Glossary

#

.CONFIGURE: Some policy files, such as the NSA Guidelines for Windows XP and Windows 2000, contains special rule named .CONFIGURE. The .CONFIGURE rule allows you to configure your policy files and set global parameters for policy files at run time.

A

Active Directory Connection Monitor: Connection monitor for Active Directory domains that detects computers coming on the network

Audit Service: Back-end Windows service that performs audits.

authentication: Authentication is any process by which a system verifies the identity of a user who wishes to access it.

C

Credential Store: Group of passwords securely stored in the database for a SecurityExpressions User

credentials: A set of Credentials is information used to verify the identity of a user. Normally a User ID and a Password, together, form a set of Credentials.

D

DNS: DNS is the Domain Name Service, a hierarchical global infrastructure deployed on the Internet and private IP-based networks used to resolve domain names into IP addresses.

E

Exceptions: A list of devices whose Group Posture is predetermined. An Exceptions list is an explicit list of devices to be excluded from an audit. Exceptions complement Scopes.

G

Generic DHCP Connection Monitor: The connection monitor/listener for DHCP Servers that detects computers coming on the network

I

Impact: Possible adverse impact of applying the rule. Suggested values are high, low, and normal, but you may specify any text. Impact may be a key in a rule.

M

Microsoft DHCP Server Connection Monitor: The connection monitor/plugin for Microsoft DHCP Servers that detects computers coming on the network

85

Page 93
Image 93
Symantec Security Expressions Server manual Glossary