together. If the simple volume is not a system volume or boot volume, you can extend it within the same disk or onto additional disks. If you extend a simple volume across multiple disks, it becomes a spanned volume. You can create simple volumes only on dynamic disks. Simple volumes are not fault tolerant, but you can mirror them to create mirrored volumes on computers running the Windows 2000 Server or Windows Server 2003 families of operating systems.
See also: dynamic disk; dynamic volume; fault tolerance; mirrored volume; spanned volume; volumeSpecifies that Network Load Balancing should direct multiple requests from the same client IP address to the same cluster host. This is the default setting for affinity.
See also: affinity; Class C affinity; Network Load BalancingA component that saves disk space on the server by maintaining a single physical copy of all identical files found. If SIS finds a duplicate file on the server, it copies the original file into the SIS store and leaves a link where the original resided. This technology is used only with Remote Installation Services.
See also: Remote Installation Services (RIS)A cluster configuration that has one node and that can be configured with or without external cluster storage devices. For a single node cluster without an external cluster storage device, the local disk is configured as the cluster storage device. There are advantages and limitations for each cluster configuration (single node server cluster, single quorum device server cluster, and majority node set server cluster).
See also: cluster; cluster storage; majority node set server cluster; node; single quorum device server clusterA cluster configuration that has two or more nodes and that is configured so that every node is attached to one or more cluster storage device. The cluster configuration data is stored on a single cluster storage device. There are advantages and limitations for each cluster configuration (single node server cluster, single quorum device server cluster, and majority node set server cluster).
See also: cluster; cluster storage; majority node set server cluster; node; single node server clusterA process that enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to any computer in the domain.
See also: domain; smart cardOne or more well-connected (highly reliable and fast) TCP/IP subnets. A site allows administrators to configure Active Directory access and replication topology to take advantage of the physical network.
See also: Active Directory; replication topology; subnet; Transmission Control Protocol/Internet Protocol (TCP/IP)An Active Directory object that represents a set of sites that can communicate at uniform cost through some intersite transport. For Internet Protocol (IP) transport, a typical site link connects just two sites and corresponds to an actual wide area network (WAN) link. An IP site link connecting more than two sites might correspond to an asynchronous transfer mode (ATM) backbone connecting more than two clusters of buildings on a large campus or several offices in a large metropolitan area connected via leased lines and IP routers.
See also: Active Directory; asynchronous transfer mode (ATM); Internet Protocol (IP); site; site link bridge; wide area network (WAN)An Active Directory object that represents a set of site links, all of whose sites can communicate via some transport. Typically, a site link bridge corresponds to a router (or a set of routers) in an Internet Protocol (IP) network. By default, the Knowledge Consistency Checker (KCC) may form a route through any and all site links in a transitive manner. If this behavior is turned off, each site link represents its own distinct and isolated network. Sets of site links that can be treated as a single route are expressed through a site link bridge. Each bridge represents an isolated communication environment for network traffic.
See also: Active Directory; Internet Protocol (IP); Knowledge Consistency Checker (KCC); site; site linkAn energy-saving mode in which the Windows operating system shuts down all unnecessary components, such as the display screen and the disk drive. The computer returns to its former operating status when it is awakened.
See also: wake-on-LANA standard high-speed parallel interface defined by the American National Standards Institute (ANSI). A SCSI interface is used for connecting microcomputers to peripheral devices, such as hard disks and printers, and to other computers and local area networks (LANs).
See also: device; local area network (LAN)A credit card–sized device that is used with an access code to enable certificate-based authentication and single sign-on to the enterprise. Smart cards securely store certificates, public and private keys, passwords, and other types of personal information. A smart card reader attached to the computer reads the smart card.
See also: authentication; single sign-on; smart card readerA device that is installed in computers to enable the use of smart cards for enhanced security features.
See also: smart cardA type of tool that you can add to a console supported by Microsoft Management Console (MMC). A stand-alone snap-in can be added by itself; an extension snap-in can be added only to extend the function of another snap-in.
See also: Microsoft Management Console (MMC)An application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet.
See also: device; packetAn identifier for a particular service on a particular node on a network. The socket consists of a node address and a port number, which identifies the service. For example, port 80 on an Internet node indicates a Web server. There are two kinds of sockets: streams (bidirectional) and datagrams.
See also: datagram; node; port; process; raw socketA type of digital video disc (DVD) decoder that allows a DVD drive to display movies on your computer screen. A software decoder uses only software to display movies.
See also: DVD decoder; DVD drive; hardware decoderA collection of policy settings that define what software can run on a computer, based on the default security level for a Group Policy object (GPO). Exceptions to that default security level can then be defined by certificate rules, hash rules, path rules, registry path rules, and Internet zone rules.
See also: default security level; Group Policy; Group Policy object (GPO); software restriction policies ruleA rule that creates an exception to the default security level that is defined by software restriction policies.
The following types of rules can be created: certificate rules, which recognize software that is digitally signed by an Authenticode software publisher certificate; hash rules, which recognize specific software based on a hash of the software; path rules, which recognize software based on the location in which the software is stored; registry path rules, which recognize software based on the location of the software as it is stored in the registry; and Internet zone rules, which recognize software based on the zone of the Internet from which the software is downloaded.
See also: default security level; hash; path; registry; software restriction policiesThe document where a linked or embedded object was originally created.
See also: embedded object; linked objectFor Message Queuing, the process of storing a copy of an outgoing message. Source journaling is configured on a message basis, and it is set by the sending application. When source journaling is enabled, a copy of the message is put in the source journal of the source computer when the message arrives at the destination (target) queue.
See also: journal; Message Queuing; target journalingA dynamic volume consisting of disk space on more than one physical disk. You can increase the size of a spanned volume by extending it onto additional dynamic disks. You can create spanned volumes only on dynamic disks. Spanned volumes are not fault tolerant and cannot be mirrored.
See also: dynamic disk; dynamic volume; fault tolerance; mirrored volume; simple volume; volumeA file that is handled in a way that requires much less disk space than would otherwise be needed. Sparse support allows an application to create very large files without committing disk space for those regions of the file that contain only zeros. For example, you can use sparse support to work with a 42-GB file in which you need to write data only to the first 64 KB (the rest of the file is zeroed).
On NTFS volumes, a custom set of permissions. You can customize permissions on files and directories by selecting the individual components of the standard sets of permissions.
See also: NTFS file system; permission; volumeA route-advertising algorithm that prevents the advertising of routes in the same direction in which they were learned. Split horizon helps prevent routing loops.
