Previous section  

Glossary

Account lockout

Based on the lockout security policy, a user will be denied access, or locked out, after a predefined number of failed logon attempts. The duration of the lockout is also set in the lockout security policy.



ACE (access control entry)

An entry in the access control list (ACL) that includes a security ID (SID) and an access rights list. When the SID is matched, access rights are granted or denied.



ACL (access control list)

An object's owner controls whether access to the object is allowed or disallowed. For this purpose, each object has an ACL that comprises access control entries (ACE). Also known as the discretionary access control list (DACL), the ACL is the portion of the security descriptor that enforces permissions associated with an object. (The other components of the security descriptor are the object's creator [otherwise known as its owner], its group [a POSIX compliance element that relates to the "primary group"], and the system access control list, or SACL, which regulates auditing.)



ACPI (Advanced Configuration and Power Interface)

An industry power management specification used by Windows 2000 Plug and Play hardware management.



ACS (Admission Control Service)

The part of the Quality of Service (QoS) network management feature that defines who shares shared network resources and how they are used. It also regulates subnet bandwidth.



Active Directory services

Microsoft Corporation's advanced directory service that is shipped with Windows 2000 Server versions. See Chapters 5 and 6 for information about directory concepts and Active Directory's capabilities.



Active partition

The partition from which the operating system starts; it must be the primary partition on a basic disk. On Windows 2000 systems, the active partition can also be the system volume. If Windows 2000 is dual-booted with earlier Microsoft operating systems, all start-up files for both operating systems must reside on the active partition.



ActiveX

An umbrella term for Microsoft technologies that permit applications developers to create Web-interactive content.



Adapter card

A printed circuit board or hardware chip set that permits network connections between computers. Also known as a network card.



Address

A DNS resource record that maps the domain name to an IP address.



Address classes

Three levels of address class exist based on IP numbers: A, B, and C. For additional information, see Chapter 12.



Address pool

The group or collection of scoped addresses available for license by a DHCP Server.



Address Resolution Protocol (ARP)

As part of the TCP/IP suite, this protocol provides resolution between IP and MAC addresses.



Administrator

As defined by Windows 2000, a member of the Administrators group, with full control over a specific computer or domain.



ADSI (Active Directory Service Interface)

An API that permits applications on Windows 9x, Windows NT, and Windows 2000 to interface with networked directory services.



Agent

A computer or network device that runs SNMP (the Simple Network Management Protocol) and provides information about its location and configuration.



API (Application Programming Interface)

A routine that can be called by an application to carry out requests of other applications or the operating system. An example is the display-handling routines available from the Win32 API.



AppleTalk

The default network protocol for Apple Macintosh computer systems. Windows 2000 Server provides connectivity to AppleTalk clients.



Asymmetric encryption

A system of encryption that uses mathematically related public and private encryption keys. The private key remains confidential; the public key is passed out freely. To encrypt a message, a sender uses the receiver's public key. The receiver can then decrypt the message with the corresponding private key.



Asynchronous communication

Transmission of data at irregular intervals. Start and stop bits signal when each character has been received.



ATM (asynchronous transfer mode)

A communication protocol that transmits fixed-length 53-byte packets. It is generally viewed as a rapid method of data communication.



Attribute

In terms of files, designation of a file as read-only, archival, encrypted, or compressed. In terms of Active Directory schema, definition of the features of the object class.



Auditing

A means of tracking the activities of system and user behavior.



Authentication

The process of matching a user's logon name and password against Windows 2000 security files. For standalone computers, it is carried out on the local system. For network logon, it is conducted by an Active Directory domain controller.



Authoritative restore

A form of object resolution used by the Backup tool in which specified objects are replaced.



Backup media pool

Defined by the Backup tool, the hardware devices dedicated to storage.



Backup Operators

A predefined user group whose members have authority to perform backup of data regardless of the object's attribute.



Bandwidth

In digital communications terms, the bits-per-second (bps) transfer rate. In analog communications, a range between high and low frequencies.



Basic disk

The hard drive that contains the primary partition, extended partitions, and logical drives. It can also access MS-DOS.



Basic volume

A storage method used by Windows NT 4.0 or earlier systems.



Batch program

A form of a text-based (ASCII) script that invokes other applications or batch programs. It uses the extension .cmd or .bat.



BDC (Backup Domain Controller)

Used by Windows NT Server 4.0 or earlier as a subordinate domain controller to the Primary Domain Controller, the BDC contains read-only copies of information such as the domain's security account manager (SAM). It is used in a Windows 2000 domain when the domain is configured in mixed mode.



BIND (Berkeley Internet Name Domain)

A version of DNS ported to most variants of UNIX.



BIOS (basic input/output system)

The system used in personal computers to check hardware, for basic operating system startup, and to initiate data communications. It is stored in Read-Only Memory (ROM).



Bit (binary digit)

The smallest unit of information used by personal computers. It is expressed as a 1 or 0 to designate true or false.



Bits per second (bps)

A measure of communication speed based on character transfer. A character is defined as 8 bits. In a typical asynchronous environment, an additional start and stop bit is added.



Boot

The process of starting or resetting a computer's operating system.



Boot files

Files required to initiate a Windows 2000 operating system, for example, Ntldr and Ntdetect.com.



