Acronym |
Meaning |
Definition or usage |
IP |
Internet Protocol |
The IP address of the computer is 192.168.1.1 |
DHCP |
Dynamic Host Configuration Protocol |
A network protocol that automatically assigns IP addresses and other configuration information to devices on a network. DHCP will assign a device an IP address when it is on the network. |
DNS |
Domain Name System |
A system that translates domain names into IP addresses. One of Google's public DNS IPv4 addresses is 8.8.8.8 |
WAP |
Wireless Access Point |
A device that allows wireless devices to connect to a wired network. Can be easily confused with a particular song but the term Wireless Access Point is commonly used in networking. |
PEAP |
Protected Extensible Authentication Protocol |
A security protocol that protects wireless and wired networks by authenticating clients |
WPA |
Wi-Fi Protected Access |
A security protocol that protects wireless networks from unauthorized access |
BGP |
Border Gateway Protocol |
A set of rules that allows the internet to exchange routing information between autonomous systems |
ARP |
Address Resolution Protocol |
A network communication protocol that translates IP addresses into MAC addresses |
MFA |
Multi-Factor Authentication |
A security feature that requires more than one form of authentication to access an account |
2FA |
Two-Factor Authentication |
A security method that requires two forms of identification to access a system or application |
OTP |
One-Time Password |
A security code that's only valid for one login attempt or transaction. Used as a second authentication factor in addition to a username and password |
TOTP |
Time based One-Time Password |
A common form of two-factor authentication (2FA) |
OAuth |
Open Authorization |
A widely adopted authorization framework that allows you to consent to an application interacting with another on your behalf without having to reveal your password |
FIDO |
Fast Identity Online |
A set of open, standardized authentication protocols intended to ultimately eliminate the use of passwords for authentication |
OS |
Operating Systems |
|
OOBE |
Out-of-the-box Experience |
The experience a user has when setting up a product for the first time |
DISM |
Deployment Image Servicing and Management Tool |
A command-line tool that allows users to service Windows images, including repairing them or modifying installation media |
SFC |
System File Checker |
Windows computer not acting right? Let me run sfc /scannow |
WMI |
Windows Management Instrumentation |
A Microsoft framework that allows users to manage and access system resources on Windows-based operating systems |
PxE |
Pre-boot execution environment |
A client-server standard that allows a computer to load an operating system (OS) over a network connection |
ADK |
Assessment and Deployment Kit |
A collection of tools and documentation that allows users to customize, assess, and deploy Windows operating systems |
MECM |
Microsoft Endpoint Configuration Manager |
A management tool that helps IT administrators manage Windows devices, servers, and mobile devices |
MEM |
Microsoft Endpoint Manager |
A management tool that helps IT administrators manage Windows devices, servers, and mobile devices |
MBAM |
Microsoft BitLocker Administration and Monitoring |
A tool that helps manage BitLocker Drive Encryption |
BDE |
BitLocker Drive Encrypting |
The volume encryption used by Microsoft Windows |
BL |
BitLocker |
A Windows security feature that encrypts a device's hard drive to protect data from unauthorized access |
FDE |
Full Disk Encryption |
A security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive |
FV |
FileVault |
A security feature on Mac computers that encrypts data to protect it from being accessed or copied |
CCM |
Client Configuration Manager |
A device that has the Configuration Manager client software installed on it |
CDN |
Content Delivery Network |
A group of servers that work together to deliver web content to users by storing it on servers that are closer to the user's location |
DMZ |
Demilitarized Zone |
A physical or logical sub-network that protects an organization's internal network from untrusted traffic |
AVD |
Azure Virtual Desktop |
A cloud-based service that provides access to virtualized desktops and applications |
PIM |
Privileged Identity Management |
A security solution that helps organizations manage and monitor access to critical resources |
MDM |
Mobile Device Management |
A security software that allows organizations to manage and secure mobile devices that connect to their networks |
DEP |
Device Enrollment Program |
A program that allows organizations to manage iOS devices, Mac computers, and Apple TV. DEP can make it easier to set up and configure devices, and to provide additional restrictions and features |
ABM |
Apple Business Manager |
A web-based portal that allows IT administrators to centrally manage Apple devices (like iPhones, iPads, Macs) within an organization, including purchasing apps in bulk, creating managed Apple IDs for employees, and deploying devices seamlessly by integrating with a Mobile Device Management (MDM) solution |
ASM |
Apple School Manager |
A web-based tool that helps IT administrators manage Apple devices and content for educational institutions |
PAM |
Privileged Access Management |
A cybersecurity strategy that protects sensitive data and critical systems |
RMM |
Remote Monitoring and Management |
A technology that allows IT professionals to remotely monitor and manage a company's IT infrastructure and devices |
ABI |
Always be imaging |
|
SLA |
Service Level Agreement |
I need to ABC to keep my SLA's down |
ABC |
Always be closing |
Refers to closing tickets. My SLA's are great cause I ABC! |
AI |
Artificial Intelligence |
|
sudo |
Superuser do or Substitute user do |
A command-line utility that allows users to run programs with elevated privileges on Unix-like operating systems, such as Linux and macOS |
AV |
Anti-Virus |
Software designed to detect and destory computer viruses |
DLP |
Data Loss Prevention |
A collection of tools and strategies that help organizations protect sensitive data |
SSH |
Secure Shell |
A network protocol that allows two computers to communicate and share data securely over an unsecured network |
RDP |
Remote Desktop Protocol |
A Microsoft-developed network communication protocol that allows users to remotely access and control other computers |
SFTP |
Secure File Transfer Protocol |
A network protocol that allows users to securely transfer, access, and manage files |
SMTP |
Simple Mail Transfer Protocol |
A set of rules that govern how emails are sent and received over the internet |
SaaS |
Software as a Service |
A cloud-based model for delivering software applications to users over the internet |
AD |
Active Directory |
|
AAD |
Azure Active Directory |
|
ADFS |
Active Directory Federation Services |
|
GPO |
Group Policy Object |
|
CA |
Conditional Access or Certificate Authority |
Conditional Access is a set of policies and configurations that control which devices and users can access assorted services and data sources. Certificate Authority is a trusted entity that verifies the digital identity of websites, individuals, or organizations by issuing digital certificates. |
DFS |
Directory File System |
DFS is a data storage and management scheme that allows users to access files from multiple networked servers. |
PS |
PowerShell |
|
CMD |
Command Prompt |
|
NIST |
National Institute of Standards and Technology |
|
DevOps |
Developer Operations |
|
BYOD |
Bring your own device |
|
FIDO |
Fast Identity Online |
|
ANC |
Active Noice Canceling |
|
RHEL |
Red Hat Enterprise Linux |
|
QA |
Quality Assurance |
|
DR |
Disaster Recovery |
|
API |
Application Programming Interface |
|
DRM |
Digital Rights Management |
|
GPS |
Global Positioning System |
|
AR |
Augmented Reality |
A technology that enhances the real world by overlaying digital information on top of the user's view |
VR |
Virtual Reality |
A computer-generated environment that simulates reality, allowing users to interact with it in a realistic way |
KB |
Knowledge Base |
A centralized repository of information, usually organized and searchable, that provides quick access to specific knowledge or answers to questions on a particular topic, often used to help customers solve problems or employees find guidance related to a product or service; essentially, it acts like an online library of information readily accessible to users |
BLE |
Bluetooth Low Energy |
A wireless technology that uses less energy than traditional Bluetooth |
AWS |
Amazon Web Services |
A cloud computing platform that offers IT infrastructure services to businesses |
MHz |
Megahertz |
Used to measure the speed of computer processing, electromagnetic (EM) frequencies, and alternating current |
GHz |
Gigahertz |
|
MB |
Megabyte |
a unit of measurement for computer memory or file size |
Mbps |
Megabits per second |
A unit of measurement for data transfer speed, like internet upload and download speeds |
GB |
Gigabyte |
|
GBps |
Gigabits per second |
|
TB |
Terabyte |
|
ELA |
Enterprise License Agreement |
A contract between a customer and a vendor that gives the customer access to the vendor's services for a set period of time at a fixed price |
EULA |
End User License Agreement |
A legal contract between a software developer and its users that outlines the rules for using the software |
HTML |
HyperText Markup Language |
code used to structure and define the content of a web page |
SA |
System Administrator or Server Administrator |
|
DP |
Distribution Point |
Distribution points are servers used to host files for distribution to computers and mobile devices |
GUID |
Globally Unique Identifier |
A 128-bit string of characters that uniquely identifies a digital entity |
IFTTT |
If this, then that |
A private commercial company that runs services that allow a user to program a response to events in the world |