Windows Server 2008 Glossary - U

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

Glossary - U

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

UAC

A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users.

UAC access token

An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator.

UAC user

A user account in the Users group that has a full privilege access token. The standard user is not an administrator and is not a member of any local groups that are filtered.

UI

The portion of a program with which a user interacts. Types of user interfaces include command-line interfaces, menu-driven interfaces, and graphical user interfaces.

UI Privilege Isolation

A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level.

UI privilege level

The integrity level that is stored in the access token of a process and that is used by the UI Privilege Isolation (UIPI) feature to determine if an application or process is permitted to send Windows messages to another application or process.

UIA

The accessibility model for Microsoft Windows that programmatically gathers information about an application's User Interface (UI) elements and exposes it to assistive technology products and automated test scripts.

UIAutomation

The accessibility model for Microsoft Windows that programmatically gathers information about an application's User Interface (UI) elements and exposes it to assistive technology products and automated test scripts.

UIPI

A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level.

unattend.xml

A file that automates Windows Setup. This file enables the configuration of Windows settings, the addition and removal of components, and many Windows Setup tasks, such as disk configuration.

Uniform Resource Identifier

A character string used to identify a resource (such as a file) from anywhere on the Internet by type and location. The set of Uniform Resource Identifiers includes both Uniform Resource Names (URNs) and Uniform Resource Locators (URLs).

unseal

For BitLocker Drive Encryption, the process that a Trusted Platform Module (TPM) uses to decrypt data in a sealed binary large object (BLOB) to reveal the original secret.

URI

A character string used to identify a resource (such as a file) from anywhere on the Internet by type and location. The set of Uniform Resource Identifiers includes both Uniform Resource Names (URNs) and Uniform Resource Locators (URLs).

User Account Control

A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users.

user interface

The portion of a program with which a user interacts. Types of user interfaces include command-line interfaces, menu-driven interfaces, and graphical user interfaces.

User Interface Privilege Isolation

A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level.

user interface privilege level

The integrity level that is stored in the access token of a process and that is used by the UI Privilege Isolation (UIPI) feature to determine if an application or process is permitted to send Windows messages to another application or process.