Boot logging

A process that occurs automatically with system startup and saves information regarding boot activities. It is stored in the root directory as an ASCII file called Ntldr.txt.



Boot partition

The location of Windows 2000 operating system and support files. It has to be located in the same partition used for initial booting that contains Ntldr and Ntdetect.com.



BOOTP (Bootstrap Protocol)

Part of the TCP/IP used by diskless workstations or devices like network printers.



Browser

An application that interprets HTTP communications and displays HTML output from the Internet or an intranet.



Built-in groups

Shipped by default with Windows 2000 to incorporate a standard set of rights, these groups are provided so that rights can be easily applied to user accounts.



CA (certification authority)

The issuer of digital certificates or the corporate authority that establishes and verifies public keys. See Chapter 10 for additional information about the public key infrastructure and Microsoft's implementation of CA.



Cache

A local store of data commonly used by programs like DNS.



Callback number

Defined by the end user or the administrator, the number the server will call to connect with a remote client. It is often used for roaming users who want to limit hotel toll costs while connected to the home office server.



Canonical name

An object's distinguished name that is output without LDAP attribute tags such as DC= or CN=.



CDFS (Compact Disk File System)

A protected-mode file system used for CD-ROM storage and access.



Certificate

A certificate binds an encryption key with encrypted data. Certificates are digitally signed by certificate authorities.



CGI (Common Gateway Interface)

A server-based script that initiates services, it is commonly used in association with Web services.



Child domain

Part of a domain hierarchical tree. It shares the domain namespace, Global Catalog, and schema with all other domains in the tree. For example, if the child domain is called "sales" in the EntCert.com domain, its name is sales.EntCert.com.



Child object

An object nested within a parent object.



Client

Any system connected to or requesting services from another computer. That other computer is known as a server. At any given time, a computer can be a client or a server.



Cluster

A group of computers that share a workload and perform redundant fault tolerance. If a member of a cluster fails, another member will assume the workload in a process known as failover.



Cluster Services

The software component that manages cluster functions.



Cluster-aware application

Applications that conform to the cluster API. Not all applications are designed to work in a cluster environment. For additional information, see Chapter 17.



COM (Component Object Model)

The programming model that permits object interoperability and reusability. Theoretically, COM components can be used by different applications and within varied operating system environments. Microsoft's Object Linking & Embedding (OLE) and ActiveX are based on COM. DCOM (Distributed Component Object Model) is the network variant of COM.



Command prompt

The character-based window in which supported MS-DOS utilities and certain scripts such as batch files are run.



Common groups

The list of groups accessible from the Start menu that are common to all users.



Communication port

The port that permits single-bit asynchronous data transmission. Also known as the serial port.



Community name

The name used to group SNMP devices.



Compact Disk File System (CDFS)

A 32-bit protected-mode file system used for compact disks.



Computer account

Created by the domain administrator, the account that identifies a unique computer in the domain.



CPU time

The total processor time in seconds used by a process.



CPU usage

The percentage of the CPU that is being used. It is shown in the Task Manager.



CRC (cyclical redundancy check)

Checks for errors in data transmission. Each transmission includes data and extra (redundant) error-checking values. CRC is used by communications protocols such as XMODEM and Kermit.



Cryptographic Service Provider (CSP)

Code that performs authentication, encoding, and encryption services. It creates and destroys keys and their utilization. Windows-based applications gain access through the CryptoAPI.



DACL (discretionary access control list)

The part of an object's security descriptor that defines who has permission to use, or is specifically denied access to, an object.



DDE (dynamic data exchange)

A Microsoft implementation of Interprocess Communication (IPC) that permits DDE-enabled applications to share data.



Device driver

A code that communicates between Windows 2000 and hardware such as a modem, network card, and printer. Without it, a device is not recognized by Windows 2000. The Hardware Compatibility List (HCL) lists device drivers shipped with Windows 2000. Other drivers must be obtained from the hardware manufacturer.



Device Manager

Interfacing within the Executive, or kernel, mode of Windows 2000, it is an administrative tool used to control computer devices. It lists device properties and performs updates and further configuration.



Dfs (distributed file system)

The system of shared folders located on different servers that are linked into a single namespace, permitting transparent access to shared folders regardless of their location on the network.



Dfs link

The link from the Dfs root to shared folders or other Dfs roots.



Dfs root

A container for Dfs files and links.



DHCP (Dynamic Host Configuration Protocol)

An industry-standard networking protocol that provides TCP/IP-based networks with the ability to dynamically assign Internet Protocol (IP) addresses and eliminate address conflicts for the defined IP number range.



Dial-up connection

A connection that permits communication from a computer or network through telephone exchanges. It can be made through a modem, ISDN line, or X.25 network.



Differential backup

A backup of all files that have been added or modified since the last scheduled full or incremental backup. It does not set the Archival attribute, thereby marking the files as having been backed up.



Digital signature

The security method that binds the identity of a user to a file or object.



Digital Signature Standard (DSS)

A cryptographic standard that uses the Digital Signature Algorithm (DSA) to generate and verify signatures and SHA-1 as its message hash algorithm. DSA is a public-key cipher used to create digital signatures. It is not employed for data encryption.



