Export (0) Print
Expand All

Windows Server 2008 Glossary - I

Updated: June 10, 2009

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

A process that uses installation technologies that install Windows images (.wim files).

A window that, by default, opens immediately after operating system installation is complete and each time a member of the Administrators group logs on to the computer. By using commands in the Initial Configuration Tasks window, you can complete the configuration required to identify the computer to other computing resources on your network, secure the computer, enable administrators to perform tasks on the computer, and customize the computer by adding roles or features.

See "Internet Key Exchange".

A number that represents how trustworthy a particular process, application, or object is.

A process that uses installation technologies that install Windows images (.wim files).

A window that, by default, opens immediately after operating system installation is complete and each time a member of the Administrators group logs on to the computer. By using commands in the Initial Configuration Tasks window, you can complete the configuration required to identify the computer to other computing resources on your network, secure the computer, enable administrators to perform tasks on the computer, and customize the computer by adding roles or features.

A task that the Trusted Platform Module (TPM) performs by confirming that the SHA-1 computed hash of each system component that runs during boot matches the values that are stored in platform configuration registers (PCRs) at the time BitLocker Drive Encryption was turned on. If the state of early boot components is different from the static root of trust measurement, BitLocker boots to recovery mode until the authorized user enters the recovery password.

A number that represents how trustworthy a particular process, application, or object is.

A security identifier (SID) that represents an integrity level. An object’s system access control list (SACL) and access token can contain one or more integrity SIDs. Integrity SIDs in the access token determine the level of access given to a process attempting to access an object.

A Windows desktop session running with an interactive user’s access token applied.

The process of logging on to a local computer by using a keyboard.

A user that is interacting directly with the user interface of the computer, by using the local console, Terminal Services, or Remote Desktop.

A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec).

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft