<< Click to Display Table of Contents >> Raynet One > 1.1 > User Guide Glossary: Decoding Raynet One terminology |
While exploring your IT landscape with the help of Raynet One you might face some direction signs which you do not understand at first glance. In consequence, this glossary serves as a navigation system helping you to see the signs (and also know what they mean). The glossary will be extended over time.
What is it called? |
What does it mean and what is it used for in Raynet One? |
Active Directory (AD) |
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It’s included in the Windows Server operating systems as a set of processes and services. AD provides centralized authentication and authorization for users and computers within a network, allowing for the enforcement of security policies and the installation or updating of software. Active Directory uses protocols like Lightweight Directory Access Protocol (LDAP) and Kerberos, as well as DNS, to function. Azure AD is the cloud-synchronized variant of it which is able to globally connect local ADs.
Purpose: Discovery scans with Active Directory option activated Reference chapters: Start a discovery run in Active Directory
|
Average version sprawl |
“Version sprawl” refers to a situation where multiple versions of software applications or components are being used or maintained within an environment. This can lead to increased complexity and challenges in managing the software effectively. It’s similar to “software sprawl”, which occurs when the number of applications or software components within an environment rapidly grow and change, causing traditional software management methods to fail. This often happens in a distributed software architecture where pace and independent development lead to a proliferation of microservices or software versions.
Purpose: Average version sprawl is displayed in the IT Visibility Dashboard Reference chapters: IT Visibility
|
API (Application Programming Interface) |
An API (Application Programming Interface), is a set of rules or protocols that allows software applications to communicate with each other. It enables the exchange of data, features, and functionality between different software systems. API's play a crucial role in modern software development. This is because they allow developers to integrate and leverage functionalities from external services or applications rather than building those functionalities from scratch. API's are used in various contexts, such as web services, operating systems, and hardware interfaces. They are essential for creating scalable and flexible software ecosystems.
Purpose: Relevant values in the context of adding new integrations Reference chapters: Integrations
|
Automation |
The automation of inventory and discovery tasks simplifies platform routines as it is possible to flexibly schedule time frames when runs shall be triggered. There is also an Automation tab with two views (simple and expert mode) available under Devices. In a nutshell, the automation of platform tasks can fully or partially substitute manually triggered runs, depending on your requirements.
Purpose: Creating a stable inventory and discovery routine via scheduled runs Reference chapters: Devices, Schedule your discovery and inventory jobs
|
CPU |
A CPU, or Central Processing Unit, is the primary component of a computer that processes instructions. It is often referred to as the “brain” of the computer because it executes the operating system and application programs, constantly receiving input from the user or active software programs. The CPU processes data and produces output, which may be stored by an application or displayed on the screen.
Purpose: Parameter in data normalization and enrichment which is relevant for displaying hardware details Reference chapters: Devices
|
Credentials |
User credentials are a set of unique identifiers that enable a user to verify their identity in order to log in to an online account or access a network, application, or web-based platform. They are essential for maintaining security and ensuring that only authorized users can access sensitive information or perform certain actions. Depending on the digital target product, user credentials can include user names, passwords or pass keys, certificates and tokens.
Purpose: Accessing Raynet One configuring runners and starting inventory or discovery runs Reference chapters: Credentials, Add credentials
|
CVE (score and ID) |
A CVE (Common Vulnerabilities and Exposures) is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they are talking about a security flaw that has been assigned a unique CVE ID number. These IDs help IT professionals coordinate their efforts to prioritize and address vulnerabilities to make computer systems more secure. A CVE score, often referred to in the context of the Common Vulnerability Scoring System (CVSS), is a numerical indicator that reflects the severity of a given vulnerability in computer systems. The score is used to prioritize the response and resources based on the threat level of the vulnerability. The CVSS assigns severity scores on a scale from 0 to 10, with 10 being the most severe.
Purpose: Estimating the security status of your IT landscape and assets in order to prevent data damage, security leaks and technical debt Reference chapters: IT Visibility, Vulnerabilities
|
CWE name |
A CWE name refers to an entry in the Common Weakness Enumeration (CWE), which is a list of common software and hardware vulnerability types. This list categorizes security vulnerabilities and provides a standardized language for describing them. Each vulnerability in the CWE list is assigned a unique ID and description, making it easier for developers, security analysts, and IT professionals to identify, discuss, and address these weaknesses. The CWE aims to help organizations prevent and eliminate typical security vulnerabilities in their systems.
Purpose: Helping Raynet One users understand and eliminate vulnerabilities in their IT landscape by providing more detailed vulnerability information Reference chapters: Vulnerabilities, IT Visibility
|
Data consistency index (DCI) |
In the context of IT and data management, a Data Consistency Index refers to the measure of uniformity and accuracy of data across a system. Consistent data is crucial because it ensures that all users see the same data values at any given time, regardless of where the data is stored or how it is accessed. To maintain data consistency, IT systems implement various mechanisms such as locking, transaction logs, and replication protocols. These mechanisms help prevent issues like data races, where multiple operations try to modify the same data concurrently, leading to inconsistent states.
Purpose: Data normalization and standardized data display in Raynet One regarding your managed environment Reference chapters: IT Visibility
|
Data collection |
Data collection refers to the systematic approach to gathering and measuring information from various sources to get a complete and accurate picture of an area of interest. It’s a critical component of data analysis, which turns raw data into valuable insights for strategic decision-making. Generally, this field is divided into automated, first-party, second-party and third-party data collection. In a nutshell, data collection is about ensuring that all existent data is relevant, accurate, and can be trusted for analysis. In Raynet One data collection is done automatically by the platform.
Purpose: Core functionality being relevant while discovering and inventorying your managed environment to get the big picture Reference chapters: About Raynet One, Discover your IT landscape, Inventory your IT assets
|
Data enrichment |
Data enrichment is the process of enhancing existing data by incorporating additional information from various sources to provide more context, accuracy, and insights. Practically, in the course of data enrichment. data sources are combined, insights are unlocked and data quality is improved by identifying and filling information gaps. In Raynet One data enrichment is done both by the platform and via additional manual data entries.
Purpose: Core functionality of Raynet One, e.g. applied in enriched data views and in the Details view Reference chapters: Software, Hardware, Details view
|
Data normalization |
Data normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. The primary goal of data normalization is to divide large tables into smaller, more manageable pieces with minimal redundancy. The process involves applying a series of rules, or normal forms, to a database to ensure that it is structured correctly. In Raynet One, data normalization is done automatically by the platform.
Purpose: Core functionality of Raynet One, e.g. viewable in all list views and in the Details view Reference chapters: About Raynet One, Discover your IT landscape, Inventory your IT assets
|
Discovery |
During discovery, the runner collects data, compares and measures data sources. Then it automatically organizes found raw data in smaller, manageable units in order to eliminate redundancies and ensures data quality. Then, the data in the underlying database is restructured according to standardized rules and forms. In a nutshell, discovery serves to create a liable and functioning, complete and reliable data basis for inventory jobs.
Purpose: Assembling, structuring and optimizing raw data for inventory Reference chapters: Discover your IT landscape, Discovery Settings, Networks, Databases, Devices
|
Docker |
Docker is a virtual online platform and tool for building, distributing, and running Docker containers. It serves to package applications with their dependencies and environments into a container, which can then be run on any Linux server or Windows server that supports Docker. These containers are isolated from each other and the host system, but they share the same operating system kernel. All in all, Docker is popular among developers for its efficiency, portability, environment consistency, scalability and version control.
Purpose: Docker-compatible environment as a prerequisite for using Raynet One Reference chapters: OS prerequisites and requirements, Runners
|
End of Life (EoL) |
Attribute of products which were available for acquisition through the global market but are not anymore. They may still receive support through community efforts or the publishing parties.
Purpose: Marking products which have turned deprecated or are in a conflicting state. Eventually, they turn into candidates for replacement. Reference chapters: About Raynet One, Vulnerabilities
|
End of Support (EoS) |
Attribute of products which are not available for purchase and they are not supported by the publishing parties anymore. Development on the product has ceased. If there are known security vulnerabilities, they will likely remain in the product forever, not being security patched. Commonly, old products which have reached end of support are a security threat to businesses.
Purpose: Marking products which should not be used by professional businesses anymore. Reference chapters: About Raynet One, Vulnerabilities
|
Enrollment token |
An enrollment token is typically used in the context of IT and software systems for the purpose of registering or adding new devices or users to a management system. Basically, it acts as a unique identifier that allows a device or user to be associated with a specific service or network. When setting up a new device or user account, the enrollment token is entered to authenticate the enrollment process. This ensures that only authorized devices or users are added to the system.