Directory

A list of people, places, and things. A phone book is a common example.



Directory partition

The Active Directory has three partitions that are really directory subtrees, each of which has a separate replication schedule. The three partitions are the schema, the configuration, and actual objects.



Directory replication

The process of copying a database. Active Directory uses a multimaster replication model in which all domain controllers have read/write capacity and communicate changes to their peers through defined policies.



Directory Service

The network service that manages elements in the directory and permits users to locate objects based on definitions known as attributes.



Disk mirroring

The creation of a duplicate or mirrored version of a disk. Mirrored volumes must reside on different disks. In the event of a disk failure, access is obtained to the mirrored volume.



Distinguished name

Defines the domain and related container(s) in which objects reside. See Chapter 5 for a discussion on naming conventions.



DLL (dynamic-link library)

The collection of executable routines whose specific functions can be called by applications. As a specific function is needed, the application will locate and execute the required .dll file. DLLs are reusable.



DNS (Domain Name System)

An industry-standard service that works with TCP/IP networks, DNS is a hierarchical name service for host computers. It is used as a foundation technology by the Active Directory. DNS lists host names and IP addresses so that a computer can be located in either fashion.



DNS Dynamic Update Protocol

An enhanced version of DNS that permits the dynamic registration of hosts.



Domain

The Active Directory manages a hierarchical infrastructure of networked computers with the domain as the foundation. A domain comprises computer systems and network resources that share a logical security boundary and can store more than 17 terabytes in the Active Directory's database. Although a domain can cross physical locations, it maintains its own security policies and security relationships with other domains. Domains are sometimes created to define functional boundaries such as an administrative unit (e.g., marketing versus engineering). They are also viewed as groups of resources or servers that use a common domain name known as a namespace.



Domain controller

A server that contains a copy of the Active Directory. All domain controllers are peers and maintain replicated versions of the Active Directory for their domains. The domain controller plays an important role in both the logical and the physical structures of the Active Directory. It organizes all the domain's object data in a logical and hierarchical data store. It also authenticates users, provides responses to queries about network objects, and replicates directory services. The physical structure provides the means to transmit this data through well-connected sites.



Domain local group

A security or distribution group. It may contain universal groups, global groups, and accounts from any domain in the domain tree or forest.



Domain model

The Active Directory model that involves connection of one or more domains into hierarchical trust relationships. Domain trees and forests are created as part of this model. Also included are subadministrative structures known as organizational units.



Domain name and namespace

The name used by DNS to identify a computer, host, or network device. It is made up of a preface identifier (like "EntCert" or "Microsoft") and a suffix (like "com," "gov," "net," etc.) separated by a dot. The namespace is the database structure used by DNS for names.



Domain Naming Master

One of the several operations masters, this domain controller is responsible for adding and removing domain controllers from the forest.



Domain tree

When multiple domains share one schema, security trust relationships, and a Global Catalog, a domain tree is created, defined by a common and contiguous namespace. For example, all domains with the ending namespace of EntCert.com belong to the EntCert domain tree. A domain tree is formed through the expansion of child domains like Sales.EntCert.com or Research.EntCert.com. In this example, the root domain is EntCert.com.



EFS (Encrypting File System)

An extension to NTFS that permits users to secure files through encryption.



Event

Any significant activity or process that requires logging for documentation.



Event Log service

A documentation service that organizes a variety of events into lists that describe them and underscores whether they are normal or abnormal.



Explicit permissions

Permissions that are automatically set on an object or those that are set by the object's owner.



Extensible Authentication Protocol (EAP)

An extension of the Point-to-Point Protocol (PPP) that provides remote user access authentication. Authentication schemes supported by EAP include dial-up using Kerberos V5, one-time passwords, and public key authentication using smart cards and certificates. EAP can be used with dial-up, PPTP, and L2TP clients. It offers security against brute-force or dictionary attacks and greater protection against password guessing than other authentication methods, such as CHAP.



Failback

The process of reestablishing cluster node responsibilities when the original failure has been corrected. It is used in clustering environments.



Failover

The process of handing over responsibility to another node when a failure occurs. It is used in clustering environments.



FAT32

An extension of FAT introduced with Windows 98. Although FAT32 is supported in Windows 2000, it is still an older file system that limits many operating system features.



Fault tolerance

The ability of a system to ensure data integrity in the event of hardware failures. It is most closely associated with clustering.



File Allocation Table (FAT)

A file system used in MS-DOS and earlier versions of Windows. Although FAT is supported by Windows 2000, it has many limitations, especially regarding security and storage.



File Transfer Protocol (FTP)

A protocol used in TCP/IP networks to transmit files across the network.



Firewall

A system used to secure a computer or enterprise from unauthorized external access; usually includes a combination of software and hardware.



Forest

Trust relationships can be formed between domain trees with different namespaces, thus creating a domain forest. Forests allow the formation of an enterprise with different domain names such as EntCert.com and unint.com. All trees in the forest share a number of attributes, including a Global Catalog, configuration, and schema. A forest simply is a reference point between trees and does not have its own name.



Forward lookup

The DNS name locator that uses the friendly name (as opposed to the IP address).



