16-bit program

An example of older software (legacy program) that you may be able to run on your network.

acceptable use policy

An Acceptable Use Policy (AUP) is a set of terms and conditions that a user must agree to after they log on but before they are given access to your network. You can require different groups of users to agree to one or more AUPs at different times. The user will only be allowed access to your network when they have agreed to each and every policy. When the user does not accept a policy, this fact is logged and they are denied access to your network.

access level

Manages access to the Internet by allowing or preventing the use of Web sites, IP addresses and port numbers.

accessibility options

Microsoft programs designed to help users with specific needs make full use of the computer.

allocate package

see assign packages.

assign packages

You can assign a package or product from one or more computers or locations, so that it installs in the background.

build disk

Used to build a computer on the network.

build template

Specifies the operating system settings and the disk structure to be applied to a computer, for example, the arrangement of partitions.

computer

A computer on the network that a user can use to run programs and access resources at a server. A computer might be a desktop or laptop computer, or have roaming or wireless capabilities. To manage computers, use the Computers option of the RM Management Console.

computer policy

Specific configuration settings you can apply to a computer that control the features and functions available to reflect the role and physical characteristics of the computer in the system.

control set

Grouping of users and/or computers to which an Internet access level can be applied.

CSV file

File containing information in Comma-Separated Value format (items in the file are separated by commas). A CSV file can be produced by many spreadsheets and database programs, and also by using a text editor or word processor. You can export data from and import data to your network using a CSV file. There must be at least one blank line at the end of the CSV file.

deallocate package

see unassign a package.

description

Can contain any combination of uppercase and lowercase letters, numbers and spaces.

display name

The user's name that is displayed in their Start menu, or in a list of users in the right-hand pane of the RM Management Console.

domain controller

A server on your network that is responsible for allowing host access to Windows domain resources. The domain controllers in your network are the centerpiece of your Active Directory directory service; they store user account information, authenticate users and enforce security policy for a Windows domain. The main server on your network is the Forest Root domain controller.

drive mapping

Assignment of a drive letter on a computer to access a specific shared area on a server. This ensures that all users who log on to that computer can use the same drive letter to access the same areas.

EasyLink

RM EasyLink is a Web site that is hosted on one of your RM network servers. This Web site uses Web Folders technology to enable users to access files on your network from a computer that is not managed by RM network management tools. For example, this computer could be a student’s computer (that has Internet access) at home or in another remote location.

folder name

Can be up to 256 characters (including the path to the folder). It can contain any uppercase or lowercase characters, except for the following:\" / \\ : | * ? < >. A folder name cannot start or end with a full stop.

group

See security group.

home directory

see home folder.

home folder

Folder on a server where users store their own files. By default, users see only their home folder as drive N: and their My Work folder. Users with the correct permission, such as teachers, can perform a variety of functions in the home folder, including creating subfolders and adding or deleting files.

ID

Unique identifier for the user. For example, the student's Unique Pupil Number (UPN) or a Staff ID. IDs can be used for CSV file import and export. If you use Kaleidos, you must specify a unique ID for each of your users.

inherited properties

By default, a computer inherits the same properties (for example, drive mappings or packages) as assigned to the location in which it is situated. These properties can be changed for an individual computer.

learning resource

Collection of documents, links to Web sites, and special folders such as collaborative areas, that relate to a particular area of study. Learning resources can be made available to groups of users.

legacy program

see 16-bit program or MS-DOS program.

linked list

List linked to a security group.

location

You can group computers into locations reflecting the actual physical locations of the computers in your establishment, for example, buildings and rooms. Locations are arranged in a hierarchy, with each sublocation inheriting the properties of the locations above it.

Location Chooser

When a user logs on at a computer with no fixed location (for example, a laptop), Location Chooser is displayed automatically and prompts the user to choose a location. This allows the user to access drive mappings and print to printers in their chosen location.

management right

see system role.

member server

A server that is not a domain controller, for example, a DAMMS or MIS server.