Purpose: Authentication during Windows runner installation, for Non-Windows users: automatically included in Docker file template Reference chapters: Add a Windows runner via Runners
|
GPU |
A GPU, or Graphics Processing Unit, is a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device1. Originally, GPUs were used primarily for rendering graphics in video games, but their capabilities have expanded significantly. So, GPUs have become essential in fields that require heavy computational power and are a cornerstone of modern computing for both personal and professional use.
Purpose: Parameter in data normalization and enrichment which is relevant for displaying hardware details Reference chapters: Devices
|
Hypervisor |
A hypervisor, also known as a Virtual Machine Monitor (VMM), is software that allows multiple operating systems to run concurrently on a single physical host computer. Generally, The hypervisor creates a virtual environment that abstracts the physical resources of the host computer, such as CPU, memory, and storage, and allocates them to virtual machines (VM's). Thereby, each VM is isolated from the host system and other VM's. There are two basic types of hypervisors, "Bare Metal" and "Hosted".
Purpose: Detection and inspection of virtual environments and devices during discovery and inventory runs and in the Details view Reference chapters: Hypervisors, Devices
|
Instrument |
Generally, in an IT context, an instrument refers to the tools and techniques used to monitor, measure, and analyze the performance of a software product. This can include adding code to a program to track its behavior during execution, such as logging events, measuring operation durations, or diagnosing errors. Instrumentation is essential for understanding how software performs in real-world scenarios and can help developers optimize and debug their applications effectively.
Purpose: Scanning instruments ensuring correct data collection, normalization and enrichment during discovery and inventory, while skipped instruments are hints for errors detected during platform operations
Reference chapters: Keep track of plugins, Understand job details, Take action on your jobs in the Action center, Devices
|
Inventory |
Inventory usually follows discovery. This means that collected and restructured data serves as a basis for further transformation, enrichment and reporting. In fact, this is what the runner does after discovery and during inventory. Through complete or targeted inventory runs, it is possible to get an overview on your managed environment, but also can inspect details on all individual IT assets.
Purpose: Enabling the user to access available IT assets in a managed environment and to take a deep-dive into asset details Reference chapters: Asset Management, Inventory your IT assets, Inventory Settings
|
Inventory script
|
In IT, an inventory script is a tool used to manage and track resources in a dynamic environment. It’s often used in configuration management and automation tools. This script can enforce dynamic solutions, retrieve data from multiple sources (e.g. API, LDAP and DMDB) and create connections with dynamic inventory sources.
Purpose: Triggering and processing customized inventory jobs based on your requirements Reference chapters: Inventory Scripts, Add an inventory script
|
IP range definition |
An IP range, short for Internet Protocol range, refers to a set of consecutive IP addresses grouped together based on specific criteria. It allows for the identification and communication of devices within a certain network. Each IP address consists of four numbers separated by periods, such as 192.168.0.1. By defining IP ranges, network administrators can efficiently organize and control access to their networks, making it easier to manage devices and apply security measures. For example, an IP range could encompass all IP addresses between 192.168.0.1 and 192.168.0.255, allowing for the grouping and management of devices within that range.
Purpose: Optional function in Raynet One which simplifies the automated discovery and inventory of targeted device groups within your managed environment Reference chapters: Discover your IT landscape, Inventory your IT assets, Become a troubleshooter, Control your credentials
|
IT assets |
Generally, IT assets encompass a wide range of items, including hardware, software, databases, networks and cloud services. They contribute to an IT landscape's life cycle management, strategic value and ITAM processes. Besides, ITAM is part of IT service management (ITSM) and is often guided by frameworks such as ITIL (Information Technology Infrastructure Library) and standardized by ISO/IEC 19770.
Purpose: Ensuring that both physical and logical assets in a defined environment are managed and monitored through their entire life cycle
|
IT landscape |
An IT landscape refers to the entirety of interconnected application systems within a company. It includes all components necessary to support IT services and processes, e. g. application architecture, data and information architecture, technology and security architecture. It is an essential part of the enterprise architecture and plays a crucial role in the digitalization and automation of business processes.
Purpose: Representing the technological framework and thus changing or determining business processes
|
Managed environment |
In the context of Raynet One, a managed environment sets the framework for all operations processed and administered on the platform. Generally in IT context, a managed environment enables to securely manage a defined IT environment on a high quality level while minimizing unnecessary administration efforts.
Purpose: Detection and inspection of virtual environments and devices during discovery and inventory runs and in the Details view Reference chapters: Hypervisors, Devices
|
Oracle |
Oracle databases are powerful relational database management systems (RDBMS) that provide a robust and scalable platform for storing and managing data. They are popular for being versatile and inclusive when it comes to functionality. Oracle plugins, particularly for Oracle APEX (Application Express), enhance the functionality of Oracle databases by adding custom features or improving existing ones. All in all, Oracle databases and plugins together offer a comprehensive ecosystem for developing, deploying, and managing data-driven applications.
Purpose: Oracle databases as a target for inventory and discovery, pre-installed Oracle plugins Reference chapters: Databases, Plugins, Inventory Settings, Discovery Settings
|
Organization unit |
Normally, an organization unit (OU) serves as a logical administrative grouping container for various AD objects. These objects can include other containers, groups, users, and computer accounts. OUs are then organized into a hierarchy that reflects either the functional (business structure) or physical divisions within an organization.
Purpose: Assigning assets and jobs to different device or user groups, which might be a familiar concept for users of other Raynet products Reference chapters: Organization units, Credentials, Discover your IT landscape, Inventory your IT assets, Structure your IT landscape
|
Public Key Infrastructure (PKI) |
This is the link between cryptographical technologies with proven strong secrecy and the trust into network identities. Cryptographical certificates are created using a combination of genuine identity details (company name, machine hostname) and mathematical values (random secret numbers, difficult problems of calculation). The certificates are divided into use for either connection or signing. The Public Key Infrastructure is a hierarchy of signing certificates, each higher certificate providing trust for subsequent lower ones. Encrypted connections are deemed insecure if the associated certificate is not trusted or invalid.
Install the necessary root certificates on connecting machines to enable secure connections.
Purpose: Providing network connection security Reference chapters: OS prerequisites and requirements, Import devices from MECM, Start a discovery run in Active Directory
|
Plugin |
A plugin, sometimes called plugin, is a software extension component that enhances the capabilities of an existing application. It allows users to customize and optimize programs according to their specific needs and preferences. Generally, it is a tool that attaches to a program and provides extra features and abilities without altering the application’s core code. Plugins allow users to add different functionality to their software by enhancing performance, providing specialized tools and enhancing security and privacy.
Purpose: Automatically installed plugins supporting the platform's functionality during inventory and discovery runs and all other jobs so users save time and effort Reference chapters: Plugins , Keep track of plugins
|
Port probing
|
Port probing is a technique used to identify open ports on a networked computer or server. In general, ports are the docking points for the flow of information from a program or the internet to a device or another computer in the network and vice versa. Port numbers, ranging from 0 to 65,536, are used for consistency in programming and by internet service providers to fulfill requests. In essence, port probing is a diagnostic tool to help maintain the security and integrity of a network by identifying open ports that could potentially allow unauthorized access.
Purpose: Configuration of discovery settings in order to securely access relevant devices Reference chapters: Inventory Settings, Discovery Settings
|
RegEx definition |
A regular expression, often abbreviated as regex or regexp, is a string that describes a set of strings according to certain syntactic rules. In theoretical computer science, regular expressions are used to describe regular languages, which are the simplest class of languages in the Chomsky hierarchy and are generated by regular grammars. Regular expressions are implemented in many programming languages and are commonly used in text editors for “search and replace” functions. They enable pattern matching, where text is matched against the pattern of the regular expression to find, for example, all words that start and end with a specific letter without having to specify the intervening letters or their number. Regular expressions are formatted in a specific grammar, for example Perl or .NET (used by Raynet One).
Purpose: Optional function in Raynet One which simplifies and standardizes the automated search for data during inventory and discovery runs, provides powerful name-based filtering for extra granularity Reference chapters: Discover your IT landscape, Inventory your IT assets, Become a troubleshooter, Control your credentials
|
Runner |
Runners are mandatory instruments to discover and inventory your IT assets and landscape. They serve to find new devices in the managed environment (discovery run) and to explore data content and structures within selected devices (inventory run). In the SaaS platform setting, they help automating the collection, normalization, enrichment and display of data within your managed environment. For users of other Raynet products, they fulfill a similar function as agents do in local, isolated or device-based environments.
Purpose: Core instrument of Raynet One, executing and coordinating inventory and discovery runs Reference chapters: Runners, Add a new runner
|
Scheduled job/ task |
When creating a scheduled job (or task), you set a precise time frame for selected triggers for routine jobs executed on the Raynet One platform. This is a best practice routine because automated inventory and discovery runs make data management easier and less prone to errors. There are several ways to create scheduled jobs. Probably, users of other Raynet products are already familiar with the concept and purposes of scheduled jobs.