Fragmentation

As data is stored on a disk, files may be divided and located in a number of physical locations. As files are so distributed, the disk is said to be fragmented. Unless defragmentation programs are run, this can cause system performance loss.



Gateway

A device that connects dissimilar networks and transmits the data.



Global Catalog (GC)

MA database that is designed for two primary functions. First, it is a domain controller that stores object data and manages queries on locating objects according to their most common attributes. Second, it provides data that permits network logon. In single-domain-controller environments, the Active Directory and the GC reside on the same server.



Global group

The group used to organize users within the domain.



Group

A collection of users, computers, and other groups. It is the method by which rights and other characteristics can be assigned to multiple users.



Group memberships

Users are members of one or more groups and derive rights from group membership.



Group Policy

The Group Policy is an administrative mechanism for defining and managing the way objects are used by users and computers.



Group Policy Object (GPO)

A collection of Group Policy settings.



Guest account

An account for users who do not have a regular user account.



GUID (globally unique identifier)

The code that identifies a device or component through the use of a 16-byte value.



HAL (Hardware Abstraction Layer)

A layer of code that separates the hardware interface from the kernel and Executive Services.



Hash

A one-way mathematical function (hash algorithm) that is applied to data to secure it. Also known as a message digest.



Hive

A portion of the Registry that appears as a file on the hard disk. It is edited by the Registry Editor.



Home directory

The directory accessible by a user for the storage and manipulation of her files. Every user has a home directory, whose default location can be set by the administrator.



HTML (Hypertext Markup Language)

A text-based markup language interpreted by Web browsers to format and output file contents.



HTTP (Hypertext Transfer Protocol)

The protocol used to transfer information on the World Wide Web.



IAS (Internet Authentication Service)

A method of providing security and authentication for dial-in connections.



IIS (Internet Information Server)

Microsoft Corporation's software that maintains and configures Internet services. It includes Web, Network News Transfer Protocol (NNTP), file transfer protocol (FTP), and Simple Mail Transfer Protocol (SMTP) services.



Incremental backup

Storage of only those files that are new or that have been modified since the last full backup and marking them as having been backed up.



Indexing Service

An advanced search facility that indexes data for more rapid location.



.inf

The file extension for device drivers.



Infrastructure Master

One of the operations masters, this domain controller manages group-to-user references as changes within group membership occur. This data is then replicated to the other domain controllers.



Inheritance

The method of passing permissions or attributes from parent to child.



IP (Internet Protocol)

The messenger protocol in the TCP/IP suite. It is responsible for addressing and sending TCP packets.



IP address

A unique, logical set of numbers that identifies each host computer or node in a TCP/IP network. It is a 32-bit number divided into four decimal numbers from 0 to 255, with the numbers separated by periods. An example of an IP address is 111.111.111.111.



KCC (Knowledge Consistency Checker)

The process used to create and manage site topology for Active Directory replication.



KDC (Key Distribution Center)

A distributed network service that supplies session tickets and temporary session keys used by Kerberos.



Kerberos

The MIT-developed authentication protocol used by Windows 2000 to verify a user's encrypted password so that he can achieve logon rights.



Kernel

Windows Server 2003 uses a nonconfigurable microkernel that provides basic operating system functions. The microkernel dispatches and controls threads serving as the heart of the operating system.



Kernel mode

One mode in which an operating system operates. The kernel mode manages such services as security, I/O, device drivers, and HAL—that is, generally those things that are not directly involved with users or the Win32 subsystem. Also known as the Executive mode.



L2TP (Layer 2 Tunneling Protocol)

An industry-standard tunneling protocol.



LAN (local area network)

A group of computers, printers, and other devices situated in a relatively small area that are linked for communications.



LDAP (Lightweight Directory Access Protocol)

A network protocol used by the Active Directory to locate objects within a Windows 2000 domain. As an industry standard, it also permits some directory service interoperability.



Line printer remote (LPR)

A service used to support remote printer jobs received from clients.



Local account

Accounts created for users who want access only to the local computer. The Active Directory is not aware of local accounts, and network logon cannot occur through a local account.



Local computer

A computer that is not part of a domain.



Local group

A group used to assign permissions to local users for the specific computer in which the group resides.



Logon

The process in which the user provides a name and password that are passed to Windows 2000 for authentication. Logon scripts are read to provide unique user environments.



Master file table (MFT)

The first file on an NTFS volume, it contains information about folders and files on that volume.



MBR (Master Boot Record)

The booting process starts by initiating the MBR data structure. If this sector is corrupted, booting will not occur.



Member server

Any computer that runs Windows 2000 Server or above but is not a domain controller.



Message Queuing

A Microsoft feature that allows messages between applications to be queued and distributed across the network, even to systems that may be offline. Message Queuing provides guaranteed message delivery and priority-based messaging.



Microsoft Management Console (MMC)

The MMC provides administrative tools with a consistent interface. An administrator can create one or more MMCs and add to it the administrative tools desired. An MMC can also be distributed to other administrators.



Mirror set

A fully redundant copy of data. It provides fault tolerance.



Mixed mode

An environment that exists when domain-level domain controllers have not be promoted to the Active Directory and still run the Windows 2000 MMC (Microsoft Management Console).



