85
Glossary
#
.CONFIGURE: Some policy files, such as the NSA Guidelines for Windows XP and Windows
2000, contains special rule named .CONFIGURE. The .CONFIGURE rule allows you to
configure your policy files and set global parameters for policy files at run time.
A
Active Directory Connection Monitor: Connection monitor for Active Directory domains that
detects computers coming on the network
Audit Service: Back-end Windows service that performs audits.
authentication: Authentication is any process by which a system verifies the identity of a user
who wishes to access it.
C
Credential Store: Group of passwords securely stored in the database for a SecurityExpressions
User
credentials: A set of Credentials is information used to verify the identity of a user. Normally a
User ID and a Password, together, form a set of Credentials.
D
DNS: DNS is the Domain Name Service, a hierarchical global infrastructure deployed on the
Internet and private IP-based networks used to resolve domain names into IP addresses.
E
Exceptions: A list of devices whose Group Posture is predetermined. An Exceptions list is an
explicit list of devices to be excluded from an audit. Exceptions complement Scopes.
G
Generic DHCP Connection Monitor: The connection monitor/listener for DHCP Servers that
detects computers coming on the network
I
Impact: Possible adverse impact of applying the rule. Suggested values are high, low, and
normal, but you may specify any text. Impact may be a key in a rule.
M
Microsoft DHCP Server Connection Monitor: The connection monitor/plugin for Microsoft
DHCP Servers that detects computers coming on the network