See also: poison reverse; routingA Briefcase command that separates the copy of the file inside Briefcase from the copy outside Briefcase.
A process on a server in which print documents are stored on a disk until a printer is ready to process them. A spooler accepts each document from each client, stores it, then sends it to a printer when the printer is ready.
See also: print spoolerA certification authority (CA) that is not integrated with Active Directory.
See also: Active Directory; certification authority (CA)A DFS namespace, the configuration information for which is stored locally on the host server. The path to access the root or a link starts with the host server name. A stand-alone root has only one root target. There is no root-level fault tolerance. Therefore, when the root target is unavailable, the entire DFS namespace is inaccessible.
See also: DFS namespace; root targetA server that runs Windows 2000 or Windows Server 2003, but does not participate in a domain. A stand-alone server has only its own database of users, and it processes logon requests by itself. A stand-alone server does not share account information with other computers and cannot provide access to domain accounts, but it can participate in a workgroup.
See also: domain; member server; workgroupA record that indicates the starting point or original point of authority for information stored in a zone. The SOA resource record (RR) is the first RR created when adding a new zone. It also contains several parameters used by other computers that use DNS to determine how long they will use information for the zone and how often updates are required.
See also: authoritative; Domain Name System (DNS); resource record (RR); zoneA program used by Remote Installation Services (RIS) that is the first file downloaded to the client using Trivial File Transfer Protocol (TFTP). Startrom.com is a small program that displays the Press F12 for Network Service Boot prompt. If F12 is pressed within three seconds, the Client Installation Wizard (OSChooser) is downloaded to begin the remote installation process.
See also: Remote Installation Services (RIS); Trivial File Transfer Protocol (TFTP)In dual-boot or multiple-boot systems, the configuration settings that specify which system to start and how each system should be started.
See also: dual boot; multiple bootAs related to servers, not involving the update of a server-side database based on a client request. As related to the handling of files, the content of the file is not modified or noticed. For Web servers, a stateless client request, which members of a Network Load Balancing cluster can process, is one that returns a static Web page to the client.
See also: Network Load Balancing clusterA scripted dialog box between the client computer and an intermediary device. This kind of dialog box requires no response from the user.
See also: clientThe process of manually moving a group between nodes to balance the load across the nodes.
See also: group; nodeRoutes in a routing table that are permanent until changed by a network administrator or by an automatically scheduled auto-static update.
See also: router; routingA line of information related to the current program. The status bar is usually located at the bottom of a window. Not all windows have a status bar.
A serious error that affects the operating system and that could place data at risk. The operating system generates an obvious message, a screen with the Stop error, rather than continuing on and possibly corrupting data. Also called a fatal system error.
See also: Stop screenA blue character-mode screen that appears when Windows encounters a condition that compromises safe system operation and the system stops. Commonly referred to as a blue screen or bug check.
See also: Stop errorA required dependency for many resource types. Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, provide one storage-class resource: Physical Disk. However, your vendor or reseller might supply other storage-class resource types.
See also: dependency; resource typesFor DNS, a form of domain name checking that examines characters used in DNS names for compliance with DNS naming requirements and valid character usage as specified in RFC 1123, Requirements for Internet Hosts - Applications and Support. For strict RFC compliance, DNS domain names will use name labels made up only of valid uppercase and lowercase letters, number characters, and hyphens (A through Z, a through z, 0 through 9, -), separated by periods.
See also: domain name; Domain Name System (DNS); label; loose name checking; Request for Comments (RFC)A group of characters or character bytes handled as a single entity. Computer programs use strings to store and transmit data and commands. Most programming languages consider strings (such as 2674:gstmn) as distinct from numeric values (such as 470924).
See also: transmitting station ID (TSID) stringA dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. You can create striped volumes only on dynamic disks. Striped volumes cannot be mirrored or extended.
See also: dynamic disk; dynamic volume; fault tolerance; mirrored volume; volumeA password that provides an effective defense against unauthorized access to a resource. A strong password is at least six characters long, does not contain all or part of the users account name, and contains at least three of the four following categories of characters: uppercase characters, lowercase characters, base 10 digits, and symbols found on the keyboard (such as !, @, #).
See also: password; password policy; weak passwordA widely accepted standard database sublanguage used in querying, updating, and managing relational databases.
An Open Shortest Path First (OSPF) area that does not advertise individual external networks. A stub area blocks external routes and therefore reduces the amount of memory required on the internal routers located in the stub area. To keep the topology database size small, routing to all external networks in a stub area is done through a default route (destination 0.0.0.0 with the subnet mask of 0.0.0.0). In OSPF, any destination that you cannot reach through an intra-area or inter-area router is reachable through the default route.
See also: Open Shortest Path First (OSPF); routingA copy of a zone that contains only the resource records required to identify the authoritative DNS servers for that zone. A DNS server that hosts a parent zone and a stub zone for one of the parent zone's delegated child zones can receive updates from the authoritative DNS servers for the child zone.
See also: authoritative; DNS server; resource record (RR); zoneA DNS domain located directly beneath another domain name (the parent domain) in the namespace tree. For example, example.microsoft.com would be a subdomain of the domain microsoft.com. Also called child domain.
See also: child domain; domain; Domain Name System (DNS); parent domainIn public key cryptography, an entity that requests or holds a certificate. A subject can be a user, a computer, or any other device capable of requesting or using a certificate.
See also: certificate; public key cryptographyAn element of the registry that contains entries or other subkeys. A tier of the registry that is immediately below a key or a subtree (if the subtree has no keys).
See also: descendent key; entry; key; registry; subtreeA subdivision of an Internet Protocol (IP) network. Each subnet has its own unique subnetted network ID.
See also: Internet Protocol (IP)An Internet Engineering Task Force (IETF) standard that enables administrative control at the subnet level.
See also: Internet Engineering Task Force (IETF)Any node within a tree, along with any selection of connected descendant nodes.
The highest level of the registry (for example, HKEY_LOCAL_MACHINE).
See also: key; node; registry; subkeyAn administrative grouping feature that supports a DHCP server's ability to use more than scope for each physical interface and subnet. Superscopes are useful under the following conditions: If more DHCP clients must be added to a network than were originally planned, if an Internet Protocol (IP) network is renumbered, or if two or more DHCP servers are configured to provide scope redundancy and fault-tolerant design DHCP service for a single subnet. Each superscope can contain one or more member scopes (also known as child scopes).
See also: DHCP client; DHCP server; fault tolerance; scope; subnetThe type of interface to which your Integrated Services Digital Network (ISDN) device is being attached. Also called switch.
See also: B-channel; D-channel; Integrated Services Digital Network (ISDN)A connection established dynamically between devices on an asynchronous transfer mode (ATM) network through the use of signaling.
See also: asynchronous transfer mode (ATM)A central network device (multiport hub) that forwards packets to specific ports rather than, as in conventional hubs, broadcasting every packet to every port. In this way, the connections between ports deliver the full bandwidth available.
See also: hub; packet; portAn encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data. Also called secret key encryption.
See also: public key encryptionA single key that is used with symmetric encryption algorithms for both encryption and decryption.
See also: encryption; key; symmetric encryptionEach application or command runs in the order listed, and each item must finish before the next command is run.
The order in which a command must be typed, and the elements that follow the command.
See also: command prompt windowA tool used to configure the startup key, a random, 128-bit, symmetric cryptographic key created at system startup and used to encrypt all of the user's symmetric cryptographic keys.
See also: encryption; symmetric keyThe part of an object's security descriptor that specifies which events are to be audited per user or group. Examples of auditing events are file access, logon attempts, and system shutdowns.
See also: auditing; discretionary access control list (DACL); event; object; security descriptorA network configuration, usually on a separate Internet Protocol (IP) subnet, that gives data a direct path to system hardware.
See also: Internet Protocol (IP); subnetThe user profile that is loaded when Windows is running and no user is logged on. When the Begin Logon dialog box is visible, the system default profile is loaded.
See also: user profileA disk that contains the
Files used by Windows to load, configure, and run the operating system. Generally, system files must never be deleted or moved.
A menu that contains commands you can use to manipulate a window or close a program. You click the program icon at the left of the title bar to open the System menu.
The partition that contains the hardware-specific files needed to load Windows (for example, Ntldr, Osloader, Boot.ini, Ntdetect.com). The system partition can be, but does not have to be, the same as the boot partition.
See also: boot partition; partitionA Windows NT 4.0-style policy based on registry settings made using Poledit.exe, the System Policy Editor.
See also: policy; registryIn Backup, a collection of system-specific data maintained by the operating system that must be backed up as a unit. It is not a backup of the entire system. The System State data includes the registry, COM+ Class Registration database, system files, boot files, and files under Windows File Protection. For servers, the System State data also includes the Certificate Services database (if the server is a certificate server). If the server is a domain controller, the System State data also includes the Active Directory database and the SYSVOL directory. If the server is a node in a cluster, it includes the Cluster database information. The IIS Metabase is included if Internet Information Services (IIS) is installed.
See also: Active Directory; cluster; domain controller; Internet Information Services (IIS); node; registry; SYSVOLStorage locations for data that are defined by the operating system and that are the same regardless of who is logged on at the computer. (Users who are also members of the Administrators group can add new variables or change the values.)
See also: Administrators groupThe volume that contains the hardware-specific files that are needed to load Windows on x86-based computers with a basic input/output system (BIOS). The system volume can be, but does not have to be, the same volume as the boot volume.
See also: basic input/output system (BIOS); boot volume; volume; x86The path and folder name where the Windows system files are located. Typically, this is C:\Windows, although you can designate a different drive or folder when you install Windows. You can use the value
A Microsoft product that includes inventory collection, software deployment, and diagnostic tools. SMS automates the task of upgrading software, allows remote problem solving, provides asset management information, and monitors software usage, computers, and networks.
A shared directory that stores the server copy of the domain's public files, which are replicated among all domain controllers in the domain.
See also: directory; domain; domain controllerThe International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T) standard for multipoint data conferencing. T.120 provides the protocols for establishing and managing data flow, connections, and conferences. Support for T.120 enables data transfer from conferencing applications, such as file transfer and application sharing, to operate in conjunction with H.323 connections.
See also: H.323; International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T)For Indexing Service, one or more terms that identify an element in a query, such as weight, phrase, property, or regular expression. For example, the tag {prop name=created} specifies the Created property in a query.
See also: property; queryA file that stores information about the telephony devices for each installed telephony service provider, including the addresses that are assigned to each device and the users who are authorized to use each device.
See also: Telephony API (TAPI)The mapping destination of a DFS root or link, which corresponds to a physical folder that has been shared on the network.
See also: DFS link; DFS rootFor Message Queuing, the process of storing copies of incoming messages. Target journaling is configured on a queue basis. When target journaling is enabled, a copy of each incoming message is placed in the target journal when the message is retrieved (read) from the destination queue.
See also: journal; Message Queuing; source journalingA tool that provides information about programs and processes running on the computer. Using Task Manager, you can end or run programs, end processes, and display a dynamic overview of your computer's performance.
See also: process; programThe bar that contains the Start button and appears by default at the bottom of the desktop. You can click the taskbar buttons to switch between programs. You can also hide the taskbar, move it to the sides or top of the desktop, and customize it in other ways.
See also: desktop; notification area; taskbar buttonA button that appears on the taskbar and corresponds to a running application.
See also: taskbarA details pane view that displays shortcuts to commands that are available for the selected snap-in in the console tree. Users can run a command by clicking a task.
See also: console tree; details pane; snap-inA configuration method that provides fault tolerance by grouping network adapters on multiple ports to a single physical network segment. For example, if connections through one port fail (due to failure of the adapter, cable, switch port, or switch), another port is activated automatically. Teaming network adapters work transparently to the operating system and other devices on the network.
See also: device; fault tolerance; network adapter; portAn application programming interface (API) used by communications programs to work with telephony and network services. Communications programs like HyperTerminal and Phone Dialer use TAPI to dial, answer, and route telephone calls on conventional telephony devices, including PBXs, modems, and fax machines. TAPI 3.0 also provides Internet Protocol (IP) telephony support, which Phone Dialer and other programs use to transmit, route, and control real-time audio and video signals over IP-based networks such as the Internet.
See also: application programming interface (API); Internet Protocol (IP); modem (modulator/demodulator); serviceA computer or electromechanical device that controls the routing and operation of a signal path.
A protocol that enables an Internet user to log on to and enter commands on a remote computer linked to the Internet, as if the user were using a text-based terminal directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. The term telnet also refers to the software (client or server component) that implements this protocol.
See also: protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)An Internet Protocol version 6 (IPv6) address that uses an interface identifier that changes over time and that is not derived from a hardware property, such as a media access control (MAC) address. A temporary address makes it difficult to track the identity of a computer on the Internet across sessions.
See also: Internet Protocol (IP); media access control (MAC) addressThe underlying technology that enables Remote Desktop, Remote Assistance, and Terminal Server.
See also: Terminal Services LicensingSoftware that provides the ability to register and track licenses for Terminal Services clients.