MS-DOS

The original Microsoft operating system. Many of its utilities are available on Windows 2000 and are accessible from the command prompt.



Multimaster replication

The replication process that replaces the Windows NT replication model in which a Primary Domain Controller (PDC) writes updates to Backup Domain Controllers (BDC). With Windows 2000, all domain controllers have read and write capability so that they all share the same data.



Multiple boot

Windows 2000 permits system configuration so that more than one operating system can be booted from the computer. For example, for reasons of legacy application support, it may be necessary to configure a system with both MS-DOS and Windows 2000 boot capability. Multiple boots present some security risks and are not highly recommended.



Named pipe

The name for dedicated memory shared by two processes that is used for exchanging data.



Namespace

A group of names of objects that occupy one network or system, and defined by conventions such as the Domain Name System (DNS), Fully Qualified Domain Name (FQDN), distinguished names (DN), and User Principle Names (UPN)s used by the Active Directory to locate users, hosts, and objects throughout the domain.



Native mode

The mode in which all domain controllers are running Windows 2000 Server and have been converted from mixed mode. Windows NT 4.0 BDCs are no longer allowed to participate in Active Directory replication or to perform administrative functions.



Network adapter

A hardware circuit board that interfaces between the computer system and the shared network media. Each network interface card, supporting the TCP/IP protocol suite, must obtain a unique IP address to communicate with other interface cards on the network.



Network card driver

A driver that allows the protocol driver to communicate with the network adapter card. A driver is programmed with vendor-specific and model-specific hardware requirements for each type of card. This driver must be found from among the Windows 2000 drivers or retrieved from the network adapter's vendor.



NNTP (Network News Transfer Protocol)

A subset of the TCP/IP suite that allows clients to read and post news messages to a news site. It allows readers to follow conversation threads.



Node

A member of a server cluster or a device with one or more network interfaces.



Nonauthoritative restore

Restoration of Active Directory from a directory backup. The restored directory is not given the same priority as current domain controller information.



Noncontainer object

An object that may not contain another object—for example, a leaf object, such as a file.



Nonpaged memory

Sections of the computer's RAM that are not paged to disk. Data stored in them is always available for quick read and write operations.



Nontransitive trust

Either a one-way or a two-way trust that does not support transitivity. If A trusts B and B trusts C, then A does not trust C.



Normal backup

During backup, the archive attribute is set on all files that have been backed up. Incremental backups then back up files that have been updated since the last normal backup.



NS (Name Server) resource record

The record that identifies authoritative DNS name servers for a domain.



Nslookup

A DNS client command-line tool for testing the DNS lookup functionality.



NTFS

The most advanced file system for Windows 2000-supported special file/folder permissions, auditing, file encryption, and large volumes.



NTLM

The authentication mechanism for Windows NT and down-level versions of Windows. It is supported in Windows 2000 to authorize these earlier systems.



Object

An instantiation of a class definition. Typical objects include files and folders. In the Active Directory, user accounts, computers, and containers are all examples of objects. An object such as a user account has associated attributes like name, telephone, and title.



ODBC

Open Database Connectivity is based on the Call Level Interface (CLI) for implementing common Structured Query Language (SQL) statements when access is desired for different database implementations.



Offline

A cluster server node is offline when it is inactive or shutdown.



OLE

In Object Linking and Embedding technology, portions of documents, spreadsheets, or graphics are either linked to another document or embedded and copied. Linking objects allows changes to an object to be reflected in the link. Embedding or copying the object creates two separate objects, and changes in one object will not be reflected in the other.



On-disk catalog

A list of files and folders that have been backed up using the Backup utility on the local drive.



On-media catalog

A list of files and folders that have been backed up, using the Backup utility, to a medium other than the local drive.



One-way trust

In a one-way trust relationship, one domain trusts another, but the second domain does not trust the first. This type of trust is nontransitive.



Online

A Cluster Server node is online when it is active or running.



Operations master

A unique role that is performed by a single domain controller, as discussed in Chapter 5.



Operator

The symbol or character used to make string matches and comparisons when performing searches.



Organizational unit (OU)

A subcategory of a domain used to provide more granular control over the application of Group Policies and the delegation of administrative authority.



Orphan

A crashed or failed volume in a RAID-5 configuration.



Orphan file

A briefcase file not related to any other file on the system.



Owner

A user who may change permissions on an object regardless of its permission settings.



Packet

A collection of binary data used to communicate information over networks. The packet definition is limited to the network layer (OSI layer 3) and above. Data link layer information is considered frame information.



Packet header

The section of a data packet that appears first. It contains the source, destination, and size of data contained in the packet.



Page fault

The interruption that occurs when a process cannot find needed memory from RAM. If it must retrieve memory paged to the disk, a hard page fault occurs. When a process cannot access needed memory from RAM because of resource demands from another process, a soft page fault occurs.



Paged pool

The amount of virtual memory allocated to a process.



Paging file

A hidden file on the hard disk that stores paged data. Paging file information is accessed when a hard page fault occurs. RAM and paging files make up the virtual memory space.



Parent domain

The domain above a given domain in the domain hierarchy.



Parent object

An object that contains a given object.



Partition

A physical disk may be divided into as many as four partitions that appear to be separate disk drives to the user.



