Definitions & Terms used in EPM
Below is an alphabetized list of terms that are used frequently during the Enrolling Networked Computers effort and in Endpoint Management. In addition to the definition, an explanation of what it looks like in CNS or the implications is provided.
Check back often for updates
This content is still under development and new content is being added regularly. The date this page was last updated can be seen under the page title.
Term | Definition | What does that mean? |
---|---|---|
Address, addressing a device | Done by CNS OIT in collaboration with the owner. Take actions so the device is capable of performing needed functions and is compliant with security policies. This includes collecting inventory information, making configuration changes to the device, and/or making configuration changes around the device. | Inventory identification will happen for every computer. Some details from inventory identification are used to determine compatibility of the device with EPM. Configuration changes to a computer may include enrollment in central management, adjusting administrative permissions, setting up data backups, installing OS and application updates, among other settings changes. Configuration changes around the computer may include removing it from the network, changing what network it’s connected to, or adding a hardware firewall. |
Central EPM, centralized endpoint management | EPM that has been established for use by all of IT at UT: Jamf for macOS and Apple OSs, MECM for Windows, and Orcharhino for Linux. | Security is improved and resources are more efficiently allocated as all IT groups at UT Austin use the same EPM platforms. Prior to the Endpoint Management (EPM) Centralization and Standardization Program, each CSU had to do this on their own. |
Data | Any information, facts, or statistics produced for reference or analysis. In the context of information technology, “data” refers to raw, unprocessed facts and statistics collected for reference or analysis. It can exist in various forms, such as numbers, text, images, or sounds, and is used as the basis for computations, analyses, and decision making in IT systems.
| Every file on a computer is considered data. Some examples are Excel spreadsheets, PowerPoint presentations, email and Teams messages, research posters, digital lab notebooks, photos and videos, or instrument readings. |