Open-AudIT Glossary
Clear, practical definitions for network discovery, IT asset management, compliance, and security terms.
A
- Discovery
Agent
A software component installed on a device to collect data and send it back to Open-AudIT.
- Discovery
Agentless
A method of collecting device data without installing any software on the target device.
- Security
Air-Gapped Network
A physically isolated network not connected to the internet, often used in secure environments like government and defence.
- Discovery
Asset Inventory
A comprehensive listing of all hardware, software, and network devices discovered and cataloged by Open-AudIT.
- Reporting
Audit Report
A compiled record of discovered assets, changes, and compliance checks generated by Open-AudIT.
B
- Configuration
Baselining
Establishing a reference point of device configurations or network state to compare future changes.
C
- Configuration
Change Detection
Scheduled comparison of device configurations over time to detect any changes in the network environment.
- Discovery
Cloud Asset
Any virtual resource hosted in a cloud environment, such as AWS EC2 or Azure VMs, and monitored by Open-AudIT.
- Configuration
CMDB
Configuration Management Database — a repository that acts as a data warehouse for IT installations, populated via Open-AudIT.
- Architecture
Collector
An instance of Open-AudIT used to gather data from a specific network segment, often in distributed or MSP environments.
- Compliance
Compliance Template
Predefined rulesets in Open-AudIT used to measure devices against regulatory or organizational standards.
- Configuration
Configuration Drift
The divergence of a device's current state from its intended, documented, or baseline configuration.
- Configuration
Configuration Management
The practice of handling device settings and policies to maintain network integrity and compliance.
- Security
Credential Management
The process of securely storing and rotating login credentials used to access network devices for auditing.
D
- Reporting
Device Uptime
The total time a device has been running without interruption, often used to assess stability and performance.
- Discovery
Discovery Schedule
A recurring task in Open-AudIT that scans for new devices and changes to existing ones on the network.
G
- Configuration
Golden Baseline
An approved device configuration state used as a reference to detect configuration drift.
I
- Compliance
ISO 27001
An international standard outlining best practices for information security management systems (ISMS).
N
- Discovery
Network Discovery
The process of automatically identifying all devices on a network, including their configurations and relationships.
R
- Security
Remediation
The process of addressing and resolving detected issues, such as security risks or misconfigurations. In Open-AudIT, this is limited to detection and reporting, not automated rollback or push configuration.
- Security
Role-Based Access Control (RBAC)
A system of assigning permissions to users based on their roles within the organization.
S
- Protocols
SNMP
Simple Network Management Protocol, used to communicate with network devices.
- Compliance
SOX Compliance
Refers to adherence to the Sarbanes-Oxley Act, requiring visibility and control over financial IT systems.
- Protocols
SSH
Secure Shell, a protocol used to securely access and audit Unix/Linux devices over a network.
- Protocols
Syslog
A standard for message logging that allows network devices to send log data to a central server.
V
- Security
Vulnerability Scan
A security process that identifies known vulnerabilities in network devices, often integrated via external tools.
26 of 26 terms