Purpose: Automating recurring platform tasks like inventory and discovery runs for a stable routine Reference chapters: Schedule your discovery and inventory jobs, Devices
|
Microsoft Endpoint Configuration Manager (MECM) |
Configuration Manager (configmgr, MCM), also known as Microsoft Endpoint Configuration Manager (MECM), previously known as System Center Configuration Manager (SCCM), is Microsoft's comprehensive IT network system management solution. It is used to remotely deploy operating systems or to service packages to registered systems, be it update or application. Devices are registered in hierarchies of sites. All kinds of Windows configuration options are provided to you in this program.
Raynet One is capable of discovering the devices registered inside of Microsoft Endpoint Configuration Manager.
Purpose: Maintaining complex IT networks of Windows devices Reference chapters: Self-service portal, Import devices from MECM
|
Self-service portal (SSP) |
Usually, a self-service portal is supposed to enable users to take initiative and start actions independently. It also offers them orientation and helps them navigate through a website, cloud or service platform. In the case of Raynet One, the self-service portal offers an overview on common user scenarios and leads first-time users through their first runner installation. However, you can only visit the portal once in the beginning as a new user unless there's a reset of the underlying database.
Purpose: Enabling first-time users to get an overview of common user scenarios, to learn about the functionality of Raynet One and to create their first runner more easily Reference chapters: Self-service portal, Add a Windows runner in the self-service portal
|
Session credentials |
Session credentials refer to the authentication information used to establish and manage user sessions within the Windows operating system. These credentials play a crucial role in managing user access, security, and resource interactions within the Windows environment. For example, administrators can query active user sessions using the query session command to see which users are currently logged in and their session types. Additionally, PowerShell allows running processes with specific credentials using the -Credential parameter.
Purpose: Inventory and discovery runs with individual user session credentials Reference chapters: Discover or inventory Windows assets with one-session credentials, Discover your IT landscape, Inventory your IT assets
|
Site |
In an IT context, sites are known as virtual spaces where data and information are stored and available for users. Referring to business IT landscapes, however, sites often simply stand for the geographical locations where IT assets (e.g. servers and devices) are located. Defining and managing sites thus can simplify routines and workflows within a company's IT environment.
Purpose: Simplifying data management in your managed environment by assigning jobs and devices to different business locations Reference chapters: Sites, Discover your IT landscape, Inventory your IT assets
|
SSH ports |
Basically, SSH ports are network ports used specifically for Secure Shell (SSH) connections, which provide a secure method of accessing a remote computer or server. They serve as numerical identifiers on a computer or server that are opened to accept incoming SSH traffic. Each port corresponds to a particular service or application. The standard SSH port is Port 22. For security reasons, alternative ports like Port 2222 or Port 8022 may be used to make automated attacks more difficult.
Purpose: Optional configurations in discovery settings Reference chapters: Discovery Settings
|
Staging/ Staged results |
Data staging is a pivotal step in data management where raw data undergoes transformation and preparation before being loaded into a data analytic system. So data staging bridges the gap between raw data and its final destination in a data analytic system. It ensures that data is well-prepared, reliable, and ready for analysis. There are basically two possible staging locations, internal and external staging. Finally, staged results is the data displayed after the staging process has been finished.
Purpose: Enhancing data quality and consistency through transformation Reference chapters: Discovery Settings
|
Time stamp |
A timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second1. In computer systems, timestamps are used for a variety of reasons, e.g. logging, synchronization, versioning, and security.
Purpose: Tracking inventory and discovery runs in the most precise way possible for the user to follow up, especially with failed operations Reference chapters: Take action on your jobs in the Action center, Understand job details
|
Virtual machine (VM) |
A virtual machine (VM) is a software emulation of a physical computer. Imagine a VM as a computer that exists within another computer. It has its own CPU, memory, and storage for files, and it can connect to the internet if needed. While the components that make up a physical computer are tangible, VM's are often considered virtual computers or software-defined computers that exist only as code within physical servers. Hereby, the virtual machine is isolated from the rest of the system, meaning that the software within a VM cannot interfere with the host computer’s primary operating system.
Purpose: Development, application testing, security backups. parallel use of different operating systems Reference chapters: Hardware, Hypervisors
|