See also: Terminal ServicesA program running under
In a dialog box, a box in which you type information needed to carry out a command. The text box may be blank or may contain text when the dialog box opens.
A miniature version of an image that is often used for quick browsing through multiple images.
A set of identification data for a security principal, issued by a domain controller for purposes of user authentication. Two forms of tickets in Windows are ticket-granting tickets (TGTs) and service tickets.
See also: authentication; domain controller; service ticket; ticket-granting ticket (TGT)A Kerberos V5 service provided by the Kerberos V5 Key Distribution Center (KDC) service that issues service tickets that allow users to authenticate to services in a domain.
See also: Kerberos V5 authentication protocol; Key Distribution Center (KDC); service ticket; ticket-granting ticket (TGT)A credential issued to a user by the Kerberos Key Distribution Center (KDC) when the user logs on. The user must present the TGT to the KDC when requesting session tickets for services. Because a TGT is normally valid for the life of the user's logon session, it is sometimes called a user ticket.
See also: Kerberos V5 authentication protocol; Key Distribution Center (KDC); ticket-granting service (TGS)A computer that periodically synchronizes the time on all computers within a network. This ensures that the time used by network services and local functions remains accurate.
See also: serverA brief period of time during which a particular task is given control of the microprocessor in a time-sharing multitasking environment. A computer's processor is allocated to an application, usually measured in milliseconds. Also called quantum.
A certification specifying that a particular message existed at a specific time and date. In a digital context, trusted third parties generate a trusted time stamp for a particular message by having a time stamping service append a time value to a message and then digitally signing the result.
See also: digital signature; serviceA timer value included in packets sent over TCP/IP-based networks that tells the recipients how long to hold or use the packet or any of its included data before expiring and discarding the packet or data. For DNS, TTL values are used in resource records within a zone to determine how long requesting clients should cache and use this information when it appears in a query response answered by a DNS server for the zone.
See also: DNS server; Domain Name System (DNS); packet; resource record (RR); Transmission Control Protocol/Internet Protocol (TCP/IP); zoneA condition where an expected character is not received in time. When this condition occurs, the software assumes that the data has been lost and requests that it be resent.
The horizontal bar at the top of a window that contains the name of the window. On many windows, the title bar also contains the program icon, the Maximize, Minimize, and Close buttons, and the optional ? button for context-sensitive Help. To display a menu with commands such as Restore and Move, right-click the title bar.
See also: maximize; minimizeAny nonreducible textual element in data that is being parsed. For example, the use in a program of a variable name, a reserved word, or an operator. Storing tokens as short codes shortens program files and speeds execution.
For networking, a unique structured data object or message that circulates continuously among the nodes of a token ring and describes the current state of the network. Before any node can send a message on the network, it must first wait to control the token.
See also: Token RingThe Institute of Electrical and Electronics Engineers (IEEE) 802.5 standard that uses a token-passing technique for media access control (MAC). Token Ring supports media of both shielded and unshielded twisted pair wiring for data rates of 4 megabits per second (Mbps) and 16 megabits per second.
See also: client; tokenIn Active Directory, an object that is removed from the directory but not yet deleted.
See also: Active Directory; directory; objectThe length of time that an object lives as a tombstone in the directory before being collected as garbage.
See also: directory; object; tombstoneDomain names that are rooted hierarchically at the first tier of the domain namespace directly beneath the root (.) of the DNS namespace. On the Internet, top-level domain names such as .com and .org are used to classify and assign second-level domain names (such as microsoft.com) to individual organizations and businesses according to their organizational purpose.
See also: domain; domain name; Domain Name System (DNS); domain namespace; root; second-level domainAn overview of networks and how they relate to routers. Routers in the same area have the same topological database.
See also: routerThe physical layout of computers, cables, switches, routers, and other components of a network. Topology also refers to the underlying network architecture, such as Ethernet or Token Ring.
In Active Directory replication, the set of connections that domain controllers use to replicate information among themselves.
See also: Active Directory replication; domain controllerA form of dialing that uses multiple-tone signaling. The user hears a series of tones (beeps) when dialing. Push-button telephones usually use touch-tone dialing.
See also: pulse dialingA type of log generated when the user selects a trace data provider using the Performance tool. Trace logs differ from counter-data logs in that they measure data continuously rather than taking periodic samples.
For Message Queuing, the pairing of two or more actions that are performed together as a single action; the action succeeds or fails as a whole. Using Microsoft Distributed Transaction Coordinator (MS DTC) ensures that either both actions succeed or neither is executed.
See also: Message Queuing; Microsoft Distributed Transaction Coordinator (MS DTC); transactional dead-letter queue; transactional messageFor Message Queuing, a queue that stores transactional messages that cannot reach their destination queue. Transactional dead-letter queues store failed messages on the computer on which the message expired. Messages in these queues are written to disk and are therefore recoverable.
See also: dead-letter queue; Message Queuing; queue; transactionFor Message Queuing, a message that can be sent and received only from within a transaction. This type of message returns to its prior state when a transaction is terminated abruptly. A transactional message is removed from a queue only when the transaction is committed; otherwise, it remains in the queue and can be subsequently read during another transaction.
See also: Message Queuing; queue; transactionA trust relationship that flows throughout a set of domains, such as a domain tree, and forms a relationship between a domain and all domains that trust that domain. For example, if domain A has a transitive trust with domain B, and domain B trusts domain C, then domain A trusts domain C. Transitive trusts can be one-way or two-way, and they are required for Kerberos-based authentication and Active Directory replication.
See also: Active Directory; Active Directory replication; domain tree; Kerberos V5 authentication protocol; nontransitive trust; one-way trust; trust relationship; two-way trustA set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic.
See also: Internet Protocol (IP); protocolA string that specifies the transmitter subscriber ID sent by the fax machine when sending a fax to a receiving machine. This string is usually a combination of the fax or telephone number and the name of the business. It is often the same as the called subscriber ID.
See also: called subscriber ID (CSID) string; stringA common set of routines for network layer components that communicate with the session layer of the Open Systems Interconnection (OSI) model. These routines allow software components above and below the transport layer to be mixed and matched without reprogramming.
See also: Open Systems Interconnection (OSI) reference modelA standard protocol that is used to provide secure Web communications on the Internet or intranets. It enables clients to authenticate servers or, optionally, servers to authenticate clients. It also provides a secure channel by encrypting communications. TLS is the latest and a more secure version of the SSL protocol.
See also: authentication; protocol; Secure Sockets Layer (SSL)The driver and support files that provide transport services in a networking environment.
