Endpoint security management tools Definitions

  • A

    application performance monitoring (APM)

    Application performance monitoring, also called app monitoring, is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience.

  • B

    BIOS password

    A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up.

  • C

    cellular automaton (CA)

    A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.

  • checkpoint

    A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine. Like a restore point in Windows operating systems, a checkpoint allows the administrator to return the system to an earlier, functioning state if problems are encountered... (Continued)

  • D

    desktop personalization

    Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.

  • disk analyzer

    A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.

  • E

    Enterprise Device Alliance (EDA)

    The Enterprise Device Alliance (EDA) seeks to help administrators integrate iOS and Android devices into existing Windows environments.

  • H

    host intrusion prevention systems (HIPS)

    A host intrusion prevention system (HIPS) is a security method that relies on third-party software tools to monitor network traffic and system activities for anomalous code behavior to identify and prevent malicious activities.

  • K

    kiosk mode (Windows assigned access)

    Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized users while preventing access to other files, data and functionality of the operating system and computer.

  • M

    Microsoft Windows Defender

    Windows Defender is Microsoft's antimalware software. Defender works with Windows Update to automatically install new virus definition files as they are published and provide computers using the Microsoft operating system (OS) with both real-time and anytime scanning options.

  • Microsoft Windows Information Protection (WIP)

    Windows Information Protection is a feature built into Windows 10 that allows IT shops to control and manage business data separately from personal data on users' devices.

  • Microsoft Windows Recovery Environment (Windows RE)

    The Microsoft Windows Recovery Environment, or Windows RE, is a simplified, scaled-back version of the Windows operating system that is used to boot the system when Windows 8.x, Windows Server 2012 or Windows Server 2012 R2 can't.

  • P

    prefetch folder (PF)

    A Windows prefetch folder is a specific location within Windows XP and later computers that contains a series of small files detailing the startup activities and frequently-used applications.

  • R

    remote desktop

    Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close