- A directory service used for user and device authentication and policy enforcement.
- A lightweight software component installed on endpoints to enable management, monitoring, and control.
- Security measure that restricts which applications can run on an endpoint.
- Tracking and managing hardware and software assets across the organization.
- Automatic resolution of detected issues or misconfigurations without human intervention.
- A standardized, approved configuration applied to endpoints to maintain compliance and security.
- A full disk encryption feature in Windows used to protect data on endpoints.
- A list of applications, websites, or IPs explicitly blocked on managed endpoints.
- A policy allowing employees to use personal devices for work, often requiring special controls.
- A centralized repository containing details of IT assets and their relationships.
- Ensuring endpoints adhere to organizational and regulatory standards (e.g., patch levels, antivirus).
- Deviation of an endpoint from its intended configuration over time.
- A Windows security feature that isolates and protects login credentials from attacks.
- Tools and policies to prevent unauthorized data transmission from endpoints.
- Management of peripheral devices (USBs, printers, etc.) connected to endpoints.
- The process of registering a device into the endpoint management system.
- The security and compliance status of an endpoint at any given time.
- A measure of whether an endpoint meets predefined security and operational standards.
- A solution providing continuous monitoring and response to advanced threats on endpoints.
- Techniques to reduce vulnerabilities in endpoints (e.g., disabling unused ports, services).
- The ability to see and analyze the health, activity, and status of all endpoints in real time.
- Managing full-disk or file-level encryption policies and keys across devices.
- Monitors changes to files to detect potential malicious activity or policy violations.
- A network security device that monitors and controls incoming and outgoing traffic.
- Updates to the embedded software controlling hardware components of a device.
- Technology to enforce policies based on a device's physical location.
- A framework for managing IT governance, risk, and compliance.
- A feature in Windows to manage user and computer settings centrally.
- A list of all physical hardware devices in an IT environment.
- Verifies that a device is in a trusted state before allowing network access.
- Protects endpoints from unauthorized changes by monitoring system activities.
- Framework for managing digital identities and controlling access to resources.
- Coordinated approach to detecting and resolving IT security incidents.
- Process of finding and listing unknown IT assets connected to the network.
- A secure system that administrators use to access and manage other systems.
- Grants temporary privileged access only when needed.
- A network authentication protocol used in Windows environments.
- Administration of cryptographic keys to ensure secure data access and transmission.
- A concept used to describe stages of a cyberattack.
- Security principle of granting the minimum access necessary for users.
- Permissions granted to users to make changes on their own machines.
- Collection, storage, and analysis of system and security logs.
- Tools and policies that detect, prevent, and remove malicious software.
- Management of mobile devices like smartphones and tablets.
- Software that collects performance and status data from endpoints.
- Controls device access to the network based on security compliance.
- Security framework developed by the National Institute of Standards and Technology.
- Devices not adhering to defined security or operational policies.
- Automated processes to safely remove users and devices from the system.
- Steps to securely add new devices into the enterprise environment.
- The process of updating operating system files and services to fix vulnerabilities.
- Routine of identifying, testing, and deploying software patches.
- Scripting language commonly used to automate Windows administrative tasks.
- An unauthorized gain in user privileges within an IT system.
- A policy that isolates infected or misbehaving endpoints.
- A fast, prebuilt solution for fixing common endpoint issues.
- Method of identifying the root cause of incidents or issues.
- Managing systems and networks from a central location.
- Access control system where roles determine access rights.
- A solution that aggregates logs and alerts for threat analysis.
- Automatic repair or configuration enforcement to restore normal functionality.
- Distribution and installation of software across managed devices.
- Reducing the attack surface by limiting functions and access.
- Data collection and reporting on endpoint performance or usage.
- Detection of malicious activities or patterns on endpoints.
- Security process requiring two methods of identity verification.
- A platform that unifies MDM, PC management, and other tools.
- Control over access to USB and removable devices.
- Analysis of user actions to detect risky behavior patterns.
- A system that delivers virtual desktops to users.
- Encrypted connection over the internet to protect data.
- A process to identify and assess security weaknesses.
- A list of approved applications or devices allowed to operate.
- Built-in Windows antivirus and endpoint protection solution.
- Automation of endpoint-related processes through rule-based flows.
- A security solution that integrates multiple threat detection tools.
- Custom rules for identifying malware using pattern matching.
- A security model that assumes no device or user is inherently trusted.
- A vulnerability exploited by attackers before it’s publicly known.
- A firewall that applies rules based on network zones.