In Simple Network Management Protocol (SNMP), a message sent by an agent to a management system indicating that an event has occurred on the host running the agent.
See also: agent; event; host; Simple Network Management Protocol (SNMP)A trust that is automatically established when you add a new domain tree (the tree root domain) to an Active Directory forest (the forest root domain). Tree root trusts are transitive and two-way.
See also: Active Directory; domain tree; forest; root domain; transitive trust; trust relationship; two-way trustA hierarchical representation of the folders, files, disk drives, and other resources connected to a computer or network. For example, Windows Explorer uses a tree view to display the resources that are attached to a computer or a network.
See also: resourceA type of Routing Information Protocol (RIP) announcement that occurs when network topology changes. With triggered updates, the update announcing network topology changes is sent almost immediately rather than waiting for the next periodic announcement. Triggered updates improve the convergence time (the time it takes for a router to update its routing tables) of RIP internetworks, but at the cost of additional broadcast traffic while the triggered updates are propagated.
See also: routing; Routing Information Protocol (RIP)An implementation of Data Encryption Standard (DES) encryption that employs three iterations of cryptographic operations on each segment of data. Each iteration uses a 56-bit key for encryption, which yields 168-bit encryption for the data. Although 3DES is slower than DES because of the additional cryptographic calculations, its protection is far stronger than DES.
See also: cryptography; Data Encryption Standard (DES); encryptionA protocol used to download the initial files needed to begin the installation process.
See also: protocolA program that masquerades as another common program in an attempt to receive information. An example of a Trojan horse is a program that behaves like a system logon to retrieve user names and password information that the writers of the Trojan horse can later use to break into the system.
See also: virusFonts that are scalable and sometimes generated as bitmaps or soft fonts, depending on the capabilities of your printer. TrueType fonts are device-independent fonts that are stored as outlines. They can be sized to any height, and they can be printed exactly as they appear on the screen.
See also: fontA series of trust relationships that authentication requests must follow between domains. Domain controllers determine the trust path for all authentication requests between a domain controller in the trusting domain and a domain controller in the trusted domain.
See also: authentication; domain; domain controller; trust relationshipA logical relationship established between domains to allow pass-through authentication, in which a trusting domain honors the logon authentications of a trusted domain. User accounts and global groups defined in a trusted domain can be given rights and permissions in a trusting domain, even though the user accounts or groups don't exist in the trusting domain's directory.
See also: authentication; domain; global group; group; permission; user accountAn object that represents one direction of a trust relationship. When trust relationships are established, unique TDOs are created and stored in the domain. For example, when a two-way trust is established, two TDOs are created.
See also: domain; object; trust relationship; two-way trustA communications device that consists of a keyboard and a printer. Each keystroke on the sending machine generates a character code that is sent to the receiving machine, which prints the character. TTY is usually associated with a video display that is treated like a teletypewriter or that emulates one.
A logical connection over which data is encapsulated. Typically, both encapsulation and encryption are performed, and the tunnel is a private, secure link between a remote user or host and a private network.
See also: encryption; host; tunnel server; voluntary tunnelA server or router that terminates tunnels and forwards traffic to the hosts on the target network.
See also: host; router; server; tunnelA communication standard used to manage tunnels and encapsulate private data. Data that is tunneled must also be encrypted to be a virtual private network (VPN) connection. Two commonly used tunneling protocols are the Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol (L2TP).
See also: Layer Two Tunneling Protocol (L2TP); Point-to-Point Tunneling Protocol (PPTP); virtual private network (VPN)A trust relationship between two domains in which both domains trust each other. For example, domain A trusts domain B, and domain B trusts domain A. All parent-child trusts are two-way.
See also: domain; one-way trust; parent-child trust; trust relationshipA character set for protocols evolving beyond the use of ASCII. The UTF-8 protocol provides for support of extended ASCII characters and translation of UCS-2, an international 16-bit Unicode character set. UTF-8 enables a far greater range of names than can be achieved using ASCII or extended ASCII encoding for character data.
See also: American Standard Code for Information Interchange (ASCII); Unicode; Universal Character Set (UCS)A socket that transmits datagrams over the User Datagram Protocol (UDP).
See also: datagram; socket; User Datagram Protocol (UDP)Available disk space that is not allocated to any volume. The type of volume that you can create on unallocated space depends on the disk type. On basic disks, you can use unallocated space to create primary or extended partitions. On dynamic disks, you can use unallocated space to create dynamic volumes.
See also: basic disk; dynamic disk; extended partition; logical drive; object; partition; primary partition; volumeAn automated, hands-free method of installing Windows. During installation, unattended Setup uses an answer file to supply data to Setup instead of requiring that an administrator or end user interactively provide the answers.
See also: SetupThe full name of a resource on a network. It conforms to the \\servername\sharename syntax, where servername is the name of the server and sharename is the name of the shared resource. UNC names of directories or files can also include the directory path under the share name, with the following syntax:
\\servername\sharename\directory\filename
See also: resourceAn address that identifies a specific, globally unique host.
See also: hostA character encoding standard developed by the Unicode Consortium that represents almost all of the written languages of the world. The Unicode character repertoire has multiple representation forms, including UTF-8, UTF-8, and UTF-32. Most Windows interfaces use the UTF-16 form.
See also: American Standard Code for Information Interchange (ASCII); UCS Transformation Format 8 (UTF-8); Universal Character Set (UCS)When referring to software, the act of removing program files and folders from your hard disk and removing related data from your registry so the software is no longer available.
When referring to a device, the act of removing the corresponding device drivers from your hard disk and physically removing the device from your computer.
See also: device; device driver; installA device that connects a computer and a power source to ensure that electrical flow is not interrupted. UPS devices use batteries to keep the computer running for a period of time after a power failure. UPS devices usually provide protection against power surges and brownouts as well.
An integrated circuit (silicon chip) that is commonly used in microcomputers to provide asynchronous communication. The UART provides parallel-to-serial conversion of data to be transmitted and serial-to-parallel conversion of data received.
See also: asynchronous communicationAn international standard character set reference that is part of the Unicode standard. The most widely held existing version of the UCS standard is UCS-2, which specifies 16-bit character values currently accepted and recognized for use to encode most of the world's languages.
See also: American Standard Code for Information Interchange (ASCII); UCS Transformation Format 8 (UTF-8); UnicodeAn industry specification for publishing and locating information about Web services. UDDI defines a standards-based way to store and retrieve information about Web services, Web service providers, binding information, and technical interface definitions—all classified using a set of standard or custom classification schemes.
