Windows Server 2008 Glossary - I

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

Glossary - I

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

IBS

A process that uses installation technologies that install Windows images (.wim files).

ICT

A window that, by default, opens immediately after operating system installation is complete and each time a member of the Administrators group logs on to the computer. By using commands in the Initial Configuration Tasks window, you can complete the configuration required to identify the computer to other computing resources on your network, secure the computer, enable administrators to perform tasks on the computer, and customize the computer by adding roles or features.

IKE

See "Internet Key Exchange".

IL

A number that represents how trustworthy a particular process, application, or object is.

image-based setup

A process that uses installation technologies that install Windows images (.wim files).

Initial Configuration Tasks

A window that, by default, opens immediately after operating system installation is complete and each time a member of the Administrators group logs on to the computer. By using commands in the Initial Configuration Tasks window, you can complete the configuration required to identify the computer to other computing resources on your network, secure the computer, enable administrators to perform tasks on the computer, and customize the computer by adding roles or features.

integrity checking

A task that the Trusted Platform Module (TPM) performs by confirming that the SHA-1 computed hash of each system component that runs during boot matches the values that are stored in platform configuration registers (PCRs) at the time BitLocker Drive Encryption was turned on. If the state of early boot components is different from the static root of trust measurement, BitLocker boots to recovery mode until the authorized user enters the recovery password.

integrity level

A number that represents how trustworthy a particular process, application, or object is.

integrity SID

A security identifier (SID) that represents an integrity level. An object’s system access control list (SACL) and access token can contain one or more integrity SIDs. Integrity SIDs in the access token determine the level of access given to a process attempting to access an object.

interactive desktop

A Windows desktop session running with an interactive user’s access token applied.

interactive logon

The process of logging on to a local computer by using a keyboard.

interactive user

A user that is interacting directly with the user interface of the computer, by using the local console, Terminal Services, or Remote Desktop.

Internet Key Exchange

A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec).