Export (0) Print
Expand All

Windows Server 2008 Glossary - P

Updated: June 10, 2009

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

An organized collection of files and supporting items for a specific task, function, or solution.

A section of space on a physical disk that functions as if it were a separate disk.

On a hard disk, the data structure that stores the offset (location) and size of each primary partition on the disk. On MBR disks, the partition table is located in the master boot record. On GPT disks, the partition table is located in the GUID partition entry array.

A Hypertext Transfer Protocol (HTTP) browser, which is capable of broadly supported HTTP, that can use cookies. Active Directory Federation Services (AD FS) supports only passive clients, and it adheres to the WS-Federation Passive Requestor Profile (WS-F PRP) specification.

A set of access control lists (ACLs) that determine what credentials can or cannot be replicated on a read-only domain controller (RODC). Each RODC has a unique Password Replication Policy (PRP) that is enforced by the writable domain controller that is its replication partner.

An object class in the Active Directory Domain Services (AD DS) schema that is created by default under the System container in the domain. The Password Settings Container stores Password Settings objects (PSOs) for that domain.

An Active Directory object that is stored in the Password Settings Container. The Password Settings object holds the attributes of a certain fine-grained password policy.

A state that applies to a node in a failover cluster or server cluster. The node is a fully active member in the cluster but cannot accept new clustered services or applications. For example, a clustered service or application cannot fail over or fail back to a paused node. You can administer and maintain a paused node.

A register inside a Trusted Platform Module (TPM). This register is sufficiently large to contain a hash (currently only SHA-1).

A state that refers to a resource in a failover cluster or server cluster when the resource is in the process of being brought online or taken offline.

A mode in which the terminal server requests a TS Per Device client access license (TS Per Device CAL) from a Terminal Services license server so that a device can connect remotely to the terminal server.

A mode in which the terminal server requests a TS Per User client access license (TS Per User CAL) from a Terminal Services license server so that a user can connect remotely to the terminal server.

The degree to which a product or service executes its specified function.

A Distributed Component Object Model (DCOM) API that enables application programmers to log system performance and diagnosis data, and to generate alert notifications based on performance counter thresholds.

One or more computers that have a connection to the Internet through an external screening router and a connection to the internal network through an interior screening router. Computers that are linked to the perimeter network have limited access to both the Internet and the internal network. This architecture is convenient if multiple hosts require direct Internet access.

A unique and secret identification code similar to a password that is assigned to an authorized user and used to gain access to personal information or assets via an electronic device.

A unique and secret identification code similar to a password that is assigned to an authorized user and used to gain access to personal information or assets via an electronic device.

A Distributed Component Object Model (DCOM) API that enables application programmers to log system performance and diagnosis data, and to generate alert notifications based on performance counter thresholds.

A register inside a Trusted Platform Module (TPM). This register is sufficiently large to contain a hash (currently only SHA-1).

A type of device, such as a game controller or printer, that automatically works when you connect it to your computer. The computer configures the settings and installs the necessary drivers by itself.

Rules-based mechanism by which computer settings are constrained or controlled by the administrator.

A node in a failover cluster or server cluster that can run a specific resource. By default, all nodes appear as possible owners, so the resource can run on any node. In most cases, it is appropriate to use this default setting.

A computer account object that is created within Active Directory Domain Services (AD DS) before the operating system of the computer is installed.

The Domain Name System (DNS) suffix that a computer uses to identify the DNS domain to which it belongs. A computer's host name and its primary DNS suffix make up a fully qualified domain name (FQDN).

A type of partition created on basic disks that can host an operating system and functions as though it were a physically separate disk.

A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level.

A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority.

Attribute or characteristic of an object that is used to define its state, appearance, or value.

The Microsoft implementation of an integrity level. In particular, a protection level, refers to an integrity label that contains only level information, without the additional information traditionally contained within integrity level.

A set of access control lists (ACLs) that determine what credentials can or cannot be replicated on a read-only domain controller (RODC). Each RODC has a unique Password Replication Policy (PRP) that is enforced by the writable domain controller that is its replication partner.

An object class in the Active Directory Domain Services (AD DS) schema that is created by default under the System container in the domain. The Password Settings Container stores Password Settings objects (PSOs) for that domain.

An Active Directory object that is stored in the Password Settings Container. The Password Settings object holds the attributes of a certain fine-grained password policy.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft