Home >
Glossary
-
Action Governance displays all actions on the master that can be run.
-
Action Governance is where created actions go for approval.
-
The Action Scheduler allows predefined actions to be automatically executed whenever a certain set of conditions are met.
-
Scripts that can be assigned to sensors to create automations or run manually.
-
The application, running as a service, on the endpoint which collects telemetry and data required by SysTrack.
-
Agent branding allows for customization and the appearance of SysTrack’s Self Help app, system tray icon, desktop icon, and start menu icon to match an organization’s branding to increase user acceptance.
-
An Alarm Action fixes an issue either automatically or manually when a sensor is triggered.
-
Alarm Class is the broadest category within the Alarm Profile that will trigger an alarm.
-
An Alarm Instance is when an item is opened more than once. For example, if multiple copies of NotePad.exe are opened on a terminal server, this would be X number of instances. Each instance is designated by the Process ID (PID) of the application. Since the alarm maybe be triggered by only one of the instances, it is important to note exactly the application instance that initiated the alarm.
-
Alarm notifications are sent via email or other methods when selected sensors are triggered.
-
Annual Contract Value (ACV) is the value of a customer’s contract when averaged for every year of the contract. ACV is a metric used in Client Success.
-
Annual Recurring Revenue (ARR) is a key metric used by SaaS (Software as a Service) that have term subscription agreements, including upgrades and churn, within in a defined contract length. ARR is a metric used in Client Success.
-
An API Endpoint is a specific digital location. When an API sends a request, the endpoint is the web application or web service that is receiving a response.
-
API parameters are the variable parts of a resource. They determine the type of action you want to take on the resource.
-
The Application Connections dataset provides information about application connections in relation to inbound and outbound server connections.
-
Application Faults provide an assessment of how problems with applications may impact the servers in the community being analyzed.
-
Application Hook allows the collection of application start data required for the Boot/Logon Time tool. This setting is applied to systems via the system's assigned Deployment Tool profile configuration.
-
The Applications tool provides insight into the behavior and use of applications, which are the executable components of Software Packages.
-
Assignments tie configurations to systems via group names.
-
Asynchronous Collection Extension will run a script until the script is complete and receives an output of that script or action.
-
Automations are actions that run when a sensor is triggered.
-
A logical container used to provision related business or technical resources in Azure.
-
A reserved Azure AD service instance that an organization receives and owns once it signs up for a Microsoft Cloud service such as Azure, Microsoft Intune, or Microsoft 365. Each tenant represents an organization and is distinct and separate from other Azure AD tenants.
-
A Backlog is a list of tasks that are not scoped or planned for product delivery.
-
Baseline Health is a snapshot of the health data at a point of time.
-
The Black Box tool in Resolve is a graph that allows you to rewind to a point in time and review detailed system data.
-
The Boot/Login Time tool provides data on how long it takes a system to boot and login. Using this data can help determine if there are any specific issues that are causing slower boot times. The Application Hook setting must be disabled for this tool to gather data.
-
A Bottleneck on a processor is considered to be when the number of threads in the queue is more than two times the number of processor cores over a continuous period of time.
-
Blue Screen of Death is an error screen when there is a fatal system error or system crash.
-
Bring Your Own Device
-
Bring your own keys is an encryption key management system that allows enterprises to encrypt their data and retain control and management of their encryption keys.
-
A Child Agent is the SysTrack agent installed upon a child system that is run on a child system and provides data to the Master Agent.
-
A Child System is a system that has a SysTrack agent install that is connected to the master. Child systems can be established on most Windows, Linux, Mac, and other devices.
-
Churn Rate is the amount of revenue lost as a result of customer or employee departures.
-
The Citrix License Pools tool provides information about Citrix License Pools within the environment.
-
The Citrix Published App Children tool focuses on child applications. A child application is one that is launched from a session that was established either as a published desktop or by another published application.
-
Citrix Published Applications enumerates the applications and desktops that have been published in your Citrix XenApp environment. Perspectives include Basic, Daily Usage, and Child Applications.
-
Compute Node Kernel (CNK) is the node level operating system for the IBM Blue Gene series of supercomputers.
-
Collaborative Tools are apps that allow users to work together effectively and efficiently. These tools include Teams, Zoom, Skype, Google Forms, Web X, and others.
-
Comma Separated Value (CSV) is a text file that has a specific format which allows data to be saved in a table structured format.
-
Community Visualizer displays application faults, boot and login, computer performance, hardware, health, software packages, and storage across a community.
-
Comparative Analytics compares two or more processes, documents, data sets of other objects to provide pattern analysis, filtering and decision-tree analytics.
-
Condense is a refresh action that allows you to schedule a time to update your changes to be applied to the Visualizer.
-
Config Sync lets cluster operators and platform administrators deploy consistent configurations and policies.
-
Configuration in SysTrack is where custom views, roles, and other data arrangements are chosen.
-
SysTrack Configure provides a single web-based interface for managing the SysTrack Agent including Roles, Profiles, Configurations, Tools Access Security, Privilege Sets, and Groups. Configuration is a collection of roles; each system can only have one configuration.
-
Connections are the links between a plug or connection into a port or jack.
-
CPU or Procesessor Queue Length is the number of threads that are ready to run on the processor but cannot because of another active thread.
-
CPU (Computing Processing Utilization) Usage indicates the degree of processing that a PC's running processes require at any given moment.
-
CrowdStrike is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services.
-
Current Boot Configuarion provides the focus system's basic boot configuration information.
-
A Custom View is tailored by Lakeside to a specific customer upon request.
-
The Customer Gateway is the portal in which customers can access user guides, playbooks, knowledge based articles, and training materials.
-
Customer lifetime value (CLV) is a metric that indicates the total revenue a business can reasonably expect from a single customer account throughout the business relationship. CLV is a metric used in Client Services.
-
Customer Satisfaction Score (CSAT) is a metric that indicates how satisfied customers are with a company’s products or services.
-
Desktop as a Service
-
The Daily Impact in Resolve is a graph that provices the total number of minutes the category has impacted the system's performance over the last 30 days.
-
Dashboards are customized reports built for a customer based on their use cases.
-
Dashboard Builder is an interface where customers can build their own dashboards.
-
The Database Servers tool provides information about SQL Server host servers within the environment.
-
Degraded Items is a graph in Resolve that displays any issues that caused slower boot times.
-
The DELETE request for API removes an entire source. The server decides on how it handles the Delete request and may not actually remove the resource.
-
A Dependency in software terms references a piece of software that relies on a another piece of software or component to function. These dependencies can add to latency that may not be at the local server or system level.
-
This the percentage of devices in each health score group.
-
The Digital Employee Experience (DEX) specifically refers to employee's interactions with workplace technology. This term is used interchangeably with EUX (End-User Experience).
-
Digital Experience Cloud describes our digital experience management platform, which includes endpoint data collection, Intelligent Edge architecture, unique platform features, and a suite of solutions to help IT monitor digital experience and solve issues across the digital environment.
-
Digital Experience Management (DEM) is the the process of gathering and anyalyzing data to expand IT visibility, provide proactive IT support, plan digital transformation projects, and improve overall end-user experience.
-
The ability to recover after a disaster event that causes a loss of service availability. These events can be natural or the result of human error or hostility.
-
Disk Time is percentage of elasped time for which the selected disk drive was busy servicing read or write requests.
-
Data Loss Prevention (DLP) is a set of tools and processes used to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
-
A Dynamic Group is a set of systems resulting from a user defined SQL query; the members of the group may vary over time.
-
Employee Time Impacted counts the hours per week on average that a user’s time is impacted by IT issues.
-
An Empty Line signifies the end of the headers and the beginning of the message body.
-
End-User Experience (EUX) is the quality of users' interactions with technology.
-
End-User Experience Management (EUEM) is a term primarily used by Gartner and Forrester to refer to Digital Experience Management (DEM).
-
An Engagement is a pop-up that is automatically or manually assigned to sensors to provide interaction with users.
-
Engagement Surveys in Configure allow you to create a survey to receive feedback in real-time from users.
-
An Enterprise is the whole of a corporation’s devices, systems, and servers across multiple departments and locations.
-
Enterprise Visualizer displays the Health Score Summary, Trending Health Metrics, Top 5 Health Score Impacts, and Trending Analysis for the entirety of a corporation’s devices connected to SysTrack.
-
End user computing
-
An Event is an action that occurs as a result of the user or another source acting such as a mouse click.
-
Event Correlation is seeking what correlation may exist from events including alarms, health, potential network failures, and latency by looking at the event log message of disconnected and timed out sessions.
-
An Event Handler is a routine that is executed when an event occurs.
-
The Event Log provides an in-depth record of events related to the system, security, and application stored on a system.
-
Executive Business Review (EBR) is a strategic meeting that facilitates customer alignment on business objectives and outcomes as well as allow you to learn about customer initiatives and opportunities. EBR is an a metric used in Client Services.
-
Executive Insights show an overview of the Digital Experience across an enterprise.
-
The Factory View is the version of the product where no special enablement or customizations are necessary.