See also: binding; serviceA security or distribution group that can contain users, groups, and computers from any domain in its forest as members.
Universal security groups can be granted rights and permissions on resources in any domain in the forest.
See also: distribution group; domain; forest; security groupA convention for naming files and other resources beginning with two backslashes (\), indicating that the resource exists on a network computer. UNC names conform to the \\servername\sharename syntax, where servername is the server's name and sharename is the name of the shared resource. The UNC name of a directory or file can also include the directory path after the share name, by using the following syntax: \\servername\sharename\directory\filename.
An external bus that supports Plug and Play installation. Using USB, you can connect and disconnect devices without shutting down or restarting your computer. You can use a single USB port to connect up to 127 peripheral devices, including speakers, telephones, CD-ROM drives, joysticks, tape drives, keyboards, scanners, and cameras. A USB port is usually located on the back of your computer near the serial port or parallel port.
See also: bus; Plug and Play; portA driver that is not supported and that is not certified to work with a particular version of Windows.
See also: signed driver; Windows Logo ProgramAn asynchronous transfer mode (ATM) service type that does not include any service guarantees.
See also: asynchronous transfer mode (ATM)The method of case-insensitive handling for network basic input/output system (NetBIOS) names. Upcasing is used by Windows to convert any lowercase letters entered in NetBIOS names to equivalent uppercase letters. For example, the name host1 is case-converted to HOST1.
See also: downcasing; network basic input/output system (NetBIOS)When referring to software, to update existing program files, folders, and registry entries to a more recent version. Upgrading, unlike performing a new installation, leaves existing settings and files in place.
See also: install; registryA service that manages an uninterruptible power supply (UPS) connected to a computer.
See also: service; uninterruptible power supply (UPS)In Active Directory, an object that consists of all the information that defines a domain user, which includes user name, password, and groups in which the user account has membership. User accounts can be stored in either Active Directory or on your local computer.
For computers running Windows XP Professional and member servers running Windows Server 2003, use Local Users and Groups to manage local user accounts. For domain controllers running Windows Server 2003, use Active Directory Users and Computers to manage domain user accounts.
See also: Active Directory; group; member server; object; password; user nameA software component that prompts clients for their user names and passwords.
See also: password; user nameAn administrative feature that allows DHCP clients to be grouped logically according to a shared or common need. For example, a user class can be defined and used to allow similar DHCP leased configuration for all client computers in a specific building or site location.
See also: DHCP client; Dynamic Host Configuration Protocol (DHCP); leaseA Transmission Control Protocol (TCP) complement that offers a connectionless datagram service that guarantees neither delivery nor correct sequencing of delivered packets (much like Internet Protocol (IP)).
See also: datagram; Internet Protocol (IP); packet; service; Transmission Control Protocol/Internet Protocol (TCP/IP)The processing mode in which applications run.
A unique name identifying a user account to Windows. An account's user name must be unique among the other group names and user names within its own domain or workgroup.
See also: domain; user account; workgroupAn object from Window Manager, which includes windows, menus, cursors, icons, hooks, accelerators, monitors, keyboard layouts, and other internal objects. In Task Manager, the number of USER objects currently being used by a process.
See also: Task ManagerThe password stored in each user's account. Each user generally has a unique user password and must type that password when logging on or accessing a server.
See also: password; user accountA user account name (sometimes referred to as the user logon name) and a domain name identifying the domain in which the user account is located. This is the standard usage for logging on to a Windows domain. The format is as follows: someone@example.com (as for an e-mail address).
See also: domain; domain name; user principal name (UPN) suffixThe part of the user principal name (UPN) to the right of the @ character. The default UPN suffix for a user account is the DNS domain name of the domain that contains the user account. Alternative UPN suffixes may be added to simplify administration and user logon processes by providing a single UPN suffix for all users. The UPN suffix is only used within the Active Directory forest, and it is not required to be a valid DNS domain name.
See also: Active Directory; domain; domain name; Domain Name System (DNS); forest; user account; user principal name (UPN)A file that contains configuration information for a specific user, such as desktop settings, persistent network connections, and application settings. Each user's preferences are saved to a user profile that Windows uses to configure the desktop each time a user logs on.
See also: desktopTasks that a user is permitted to perform on a computer system or domain. There are two types of user rights: privileges and logon rights. An example of a privilege is the right to shut down the system. An example of a logon right is the right to log on to a computer locally. Both types are assigned by administrators to individual users or groups as part of the security settings for the computer.
See also: domain; group; logon rights; privilegeSecurity settings that manage the assignment of rights to groups and user accounts.
See also: group; user account; user rightsThe interface between asynchronous transfer mode (ATM) users or end stations and an ATM switch or network. The UNI is defined in the ATM Forum UNI documents.
See also: asynchronous transfer mode (ATM)A data transmission standard that provides for up to 33,600 bits per second (bps) communications over telephone lines. It defines a full-duplex (two-way) modulation technique and includes error-correcting and negotiation.
See also: bits per second (bps); full-duplex; modulation standards; V.90A data transmission standard that provides for up to 56,000 bits per second (bps) communications over telephone lines. The transmission speed from the client-side modem is 33,600 bps, the same as for V.34. The transmission speed from the host-side modem, such as an Internet service provider (ISP) or corporate network, is up to 56,000 bps, with an average speed of 40,000 to 50,000 bps. When the host-side modem does not support this standard, the alternative is V.34.
See also: bits per second (bps); client; host; Internet service provider (ISP); modem (modulator/demodulator); modulation standards; V.34The process of comparing files on local volumes with their associated data in secondary storage by Remote Storage. Volumes that are validated ensure that the correct data is recalled from remote storage when a user attempts to open the file from a local volume.
See also: Remote Storage; volumeIn programming, a named storage location capable of containing a certain type of data that can be modified during program execution.
System environment variables are defined by the operating systems in the Windows Server 2003 family, and they are the same no matter who is logged on to the computer. Administrator group members can add new variables or change the values, however.
User environment variables can be different for each user of a particular computer. They include any environment variables you want to define or variables defined by your applications, such as the path where application files are located.
See also: environment variableAn asynchronous transfer mode (ATM) service type that guarantees service based on average and peak traffic rates. VBR is used for traffic that requires little or no cell loss. It transmits data in spurts, or bursts, rather than in a continuous stream.
See also: asynchronous transfer mode (ATM); serviceFor Indexing Service, an ordered series of words or numbers used in a query. For example, a single document can have (Scott Cooper; Don Hall; Amy Egert) as a vector of coauthors.