MS-DOS program

An example of older software (legacy program) that you may be able to run on your network.

name

Names can contain any combination of uppercase and lowercase letters, numbers, and spaces. We recommend that you establish a naming convention for items such as users, computers and locations to make it easier to identify and classify them.

offline build key

Used as a security measure when you build a computer that is not connected to the network, or a computer that only has a wireless connection.

option

An option provides a specific function within the RM Management Console. For example, the Users option allows you to manage your users.

package

All the information (for example, installation files and setup information) needed to install a program on a computer.

password

A user logs on by typing a username and password that identifies them on the network. A password can contain any combination of uppercase and lowercase letters, numbers and spaces.

path

The location of a folder, either on a disk on the local computer or on another computer on your network. For example, C:\\WINDOWS\\system32 or \\\\SERVER1\\RMPublic

privileged user

A user given a greater degree of access to a particular computer. A privileged user can change computer settings, add and remove hardware, software and printers, and access any software installed on the computer. The list of privileged users is a property of the computer and is managed from the Computers option of the RM Management Console.

profile

A user profile comprises the user-specific settings of a user's Windows environment. This includes desktop settings, such as wallpaper and screen savers. Many programs use the user's profile to store configuration changes that the user has made to the program.

program set

Collection of program shortcuts that can be made available to groups of users via the Start menu, organised so they are easy for users to find and start.

reallocate package

see reassign a package.

reassign a package

You can reassign a package or product to an individual computer, groups of computers, or a location, for example when the original assignment fails, or the program has been corrupted.

registry policy

Collection of settings that apply to computers and users across your network. These settings give you control over your network, allowing you to override a computer's local or a user's personal policy settings.

restore image

Used to restore a computer in a shorter time than rebuilding the computer. A new restore image should be created after all packages have been assigned to the computer and any special configuration has been completed.

RM Explorer

RM program designed, amongst other things, to help users start programs; display, copy, move, print or delete files; create or remove folders; and access specific Web pages.

security group

Security groups allow you to grant or deny permission to access features of the system for multiple members at the same time.

server

A computer on the network that provides file storage, printing and/or other resources to another computer. The main server on your network is the Forest Root domain controller.

share

Makes resources like folders and printers available to users across the network.

Shortcut Bank

A folder that provides a one-stop location for shortcuts to programs. To manage the Shortcut Bank, use the Program Sets option of the RM Management Console.

smart-list

A stored search, for example, a list of users meeting specific criteria. When you access the smart-list, the search is regenerated to provide the latest data.

software restriction policy

A collection of settings that allow or deny users the ability to run program files.

staff subject area

A work area that can contain a collection of files that can be made available to staff, usually in the same department. To manage staff subject areas, use the Shared Files option of the RM Management Console.

Start page

The Start page of the RM Management Console provides quick access to frequently-used functions. To re-display the Start page, click your establishment at the top of the left-hand pane.

system role

Collection of permissions allocated to a user to control the management tasks they can and cannot perform for the network in the RM Management Console.

tree view

The tree view of the RM Management Console is displayed in the left-hand pane. Where available, clicking a [+] sign will display lower levels of the structure of your network. For example, clicking the [+] sign alongside the Users option displays your user lists and User Servers; clicking the [+] sign alongside User Servers displays your servers; and clicking the [+] sign alongside a user server displays your user folders.

unassign a package

You can unassign a package or product from one or more computers or locations so that it will be uninstalled the next time those computers are restarted.

user

Each user has an account on the network, for example, a student or a member of staff. To manage users, use the Users option of the RM Management Console.

user policy

A set of rules applied to a user to define the user's desktop and working environment to control what they can and cannot do on the network, and the features and functions that are available to them.

user template

Associated with each user folder; it contains a common set of user properties that users added to the folder will inherit.

user type

see user policy.

username

A user logs on by typing a username (and password) that identifies them on the network. Each username must be unique and can contain any combination of uppercase and lowercase letters, and numbers.

Windows Installer package

A technology that aids the installation process by holding all the information (for example, MSI files and other setup information) in a single application package.

workstation

see computer.

workstation type

see computer policy.