Partition Boot Sector

The sector of a computer's hard disk that contains information necessary to read disks and load the operating system during startup.



Password

A unique string that may be up to 14 characters long for Windows 2000 user accounts.



Path

The route marked by a disk volume, folders, and a file name that are ordered to identify a particular file or folder in the directory's hierarchy. Domain names and host names may also be used to identify objects—for example, \\Entcert.com\Documents\username\Address Book.



PDC Emulator

The domain controller designated in Windows 2000 to function as the operations master that handles PDC responsibilities for down versions of Windows NT and handles all Group Policy modifications and updates.



Peak memory usage

The highest amount of memory consumed by a process since it started.



Pel

The smallest controllable video screen component. Also known as a pixel.



Per Seat Licensing

In this type of licensing, each client is given a license to access a given server, and all licensed clients may access the server at once.



Per Server Licensing

This type of licensing dedicates licenses to a given number of clients. Any client may use an available license, but no more then the number of client licenses may access the server at one time.



Permission

The ability of a user to access an object. Permissions are assigned to users and security groups and govern access privileges and actions that may be performed on an object.



Ping

A command-line utility used to verify IP connectivity to a given IP address.



Pixel

The smallest controllable video screen component. Also known as a pel.



Plug and Play

A facility that automatically detects hardware components so that the correct driver may be loaded for further communication with the device.



Point of presence (POP)

Post Office Protocol.



Point-to-Point Protocol (PPP)

The protocol designed to provide serial encapsulation of IP/IPX/AppleTalk protocols over remote access connections.



Point-to-Point Tunneling Protocol (PPTP)

A protocol that supports two endpoints of a tunnel, allowing encapsulated data to travel between them. Encryption and authentication supported by the tunneling protocol create a virtual private network (VPN) through the tunnel to give users secure access to corporate networks over the Internet or an intranet.



Pointer (PTR) resource record

A record that permits the reverse mapping of an IP address to a host name. PTR records can be found in reverse lookup zones.



Policy Group

Policies that determine the look and feel of the desktop environment, user profile locations, application availability, security settings, and logon/logoff scripts.



POP (point of presence)

The closest Internet remote access point for a traveling user that permits the use of a local telephone number. Once the user dials in to an ISP's POP, she can establish access to her corporate network without long-distance phone charges.



Port

The interface of two hardware devices. It can be a serial (COM) port, a parallel (LPT) port, a Universal Serial Bus (USB) port, and any other communication port on the computer.



Port ID

Usually a communication protocol's port number used by the service. For example, HTTP servers usually listen for communication on TCP port 80.



Port rule

A rule that determines the action taken when traffic attempts to send or receive on a given port.



POSIX (Portable Operating System Interface for UNIX)

A set of standards drafted by the Institute of Electrical and Electronic Engineers (IEEE) that define various aspects of an operating system, including programming interface, security, networking, and graphical interface. Programs that adhere to the POSIX standard can be easily ported from one system to another.



Predefined key

The section or category of the Registry accessible through the Registry Editor.



Primary Domain Controller (PDC)

The domain controller that contains the writeable version of the user accounts database for Windows NT 4.0 domains and down-level versions. Only a PDC can exist for a Windows NT 4.0 domain. BDCs contain read-only versions of the database.



Primary partition

Up to four primary partitions may be created on a disk and act as a reference point for booting the system.



Print job

The queued data for printing and associated print format commands.



Print server

The computer assigned to handle print jobs for a printer or set of printers.



Print spooler

The application on a print server that handles print jobs and distributes them to corresponding printers.



Printer

A device that transfers electronic data to paper or film media.



Printer driver

The driver that allows the operating system to interface with a particular printer designated by a vendor and printer model.



Printer fonts

Text fonts contained in nonvolatile memory on a printer. The printer is capable of printing only these font types.



Printer permissions

Access permissions for a particular printer.



Printing pool

One or more printers attached to a print server that are assigned print jobs based on current load.



Private key

A key owned by one user or computer that is not accessible to any other party. It has a corresponding public key that may be used to decrypt data encrypted by the private key. The public key can also be used to encrypt data that can be decrypted only by the private key.



Process

An application or program that has associated dynamic memory, static memory, and program memory space. Threads can also be created in the process's memory space.



Process identifier (PID)

A unique number that identifies a process that is easily accessible from the Task Manager.



Protocol

A standard for interpreting data transmitted from one process to another. Some protocols, such as the Internet Protocol, allow routing over the Internet, and some, such as the Transfer Control Protocol, guarantee packet delivery via a connection.



Public key

A key owned by a user or computer that is accessible to other parties. It has a corresponding private key that may be used to decrypt data encrypted by the public key. It can also be used to encrypt data that can be decrypted only by the private key.



Public key cryptography

An asymmetric key technology that uses private and public keys to exchange information.



Public Key Infrastructure (PKI)

Methods and strategies for distributing public and private keys for secure communication, authentication, and integrity of data.



Quality of Service (QoS)

The attempts to guarantee bandwidth and delivery of IP packets using protocols implemented by Windows 2000.



Query

The criteria for a search using Index Services.



Queue

A buffer or list of items waiting to be processed.



Quota

The amount of disk space a user may consume.