See also: Indexing Service; queryA font rendered from a mathematical model, in which each character is defined as a set of lines drawn between points. Vector fonts can be cleanly scaled to any size or aspect ratio.
See also: font; plotter fontAn administrative feature that allows DHCP clients to be identified and leased according to their vendor and hardware configuration type. For example, assigning a vendor class of HP to a printer vendor such as Hewlett-Packard would allow all Hewlett-Packard printers to be managed as a single unit so they could all obtain a similar DHCP leased configuration.
See also: DHCP client; Dynamic Host Configuration Protocol (DHCP); leaseAn expansion board that plugs into a personal computer to give it display capabilities. A computer's display capabilities depend on both the logical circuitry (provided in the video adapter) and the monitor. Each adapter offers several different video modes. The two basic categories of video modes are text and graphics. Within the text and graphics modes, some monitors also offer a choice of resolutions. At lower resolutions a monitor can display more colors.
Modern adapters contain memory, so that the computer's random access memory (RAM) is not used for storing displays. In addition, most adapters have their own graphics coprocessor for performing graphics calculations. These adapters are often called graphics accelerators.
See also: graphics modeIn a virtual memory system, the address the application uses to reference memory. The kernel and the memory management unit (MMU) translate this address into a physical address before the memory is actually read or written.
See also: virtual memoryA section of the asynchronous transfer mode (ATM) cell header that contains the virtual channel address over which the cell is to be routed.
See also: asynchronous transfer mode (ATM)A Network Load Balancing cluster that you create by assigning specific port rules to specific virtual IP addresses. With virtual clusters, you can use different port rules for different Web sites or applications hosted on the cluster, provided each Web site or application has a different virtual IP address.
See also: Network Load Balancing; Network Load Balancing cluster; port rule; virtual IP addressA container that allows any Lightweight Directory Access Protocol (LDAP)-compliant directory to be accessed through Active Directory.
See also: Active Directory; directory; Lightweight Directory Access Protocol (LDAP)A protected environment subsystem that emulates
Note that 64-bit versions of the Windows Server 2003 family cannot run
An IP address that is shared among the hosts of a Network Load Balancing cluster. A Network Load Balancing cluster might also use multiple virtual IP addresses, for example, in a cluster of multihomed Web servers.
See also: host; IP address; multihomed computer; Network Load Balancing clusterA logical link between a backbone area border router and an area border router that is not connected to the backbone.
See also: area border router (ABR); backbone routerA logical grouping of hosts on one or more local area networks (LANs) that allows communication to occur between hosts as if they were on the same physical LAN.
See also: host; local area network (LAN)Temporary storage used by a computer to run programs that need more memory than it has. For example, programs could have access to 4 gigabytes (GB) of virtual memory on a computer's hard drive, even if the computer has only 32 megabytes (MB) of random access memory (RAM). The program data that does not currently fit in the computer's memory is saved into paging files.
See also: paging file; random access memory (RAM); Virtual Memory Size; virtual printer memoryIn Task Manager, the amount of virtual memory, or address space, committed to a process.
See also: Task Manager; virtual memoryA logical network that exists inside Novell NetWare and NetWare-compatible servers and routers but that is not associated with a physical adapter. The virtual network appears to a user as a separate network. On a computer running Windows 2000 Server or on an operating system in the Windows Server 2003 family, programs advertise their location on a virtual network, not a physical network. The internal network number identifies a virtual network inside a computer.
See also: external network number; internal network numberA section of the asynchronous transfer mode (ATM) cell header that contains the virtual path address over which the cell is to be routed.
See also: asynchronous transfer mode (ATM)In a PostScript printer, a part of memory that stores font information. The memory in PostScript printers is divided into two areas: banded memory and virtual memory. The banded memory contains graphics and page-layout information needed to print your documents. The virtual memory contains any font information that is sent to your printer either when you print a document or when you download fonts.
See also: PostScript printer; virtual memoryThe extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections can provide remote access and routed connections to private networks over the Internet.
See also: authentication; encryption; remote access; routing; tunnelIn a server cluster, a collection of services that appear to clients as a physical Windows-based server but are not associated with a specific server. A virtual server is typically a resource group that contains all of the resources needed to run a particular application and that can be failed over like any other resource group. All virtual servers must include a Network Name resource and an IP Address resource.
See also: failover; IP Address resource; Network Name resource; resource; server clusterA program that attempts to spread from computer to computer and either cause damage (by erasing or corrupting data) or annoy users (by printing messages or altering what is displayed on the screen).
See also: Trojan horseA method for sending voice over a local area network (LAN), a wide area network (WAN), or the Internet using TCP/IP packets.
See also: local area network (LAN); Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN)An area of storage on a hard disk. A volume is formatted by using a file system, such as file allocation table (FAT) or NTFS, and has a drive letter assigned to it. You can view the contents of a volume by clicking its icon in Windows Explorer or in My Computer. A single hard disk can have multiple volumes, and volumes can also span multiple disks.
See also: disk; drive letter; file allocation table (FAT); NTFS file system; simple volume; spanned volumeAn optional, case-sensitive password you can assign to a Macintosh-accessible volume when you configure the volume. To access the volume, a user must type the volume password.
See also: password; volumeA volume that consists of disk space on one or more physical disks. A volume set is created by using basic disks and is supported only in Windows NT 4.0 or earlier. Volume sets were replaced by spanned volumes, which use dynamic disks.
See also: basic disk; dynamic disk; partition; spanned volume; volumeA volume that represents a duplicate of the original volume taken at the time the copy began.
See also: crash consistency; differential data; volumeA tunnel that is initiated by the client. A voluntary tunnel tunnels Point-to-Point Protocol (PPP) over Internet Protocol (IP) from the client to the tunnel server, and then the data is forwarded to the target host by the tunnel server.
See also: client; host; Internet Protocol (IP); Point-to-Point Protocol (PPP); tunnel; tunnel serverA computer that accepts virtual private network (VPN) connections from VPN clients. A VPN server can provide a remote access VPN connection or a router-to-router VPN connection.
See also: client; router; server; virtual private network (VPN)A telephony signal that Network Connections has put the modem in Listen mode and is waiting for incoming calls.
See also: modem (modulator/demodulator); Network ConnectionsA power management feature that allows a device to bring the operating system out of standby or sleep mode if there is network activity.
See also: sleep modeThe point at which users are nearing their quota limit.
See also: quota limitA password that does not provide an effective defense against unauthorized access to a resource. A weak password can be less than six characters long, contain all or part of a users account name, or contain less than three of the four following categories of characters: uppercase characters, lowercase characters, base 10 digits, and symbols found on the keyboard (such as !, @, #).