-
A Fault is a malfunction that occurs in hardware or software.
-
A Feature is an enhancement to the product.
-
Features and Roles provide information about the features and roles configured on servers.
-
Federal Risk and Authorization Management Program (FedRamp) standardizes security assessment and authorization for cloud products and services used by U.S. federal agencies. The goal is to make sure federal data is consistently protected at a high level in the cloud,
-
A File Type is an executable or support file. Use support files if you are trying to build a Collection Survey.
-
The Focus Bar allows you to highlight a portion of a graph to drill down for more information. For instance, use the focus bar to isolate one day out of a trend of 30 days on a trend graph.
-
Any part of the software creation process that prevents the programmer from building their code.
-
FSLogix enhances and enables user profiles in Windows remote computing environments. FSLogix may also be used to create more portable computing sessions when using physical devices.
-
A Gateway is a device on a network which sends local network traffic to other networks.
-
Graphics Device Interface (GDI) is the part of Windows responsible for representing graphical objects and transmitting them to output devices such as monitors or printers.
-
GDPR stands for General Data Protection Regulation which is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in and outside the European Union.
-
GET is the most common command for an API. An API retrieves information from an outside source.
-
Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.
-
Granular data is detailed data, or the lowest level that data can be in a target set.
-
Graphing allows a visual representation of system analysis over a period of time.
-
A Group is a collection of systems that help to filter data.
-
Group Health is a table that shows Health data for each of the groups in an enterprise.
-
Graphics User Interface (GUI) is a human-computer interface that uses windows, icons, and menus and can be manipulated by a mouse.
-
Hardware is an inventory of a system's hardware including mouse, monitor, and other items.
-
The Hardware Diagram shows the system's connected hardware in a diagram-style format grouped by categories such as memory, disk, and networks.
-
Headers are used in HTTP to pass additional information using a name/value pair. The request may have many rows, such as host, date/time, connection information, content type information, content size, and cache settings.
-
The Health Score is a calculation of impacts that affect the end-user experience in the digital workplace.
-
The Health Tool helps you determine which categories impacting the system's health could be contributing to a slow system response time.
-
Hidden sensors are sensors that have been disabled or hidden to filter data based on preferences to remove noise or irrelevance.
-
Hierarchy in Dashboard Builder is a list information where as you drill down to increasing granularity of data.
-
The use of redundant components to prevent service disruption in the event of a loss of one of the components.
-
Individual System Correlation is when if the network issues are causing event log disconnect, network, and/or latency alarms they will be visible around the same time period as the Event Log Alarms.
-
Installation is the process of physically connecting a component to a computer such as RAM or peripherals.
-
Integration is the process of bringing together various types of software sub-systems so that they create a unified single system. This is used for migrating legacy systems to a new database system, including cloud-based data storage.
-
Intelligent Edge refers to the primary part of the Digital Experience Cloud architecture where data is securely gathered from endpoints and analyzed. Smart sensors result in high-frequency and fidelity data, private and anonymous data, real-time and historical data, with low network impact.
-
The Intelligence Package leverages Lakeside’s embedded Artificial Intelligence and Machine Learning, with our patented data collection engine, to accelerate Root Cause Analysis and reduce Mean Time to Repair. This extends our leadership in the evolution from Proactive IT Ops to Predictive IT Ops, and ultimately Automonous IT Ops.
-
Internet Printing Protocol (IPP) allows programs to send one or more print jobs to the printer or print server and perform administration such as querying the status of a printer, obtaining status of print jobs, or cancelling individual print jobs.
-
The Internet Protocol layer is in the TCP/IP protocol stack is the first layer that introduces the virtual network abstraction that is the basic principle of the Internet model.
-
Internet Protocol (IP) network is a group of computers connected via their unique internet protocol (IP) addresses.
-
An Inventory is a list of available systems in an enterprise.
-
Investigate Health is the analysis of the health score of devices grouped from Poor to Good.
-
Input and output operations per second.
-
Internet Service Provider
-
IT Service Management
-
A processor in a computer running Windows has two different modes: user mode and kernel mode. The processor switches between the two modes depending on what type of code is running on the processor.
-
Kit Builder allows users to gain access to a large library of officially supported Dashboards available for immediate import into your tenant.
-
Key Performance Indicator (KPI) is a quantifiable measure of performance over time for a specific objective.
-
Level 1 is the first tier of support and has the least experience, lowest understanding, and limited access to company information. Primary tasks for L1 include: collecting customer requests and data, respond to phone calls, emails, or social media messages, basic troubleshooting, and creating tickets for Level 2 support.
-
Level 2 takes queries from Level 1. Level 2 deals with in-depth troubleshooting and back end analysis of specific ticket issues. They provide an in depth explanation to the solution. If L2 cannot solve a problem, this may indicate a more systemic problem that will have to be escalated to L3 support.
-
L3 are SMEs (Subject Matter Experts). These experts are engineers, data architects, creators, and developers who have the highest access to company information.
-
Latency is the time it takes data to transfer from one point on a network to another.
-
Time delay of data to travel between the sender and the receiver.
-
Measure Improvement is assessed at the end of the period to review the baseline data against the current state.
-
Metholodolgy are the conditions that need to be met for a sensor to be true. For example: The sensor triggers when the percentable of available space for any drive is less than the variable for Disk_PercentAvailableSpace_Low.
-
A Module is a discrete piece of code which can be independently created and maintained in different systems.
-
Monthly Recurring Revenue (MRR) is the income that a company expects to receive in payments on a monthly basis. MRR is a metric used in Client Success.
-
On-Prem or On premises is when the client themselves are the master database for SysTrack.
-
A Patch is a partial change or update. For API requests, PUT and POST sends the entire resource every time, PATCH only sends updates.
-
Product Development Life Cycle
-
Performance Disk Alarm provides the relative health and performance of the disk.
-
Personas are fictional profiles that represent groups of similar people in a target audience.
-
Personas are a target a group of prototypical users that can include job titles or primary tasks. In Visualizer, you can see how different metrics and KPIs (Key Performance Indicator) affect different personas.
-
Physical systems include hardware and physical devices, such as desktops and laptops, that do not depend on a virtual machine to function.
-
POST is an API command that sends information to the requesting resource.
-
Power Manager in SysTrack allows organizations to substantially reduce their energy costs and eliminate negative environmental impacts through the agent’s regular monitoring of active vs. idle states of a system and putting the system into hibernate or sleep modes during those idle time periods.
-
Privacy in Configure allows you to remove data for a specific user when requested according to GDPR (General Data Protection Regulations) regulations.
-
The Process ID (PID) is a number used by Microsoft Windows to temporarily uniquely identify a process.
-
Process Views condense the view and extract data from an agent to create a custom view.
-
Productivity Impact is the amount of time in a given week during which the average employee is affected by system issues and unable to be fully productive.
-
PUT is an API command that behaves similarly to POST, it sends information to the resource. However, PUT eliminates duplicate POST requests.
-
Range Finder is used in Dashboard Builder that uses a slider to determine the minimum and maximum values from a connected data block. These values can be set manually by the user.
-
Read Configurations forces the child systems to contact the master system and get their latest configuration information. Normally, the child systems update every 24 hours.
-
The Refresh Action allows you to schedule a time to update your changes to be applied to the Visualizer.
-
A Regional Master exists only in on-prem environments. Agents are divided into different masters to 10,000 thresholds. These regional masters report to a global master.
-
Remediate Health are the issues found that need to be improved or addressed.
-
The Request Line from the client specifies the HTTP verb, the request URL and the HTTP version.
-
Representational State Transfer Application Interface. This refers to the architectural style for building web services that interact via an HTTP Protocol.
-
Return of Value (ROV) is a metric that assesses the impact of degragred user experience.
-
Risk provides views to assist in identifying areas of potential security risk including details of application configurations and inventory, hardware, system configurations, and installed packages.
-
Risk Visualizer ranks risks by their severity and impact across an enterprise.
-
A Role has all the various performance counters, services, events, alarms, and other items that would be needed on a particular system. A configuration is a collection of roles.
-
Root Cause Analysis (RCA) is a systematic process for figuring out how, where, and why an issue appeared.
-
Really Simple Syndication (RSS) are files that are easily read by a computer called XML files that automatically update information. An RSS feed takes the headlines, summaries, and update notices, and then links back to articles on your favorite website’s page.
-
Run Inventory forces the child system to run a software and hardware inventory. Selecting this option causes and inventory to run outside of schedule.
-
Software Development Life Cycle
-
A Sensor is an intelligent edge sensor that triggers on the endpoint to provide information.
-
The Sensor Builder is an internal interface where Lakeside builds sensors to detect certain use cases and specific IT issues happening in an environment or machine.
-
Sensor Variables are thresholds or other criteria applied to sensors.
-
The Server Dashboard gives the overall status of the service areas in your managed network.
-
Server Performance provides insight into how servers are used and how much of their available computing resources are effectively used in delivering applications to users.
-
Sessions provides information about published application sessions within the environment. Perspectives include Basic and Session Summary.
-
Simple Network Management Protocol is where different devices on a network share information with each other.
-
Software Packages provides insight into the behavior and use of software packages which are collections of applications. In contrast to Applications, software packages are generally purchasable and installable bundles that consume resources when the contained applications are accessed.
-
The Software tool in Resolve provides a history of software package changes, installations, and usage for the selcted time period.
-
Single Sign On (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.
-
A short name for the tenant that does not contain numbers and does not have spaces.
-
SQL Server Reporting Services (SSRS) provide a set of on-premises tools and servers that create, deploy, and manage paginated reports.
-
Standards Operating Procedure (SOP) is a set of written instructions that describe the step-by-step process that must be taken to properly perform a routine process.
-
A Static Group is a group of implicitly specified systems.
-
A Support File is in an executable file that executes a solution to a use case on a system.
-
Survey Builder allows you to build end user surveys that can be integrated into SysTrack.
-
Synchronous Collection Extension syncs and times out after a specific amount of time.
-
Determines if the machine is secure boot capable.
-
System Health Distribution is a graph that ranks employees by the Health Score of their systems.
-
System List identifies the users that have used the systems and the last time each were used.
-
System Usage from System List identifies the users that have used the systems and the last time each were used.
-
Lakeside’s flagship product, SysTrack, is an end point monitoring platform that leverages our embedded AI engine and rich data set to enable IT teams to proactively resolve complex issues.
-
The Task Scheduler allows predefined actions to be automatically executed whenever a certain set of conditions is met.
-
TCP (Transmission Control Protocol) Stack provides a full reliable connection orineted service to the applicaiton layer as indicated in the Internet Protocol Stack Figure.
-
Telemetry is the automatic measurement and wireless transmission of data from remote sources using sensors.
-
A Tenant functions similarly to a Master Agent but for Cloud. Instead of needing a branching system to house large child agent data sets, it can handle a larger load. Tenant data is maintained and upgraded by Lakeside. The Tenant replaces the need for masters because they can have hundreds of thousands of children versus just 1000 children.
-
A Thick Application or file performs independently of server or client-server architecture.
-
The Threshold for a sensor is a metric that must be met for sensor to trigger. For Example: If a sensor is looking at available disk space, the threshold is the amount of available disk space remaining when the sensor switches from false to true.
-
The Time Window in Resolve allows you to select a time frame to display by selecting the entire time frame, specific start and end dates, and the last 30 days.
-
The Total Impact graph in Resolve breaks out the categories that have impacted the system's performance.
-
Trusted platform module
-
A Tracibility Matrix is a document, usually in the form of a table, used ot assist in determining the completeness of a relationship by correlating any two baselined documents using a many-to-many relationship comparison.
-
Trending Health Metrics show the latest health score data that includes user activity, terminal services, and servers over time.
-
Unified Communications and Collaboration (UC&C) is not a single tool or product, but a collection of solutions, which organizations implement to ensure that nearly all their technology works together, smoothly and securely, for near real-time collaboration
-
The Unified Endpoint Management (UEM) tab provides a way for SysTrack to integrate with a Mobile Device Management (MDM) solution. The MDM integration is used for Android/iOS device discovery and collection of limited inventory data. Configuring the MDM integration is required before deploying or installing the SysTrack app on mobile devices to avoid duplicate systems.
-
An Update is a process that runs while a user is active on the local machine. The impact of the update is registered in minutes.
-
Usage is a measurement of actual utilization of software at any given time.
-
A Use Case iis a written description of how users will perform tasks on your website or software.
-
Virtual Desktop Infrastructure (VDI) is a technology that refers to the use of virtual machinces to provide and manage virtual desktops. VDI hosts desktop environments on a centralized server.
-
A View is a custom query run on an endpoint database. You can use views to select data to be collected and uploaded to the Master system when endpoints condense.
-
Virtual Infastructure provides information about how virtual hosts are performing. Key data points are provided to analyze host usage and understand which hosts are over/under utilized within an enterprise.
-
Virtual Machines are tools where a physical machine, like a personal laptop, can access the programs, scripts, and software to an interface for a server.
-
Virtual Master Panel (VMP) is an application software that runs on a Windows PC and provides integrated management functions for broadcast cameras over an IP network.
-
A Web Application is any application that uses a browser.
-
Web History provides a history of favorite websites and website visit history for the focused user.
-
Web Performance shows the websites visited and the average page load time for those sites by day and time.
-
Web Servers provide information about the web server host systems within the environment.
-
A Workaround is any kind of fix that is not permanent.
A
B
C
D
E
F
G
H
I
K
L
M
O
P
R
S
T
U
V
W
On This Page