RAID-5

A fault-tolerant strategy implemented by Windows 2000 using three or more dynamic volumes to protect data. Parity information is stored along with protected data across several disks. When one disk fails, the data may be reconstructed from what's left of it and the parity information.



Random-Access Memory (RAM)

The volatile memory used by the system's microprocessor; it is lost when the computer loses power or is turned off. It provides the fastest memory accesses (Reads/Writes) available to the system.



Read-Only Memory (ROM)

The nonvolatile memory, which is not lost when the system's power is turned off and is not modified frequently or quickly. Most ROM is not modifiable by the system.



Recovery agent

A user account that is provided a recovery key for decrypting files using the Encrypted File System (EFS). Usually this is the Administrator account.



Recovery Console

The system console that allows basic disk access, format ability, and some repair abilities. It is started from the Windows 2000 recovery disks or directly from the command prompt using the Winnt32.exe /cmdcons command.



Recycle Bin

A temporary storage for deleted files and folders. Once it has been emptied, data is lost and disk space is freed.



Redundant array of independent disks (RAID)

A storage system that categorizes six levels of disk fault tolerance (0–5). Windows 2000 implements striping (0), mirroring (1), and Raid-5 (5).

See also [RAID-5]


Registered file type

A file type recognized by the operating system.



Registry

The database that contains application and operating system configuration information; it can be viewed and modified using the regedit.exe command.



Registry boot

The Windows 2000 DNS server has a couple of boot options: registry settings and boots with settings contained in the text file.



Relative distinguished name (RDN)

A subset of an object's full distinguished name, usually the CN, or common name, portion.



Relative ID

An identification number that relates to a specific domain controller. A domain controller requests relative IDs from the relative ID master. A combination of the domain ID and retrieved relative IDs forms a security ID, which is then assigned to identify users, security groups, and computers in the domain.



Relative ID Master

One domain controller, the master, is assigned the responsibility to generate relative IDs for all domain controllers in the domain.

See also [Relative ID]


Relative name

The host name portion of the Fully Qualified Domain Name used in DNS naming. For example, in ahost@domainname.com the relative name is ahost.



Remote access

Ability of users outside the intranet to dial in for access or use a network interface attached to the Internet.



Remote Access Server (RAS)

A system configured to accept remote access.



Remote administration

Administration of system settings without local logon.



Remote Authentication Dial-In User Service (RADIUS)

A protocol used by many ISPs to authenticate, authorize, and provide accounting for users who access their corporate intranets using tunneling protocols.



Remote computer

A computer that is not available for a local logon.



Remote procedure call (RPC)

A message-passing facility that allows a distributed application to call services from other computers in the system.



Replication

The process of copying data to provide redundancy and object availability. A multimaster replication screen is used so that all domain controllers have the same information and read/write capability.



Replication topology

The configuration of replication, by which information is shared between pairs of domain controllers. The KCC automatically generates the topology of a site. An administrator establishes replication between sites.



Root

The highest level of the structure. For example, the first domain created is the root domain.



Router

A network server designed to support connectivity and interoperability. It analyzes network addresses in a packet and then passes the packet along. Routers make packet-forwarding decisions.



RR (resource record)

Records that associate addresses to other data. They are defined by RFC 1035 and used by DNS.



RSA

The default for Microsoft Windows, RSA is a public and private key algorithm utilization.



SACL (system access control list)

A partial list of an object's security descriptor. It defines which events are to be audited per user or group.



Safe mode

As part of the option menu system accessed by pressing F8 during the initial boot phase of a system, safe mode loads Windows 2000 with minimal services. It provides an environment in which a system that will not normally boot can be corrected and repaired. Safe mode can be launched in its default manner, from the command prompt or with networking services.



SAM (Security Account Manager)

A protected subsystem of Windows 2000 and Windows NT that maintains the Security Account Manager database. The Active Directory supplants SAM in domain environments.



Schema

A framework of definitions that establishes the type of objects available to the Active Directory. The definitions are divided into object classes and attributes. Attributes are divided into two types: those that must exist and those that may exist. For example, the schema defines a user object class as having the user's name as a required attribute and the user's physical location or job description as an optional attribute. Attributes help distinguish an object from other objects. They are defined to include the Object Name, Object Identifier (OID), Syntax, and optional information.



Schema Master

A domain controller that functions as an operations master to manage schema changes and replicate them to other domain controllers.



Scope

The range of IP address available for assignment by DHCP.



Script

A program that executes a series of instructions. The Windows Scripts Hosting facility permits the launching of a variety of scripts. Batch programs (with .bat or .cmd extensions) are scripts.



Secure Hash Algorithm (SHA-1)

A message digest hash that creates a 160-bit hash value.



Secure Multipurpose Internet Mail Extensions (S/MIME)

A secure extension to the industry-standard mail protocol.



Secure Sockets Layer (SSL)

A protocol for securing network communication using public and private keys.



Security descriptor

A set of data attached to an object. It specifies the permissions granted to users and groups and defines the security events to be audited.



Security group

Anything that can be listed in the DACL that provides or defines permissions.



Security ID (SID)

The unique identifying number of a user or other network object.



Service (SRV) resource record

A resource record employed in a zone to register and locate TCP/IP services.



