A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
See discretionary access control list (DACL).
A component of an application filter that monitors content, as in a check for viruses, and that can also modify content.
In application filters, a COM object that implements the IFWXDataFilter interface.
A sequence of binary digits, including data and control signals, that is transmitted and switched as a composite whole. The data, control signals, and, possibly, error control information are arranged in a specific format.
The logical name that allows a connection to an Open Database Connectivity (ODBC) data source, such as a SQL Server database.
A process used by autodial to perform on-demand outgoing connections either to an Internet service provider or to a corporate office from a branch office.
See Dynamic Host Configuration Protocol (DHCP).
An authentication method for HTTP clients, in which an encrypted digest or hash of the user’s credentials and additional data is created in a process known as hashing. This way, no other user can impersonate the original sender of the request. A hash cannot feasibly be decrypted to recover the original user name and password. Digest authentication can be used only in Windows Server 2008, Windows Server 2003, and Windows 2000 domains for users who have an account stored in Active Directory. See also Basic authentication, Integrated authentication, and Advanced Digest authentication.
A digital document that is commonly used for authentication and secure exchange of information about open networks, such as the Internet, extranets, and intranets. A certificate securely binds a public key to the entity that holds the corresponding private key. Certificates are digitally signed by the issuing certification authority and can be issued for a user, a computer, or a service. The most widely accepted format for certificates is defined by the ITU-T X.509 version 3 international standard.
A list that is controlled by the owner of an object and that specifies the access that particular users or groups can have to the object.
The caching of Internet objects in an array or chain of Forefront TMG computers, providing load balancing and fault tolerance. Client requests are sent through the array, to upstream Forefront TMG computers, or any combination thereof.
See Domain Name System (DNS).
The computer name that substitutes for a network IP address. For example, www.microsoft.com is a computer name that represents the IP address 188.8.131.52. A computer name is also called a friendly name. See also Domain Name System (DNS).
A protocol and computer-naming hierarchy used throughout the Internet to map computer IP addresses to their domain names. DNS is sometimes referred to as the BIND service.
A software component that allows a computer to send and receive information to and from a hardware device.
See data source name (DSN).
Filters that are automatically started by the Microsoft Firewall service, Web proxy, or SOCKS proxy service. This feature allows the Forefront TMG services to automatically open and close communication ports on the external interface when transmission of packets is needed.
A protocol that offers dynamic assignment of IP addresses and related information for temporarily connected network users. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of IP addresses through centralized management of address allocation.
Send comments about this topic to Microsoft
Build date: 11/30/2009
© 2008 Microsoft Corporation. All rights reserved.