Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
IT Network Glossary – Key Terms & Definitions | Open-AudIT
[go: Go Back, main page]

Open-AudIT Glossary

Clear, practical definitions for network discovery, IT asset management, compliance, and security terms.

A

  • Agent

    A software component installed on a device to collect data and send it back to Open-AudIT.

    Discovery
  • Agentless

    A method of collecting device data without installing any software on the target device.

    Discovery
  • Air-Gapped Network

    A physically isolated network not connected to the internet, often used in secure environments like government and defence.

    Security
  • Asset Inventory

    A comprehensive listing of all hardware, software, and network devices discovered and cataloged by Open-AudIT.

    Discovery
  • Audit Report

    A compiled record of discovered assets, changes, and compliance checks generated by Open-AudIT.

    Reporting

B

  • Baselining

    Establishing a reference point of device configurations or network state to compare future changes.

    Configuration

C

  • Change Detection

    Scheduled comparison of device configurations over time to detect any changes in the network environment.

    Configuration
  • Cloud Asset

    Any virtual resource hosted in a cloud environment, such as AWS EC2 or Azure VMs, and monitored by Open-AudIT.

    Discovery
  • CMDB

    Configuration Management Database — a repository that acts as a data warehouse for IT installations, populated via Open-AudIT.

    Configuration
  • Collector

    An instance of Open-AudIT used to gather data from a specific network segment, often in distributed or MSP environments.

    Architecture
  • Compliance Template

    Predefined rulesets in Open-AudIT used to measure devices against regulatory or organizational standards.

    Compliance
  • Configuration Drift

    The divergence of a device's current state from its intended, documented, or baseline configuration.

    Configuration
  • Configuration Management

    The practice of handling device settings and policies to maintain network integrity and compliance.

    Configuration
  • Credential Management

    The process of securely storing and rotating login credentials used to access network devices for auditing.

    Security

D

  • Device Uptime

    The total time a device has been running without interruption, often used to assess stability and performance.

    Reporting
  • Discovery Schedule

    A recurring task in Open-AudIT that scans for new devices and changes to existing ones on the network.

    Discovery

G

  • Golden Baseline

    An approved device configuration state used as a reference to detect configuration drift.

    Configuration

I

  • ISO 27001

    An international standard outlining best practices for information security management systems (ISMS).

    Compliance

N

  • Network Discovery

    The process of automatically identifying all devices on a network, including their configurations and relationships.

    Discovery

R

  • Remediation

    The process of addressing and resolving detected issues, such as security risks or misconfigurations. In Open-AudIT, this is limited to detection and reporting, not automated rollback or push configuration.

    Security
  • Role-Based Access Control (RBAC)

    A system of assigning permissions to users based on their roles within the organization.

    Security

S

  • SNMP

    Simple Network Management Protocol, used to communicate with network devices.

    Protocols
  • SOX Compliance

    Refers to adherence to the Sarbanes-Oxley Act, requiring visibility and control over financial IT systems.

    Compliance
  • SSH

    Secure Shell, a protocol used to securely access and audit Unix/Linux devices over a network.

    Protocols
  • Syslog

    A standard for message logging that allows network devices to send log data to a central server.

    Protocols

V

  • Vulnerability Scan

    A security process that identifies known vulnerabilities in network devices, often integrated via external tools.

    Security

26 of 26 terms