See also: password; password policy; strong passwordAn application protocol related to Hypertext Transfer Protocol (HTTP) 1.1 that allows clients to transparently publish and manage resources on the World Wide Web.
See also: Hypertext Transfer Protocol (HTTP); protocolA computer that is maintained by a system administrator or Internet service provider (ISP) and that responds to requests from a user's browser.
See also: Internet service provider (ISP)Sufficient connectivity to make your network and Active Directory useful to clients on your network. The precise meaning of well-connected is determined by your particular needs.
See also: Active Directory; clientServices that are so pervasive in the computer industry that standard bindings are universally recognized. These services often maintain a machine-centric status and are frequently legacy services such as those developed for use in TCP/IP networks, for example, Telnet and File Transfer Protocol (FTP). Well-known services can published in Active Directory, but because their bindings are widely known, the information is superfluous.
See also: Active Directory; binding; File Transfer Protocol (FTP); machine-centric; service; Transmission Control Protocol/Internet Protocol (TCP/IP)A communications network connecting geographically separated computers, printers, and other devices. A WAN enables any connected device to interact with any other on the network.
See also: device; local area network (LAN)A keyboard character that can be used to represent one or many characters when conducting a query. The question mark (?) represents a single character, and the asterisk (*) represents one or more characters.
In DNS, the supported use of wildcard characters such as the asterisk (*) in domain names for DNS queries that resolve to multiple names. When wildcarding is used, DNS servers must support resolving name queries that use wildcard characters, and resolvers must be able to parse multiple records from any resource record sets (RRsets) issued in wildcard query responses.
See also: DNS server; domain name; Domain Name System (DNS); resource record set (RRset); wildcard characterA Web site that lists hardware and software that is designed for use with Windows XP, Windows 2000 Server products, and products in the Windows Server 2003 family. You can use this site to help you decide whether to purchase a particular device or program, to help you evaluate whether a particular computer would support an upgraded operating system, or for similar decisions about hardware and software.
See also: device; Hardware Compatibility List (HCL)A feature of Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, that provides the complementary clustering technologies, Network Load Balancing clusters, and server clusters.
See also: cluster; Network Load Balancing cluster; server clusterProvides compatibility testing services to test hardware and drivers for Windows operating systems.
A software service that dynamically maps IP addresses to computer names (network basic input/output system (NetBIOS) names). This enables users to access resources by name instead of requiring them to use IP addresses that are difficult to recognize and remember.
See also: IP address; network basic input/output system (NetBIOS); resource; service; WINS proxy; WINS resourceA certification program to help customers identify systems, hardware, and software that meet a baseline definition of platform features and quality goals and ensure a good user experience of Windows.
See also: signed driver; unsigned driverA management infrastructure in Windows that supports monitoring and controlling system resources through a common set of interfaces and provides a logically organized, consistent model of Windows operation, configuration, and status.
See also: resourceA query that is based on Windows Management Instrumentation (WMI) and used to filter the effect of a Group Policy object (GPO). WMI filters are written in WMI Query Language (WQL) and are evaluated on the target computer or user. If the filter evaluates to true, then the GPO is applied. Otherwise, the GPO is not applied. WMI filters are useful for exception management.
See also: Group Policy Management console (GPMC); Group Policy object (GPO); Group Policy object linkSoftware that provides multimedia support, allowing you to deliver content using Advanced Streaming Format over an internet or the Internet.
See also: multimedia streamingA common set of interfaces that connect front-end applications with back-end services.
See also: serviceTools that administrators, developers, or support personnel can use to diagnose and troubleshoot operating system configuration problems. Although Windows Support Tools are included on the operating system CD, they are not guaranteed or supported by Microsoft, and they must be installed separately from the operating system.
A computer that listens to name query broadcasts and responds for those names not on the local subnet. The proxy communicates with a WINS server to resolve names and then caches them for a specific time period.
See also: subnet; Windows Internet Name Service (WINS)A resource type that provides Windows Internet Name Service (WINS) from a cluster.
See also: cluster; resource types; Windows Internet Name Service (WINS)Windows Sockets. An application programming interface (API) standard for software that provides a TCP/IP interface under Windows.
See also: application programming interface (API); Transmission Control Protocol/Internet Protocol (TCP/IP)Communication between a computer and another computer or device without wires. The form of wireless communication provided as part of the Windows operating system uses infrared (IR) light to transmit files. Radio frequencies, as used by cellular and cordless telephones, are another form of wireless communication.
See also: infrared (IR); infrared device; infrared portA simple grouping of computers, intended only to help users find such things as printers and shared folders within that group. Workgroups in Windows do not offer the centralized user accounts and authentication offered by domains.
See also: authentication; domain; user accountFor a process, the amount of physical memory assigned to the process by the operating system.
See also: processA system for exploring the Internet by using hyperlinks. When you use a Web browser, the Web appears as a collection of text, pictures, sounds, and digital movies.
See also: internetA set of standards defining a distributed directory service, developed by the International Standards Organization (ISO).
See also: directory serviceVersion 3 of the International Telecommunication Union - Telecommunication [Standardization Sector]
An X.509 certificate includes the public key and information about the person or entity to whom the certificate is issued, information about the certificate, plus optional information about the certification authority (CA) issuing the certificate.
See also: certificate; certification authority (CA); International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T); public keyRefers to microprocessors that have or emulate the 32-bit Intel processor architecture.
A Boolean operation that yields true if and only if one of its operands is true and the other is false. For some server operating systems, the exclusive OR is a Boolean operation in which the RAID-5 volume form of fault tolerance maintains an XOR of the total data to provide data redundancy. This is used to reconstruct missing data on a failed disk or sector from the remaining disks in the RAID-5 volume.
See also: fault tolerance; RAID-5 volumeThere are no glossary terms that begin with this letter.
In the Macintosh environment, a logical grouping that simplifies browsing the network for resources, such as servers and printers.
In a DNS database, a manageable unit of the DNS database that is administered by a DNS server. A zone stores the domain names and data of the domain with a corresponding name, except for domain names stored in delegated subdomains.
See also: DNS server; domain; Domain Name System (DNS); partition; resourceIn the Macintosh environment, a list that includes all of the zones associated with a particular network. A zone list is not to be confused with a DNS zone.
See also: DNS zone; Domain Name System (DNS); zoneThe synchronization of authoritative DNS data between DNS servers. A DNS server configured with a secondary zone periodically queries the master DNS servers to synchronize its zone data.
See also: authoritative; DNS server; primary zone; secondary zone; zone