Shared folder

Folder that permits other defined users to access files on a remote system.



Simple Mail Transfer Protocol (SMTP)

A protocol used on the Internet to transfer mail. It can relay mail across transport service environments.



Simple Network Management Protocol (SNMP)

A TCP/IP–based network management protocol that transports information and commands between management programs. The SNMP agent sends status data. SNMP defines the form and meaning of the messages exchanged.



Site

In Active Directory, the basic units of the physical network structure. A site comprises one or more IP subnets that are tied together by high-speed, reliable connections. It is the administrator's responsibility to design sites that ensure the greatest network performance.



Smart card

A credit-card-size device that contains public/private key information and other data.



Snap-in

An application that is added to the Microsoft Management Console and conforms to its standard API.



Socket

A bidirectional pipe for incoming and outgoing data between networked computers.



Spanned volume

The range of volumes in which data is stored. If one of the disks in the volume fails, all the data is lost.



Special access permissions

Customized permissions available under NTFS.



Static routes

Permanent routing network tables.



Stripe set

A set of disks that permits the storage of identical partitions on different disks.



Stripe set with parity

Extension of the basic disk stripe sets to allow for fault tolerance.



Subkey

In the Windows 2000 Registry structure, the subkey is simply a child key within a key.



Subnet mask

A 32-bit value that distinguishes the TCP/IP network ID portion of the IP address from the host ID portion. TCP/IP hosts use the subnet mask to determine whether a destination host is located on a local or remote network.



System partition

The section of the hard drive that contains the configuration files necessary to boot Windows 2000.



System State

The portion of the backup that archives the system configuration used for emergency recovery.



SYSVOL

A shared directory that stores the server's copy of the public files, which are replicated among all domain controllers.



TAPI (Telephony API)

An applications programming interface that allows data/fax/voice calls by programs including HyperTerminal, Dial-up Networking, Phone Dialer, and other communications.



TCP/IP (Transmission Control Protocol/Internet Protocol)

One of the most common networking protocols on the Internet. It includes a suite of applications and standards for intercomputer communication and conventions for connecting networks and routing traffic.



Telnet

A terminal emulation protocol widely used on the Internet.



Terminal Services

An application that supports traditional multiuser environments for Windows 2000. An application run on a server can be displayed and interfaced from a client computer. Microsoft supplies Terminal Services for its Windows products. Terminal Services for other environments like UNIX or Macintosh are available from third-party vendors.



TFTP (Trivial File Transfer Protocol)

A nonsecure TCP/IP file transfer protocol. Its use is generally discouraged.



TGS (Ticket-Granting Service)

Part of the public key infrastructure, a service that authorizes the granting of certificates.



TGT (Ticket to Get Tickets)

The ticket issued to obtain a security certificate.



Thread

A type of object within a process that executes the program instructions. Multiple threads permit the running of concurrent operations within a process.



Topology

The structure that defines the relationships among domains, sites, and network devices.



Transitive trust

A two-way trust relationship established between domain trees and forests. Assuming a user has permission, a transitive trust relationship permits access to objects anywhere in the tree or forest.



Trojan horse

A program that appears to perform one function but executes other functions, generally to the detriment of the user or computer system.



Trust relationship

Relationship between domains that allows exchange of authentication and permissions. A trust relationship allows users and global groups access to another user account's database. With trust relationships, a user who has only one user account in one domain can potentially access the entire network. All domains in a tree or forest automatically establish two-way trust relationships. In addition, explicit one-way trusts can be established between two single domains.



UNC (Universal Naming Convention)

A convention for naming files and other resources that begins with two backslashes (\).



URL (Uniform Resource Locator)

An address that uniquely identifies a location on the Internet. A URL for a World Wide Web site is preceded with http:// and can contain more detail, such as the name of a page of hypertext, usually identified by a suffix of .html or .htm.



User account

The collection of a user's properties, including a unique name and password, that allows her access to a system.



User mode

The portion of the operation system that works to facilitate use and application integrity and interaction.



User profile

The file that defines the configuration data for a user, including desktop settings, persistent network connections, and application settings.



User rights

Designation of the activities a user is permitted to perform. Many user rights are established through membership in security and distribution groups.



User rights policy

Security settings that underscore user rights.



Virtual DOS machine (VDM)

The VDM is invoked when MS-DOS commands or utilities are invoked.



Virtual memory

Memory used on a temporary basis to execute programs and processes.



Virtual private network (VPN)

An extended private network that involves authentication and encryption of data across public networks.



Volume

A disk or partition on a disk that operates as if it were a separate physical disk.



WAN (wide area network)

A communications network that is spread out geographically.



Windows Internet Name Service (WINS)

A Microsoft service that maps computer names to IP addresses. It is used by earlier versions of Windows and is supplanted by Windows 2000/.NET Server use of DNS and DHCP.



Workgroup

A collection of Windows 2000 and other computers that are interconnected but do not belong to a domain.



X.500

A set of standards that define a distributed directory service. The standards are developed and supported by the International Standards Organization (ISO).



Zone

A subtree of the DNS database. It is administered as a single DNS server. This administrative unit can consist of one domain or more than one child domain.




  Previous section  
Top