Glossary – Symantec Security Expressions Server User Manual

Page 93

Advertising
background image

85

Glossary

#

.CONFIGURE: Some policy files, such as the NSA Guidelines for Windows XP and Windows

2000, contains special rule named .CONFIGURE. The .CONFIGURE rule allows you to

configure your policy files and set global parameters for policy files at run time.

A

Active Directory Connection Monitor: Connection monitor for Active Directory domains that

detects computers coming on the network

Audit Service: Back-end Windows service that performs audits.
authentication: Authentication is any process by which a system verifies the identity of a user

who wishes to access it.

C

Credential Store: Group of passwords securely stored in the database for a SecurityExpressions

User

credentials: A set of Credentials is information used to verify the identity of a user. Normally a

User ID and a Password, together, form a set of Credentials.

D

DNS: DNS is the Domain Name Service, a hierarchical global infrastructure deployed on the

Internet and private IP-based networks used to resolve domain names into IP addresses.

E

Exceptions: A list of devices whose Group Posture is predetermined. An Exceptions list is an

explicit list of devices to be excluded from an audit. Exceptions complement Scopes.

G

Generic DHCP Connection Monitor: The connection monitor/listener for DHCP Servers that

detects computers coming on the network

I

Impact: Possible adverse impact of applying the rule. Suggested values are high, low, and

normal, but you may specify any text. Impact may be a key in a rule.

M

Microsoft DHCP Server Connection Monitor: The connection monitor/plugin for Microsoft

DHCP Servers that detects computers coming on the network

Advertising