Export (0) Print
Expand All

Windows Server 2008 Glossary - C

Updated: June 10, 2009

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

A special memory subsystem in which frequently used data values are duplicated for quick access.

Estimating the space, hardware, software, and connection infrastructure resources that will be needed over some future period of time.

A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development.

The log where the quorum resource stores data. This data is maintained by the clustering software.

A statement that a server makes (for example, name, identity, key, group, privilege, or capability) about a client.

The act of mapping, removing or filtering, or passing claims between various claim sets.

A Microsoft ASP .NET application that performs authorization based on the claims that are present in an Active Directory Federation Services (ADFS) security token.

A token-based file used to describe Group Policy setting information.

A collection of .adm files that provides Group Policy setting information for the items that appear in the Classic Administrative Templates folder in the Local Group Policy Editor, and when editing a Group Policy object by using the Group Policy Management Console.

The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted.

Any computer or program connecting to or requesting the services of another computer or program.

The Web page that is used to interact with a user to determine which account partner the user belongs to when Active Directory Federation Services (ADFS) cannot automatically determine which of the account partners should authenticate the user.

In AD FS, a certificate that federation server proxies use to authenticate a client to the Federation Service.

When Active Directory Federation Services (ADFS) performs a logoff operation, a Web page that is executed to provide visual feedback to the user that the logoff has occurred.

When AD FS collects client credentials, a Web page that is executed to perform the user interaction.

A group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.

A trace log of Cluster service events and activities on a node.

The essential software component that controls all aspects of server cluster or failover cluster operation and manages the cluster configuration database.

Storage where one or more attached disks hold data used either by server applications running on the cluster or by applications for managing the cluster. Each disk on the cluster storage is owned by only one node of the cluster. The ownership of disks moves from one node to another when the disk group fails over or moves to the other node.

A command-line utility that is used as an alternative to Failover Cluster Management to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.

An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.

A group of resources in a failover cluster that are handled as a unit of failover. When the resources fail over, they fail over together in a predefined way to another node in the cluster.

An application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.

A program that runs from the command line.

A program that runs from the command line.

A computer that meets the NAP health requirements of a network. Only NAP-enabled computers can be compliant.

Settings or specific properties that enable a software item or hardware item to meet specific functional needs. In a network scenario, this term can also apply to a distributed software application or collection of hardware items.

A set of Active Directory Lightweight Directory Services (AD LDS) instances that share and replicate their configuration and schema partitions and that can also be configured to share and replicate application directory partitions.

A dialog box that appears when a user is requested to confirm whether an administrative process should be permitted to start. The user can approve the process by clicking Continue or cancel the process by clicking Cancel.

A domain namespace in which all computers use the Active Directory domain name as their primary Domain Name System (DNS) suffix.

See also: disjoint namespace   

A dialog box that appears when a user is requested to confirm whether an administrative process should be permitted to start. The user can approve the process by providing a user name and password for an administrator account, or the user can cancel the process by clicking Cancel.

A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both.

A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft