Glossary of terms used in Nuix Workstation

The following table lists the most common terms and acronyms used in Nuix Workstation:

Term

Definition

AIP

Azure Information Protection

Amazon Simple Storage Service (Amazon S3)

Amazon S3 - a storage service for the internet. 

ancestor

An item located one or more levels above the item that comprises its descendant. Also see Parent, and Child.

API

Application Programming Interface - for example a REST API.

artifact

Save in case notes.

audited size

The size of an item, used to bill processing size in a per-gigabyte licensing scheme.

autoclassification / automatic classifier

A method of supplying training items to Nuix for it to intelligently learn their characteristics, and then use that information to automatically classify or categorize other items.

Automatic Classification

Also called Technology-Assisted Review or Machine Learning is a technology largely driven by eDiscovery that is built on Predictive Coding.
‎Also see ML (Machine Learning) in Nuix SaaS Terms.

batch

Jobs batched together for review by investigators, where each job can have specific tags and words to highlight, and associated items. Also see tagging.

batch load

The set of items loaded or reloaded in a single load operation.

 

 

bulk evidence

Refers to uploading multiple pieces of evidence to multiple instances of Nuix Workstation from a single CSV file.

 

 

CaaP

Conversation as a Platform

 

 

camel-case code

Code in Worker Scrips with syntax:  "camelCase"  not  "snake_case". Preferred. Also see snake-case code.

 

 

carving

Recovering deleted files from sources such as disk images, using known header and footer signatures

 

 

carved items

Areas on a file system which previously held the content of files in the file system. These files were deleted along with the metadata which would allow deleted file recovery to link back to the data.
‎Also see file systems.

 

 

case

A collection of loaded data comprising multiple evidence stores, a database and various other files holding information about the case itself. Cases in Nuix Automation can be of four types:
‎• Simple or Compound cases (these are Lucene or Derby-based)
‎• Elastic or Compound Elastic cases (for which you must define a number of extra settings)

case subset

A copy of items from a case to create a new case with those items.

child

An item located immediately below, or inside, the item that comprises its parent.

CLI

Command Line Interface

 

 

cluster

A collection of items related by their email header information or common text shingles.

 

 

cluster run

A calculation of clusters using a particular combination of email threading or near-duplicates at a fixed resemblance threshold.

 

 

comment

A text note which can be attached to any item.

 

 

Compound Case

A case usually containing simple cases, rather than containing the loaded data itself. Opposite of simple case. Also see case.

 

 

container

An item holding items. For instance, a zip file. A Word document can also contain items inside it, but it is not a container because it has content of its own.

 

 

context

A Global Option to configure the Context graph and Workbench limits; and customize analysis links between items and the display text for vertices.

 

 

CSP

Cloud Service Provider

 

 

custodian

The person who is the owner of an item. Typically, this is the person whose mailbox or computer the item was originally retrieved from.

 

 

custom metadata

Metadata defined by the user of the application.

 

 

custom metadata template

A template or specification file containing several custom metadata fields that can be applied to items in a single action. Additionally, the template can enforce some data entry restrictions to the fields defined in it.

 

 

deduplication

The act of identifying the originals and duplicates for a set of items.

 

 

De-NISTing

The elimination of system files or other application files with known signatures and little or no value to an investigation.

 

 

descendant

An item located one or more levels below the item that comprises its ancestor. Also see child.

 

 

diagnostics

A dialog which helps the user identify issues with missing dependencies and look at other (usually-hidden) properties of the running application.

 

 

digest

A fixed-length data sequence (usually represented as hexadecimal digits) created from the contents of an item, used to identify duplicate items. Examples of digest algorithms include MD5 and SHA-256.

 

 

digest list

A collection of digests in a form which can be reused to perform searches.

 

 

Also see NSRL Digest Lists.

 

 

DLL

Dynamic Link Library

 

 

document

(AWS term - do we ant to use this? do we have another?)
‎An item that can be returned as a search result. Each document has a collection of fields that contain the data that can be searched or returned. The value of a field can be either a string or a number. Each document must have a unique ID and at least one field.

 

 

duplicate

An item with the same content as another item, determined using a digest.

duplicates

The collection of items comprising an original and its duplicates.

 

 

ECA/EDA

Early Case Assessment/Early Data Assessment. terminology applied to legal investigation of evidence.

 

 

ECC

Nuix Enterprise Collection Center

 

 

EDB

Exchange Database - a mailbox type, being exchange database files that store in-process and non-SMTP messages as .edb files.

 

 

EDRM

Electronic Discovery Reference Model - allows exports in legal XML formats.

 

 

EGG file

A compressed archive file containing one or more files compressed by ALZip.

 

 

Elastic

(AWS term - is this the same company we use for Elastic cases??)
‎A company that provides open-source solutions—including OpenSearch, Logstash, Kibana, and Beats—that are designed to take data from any source and search, analyze, and visualize it in real time.

 

 

Elastic case

Cases using the Elastic Security app open and track security issues directly. All cases list the original reporter and all users who contribute to a case (participants). Comments support Markdown syntax and allow linking to saved Timelines. An Elastic backed case adds the benefit of searching while indexing is in progress, thus providing a near real-time search capability.
‎Also see case and Elasticsearch.

Elasticsearch

An open-source search engine based on Apache Lucene that Nuix Workstation uses for log analytics, full-text search, and operational intelligence use cases. It enables Nuix Workstation users to store, search, and analyze large volumes of data.
OR A search engine based on the Lucene library. It provides a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents.
‎Also see Elastic case.

email protocol

See IMAP, MAPI, POP, and SMTP.

email storage system

See EDB, PST, and OST.

email thread

A series of mail discussions where people replied to an initial mail and then those emails were replied to in turn. The entire tree of the initial mail and all its replies form a single thread.

 

 

EML

A file extension for an email message saved to a file in the MIME RFC 822 standard format by Microsoft Outlook Express as well as some other email programs. EML files can contain plain ASCII text for the headers and the main message body as well as hyperlinks and attachments.

 

 

evidence

Another word for source data.

 

 

evidence container

An item at the highest level of the item hierarchy which acts as a kind of "virtual" folder for grouping related items together.

 

 

evidence repository

A folder that can contain many evidence containers, all auto-discoverable by Nuix using a single action. This differs from regular evidence which must be individually added to the case. Different custodians can optionally be different parts of the repository.

 

 

evidence store

A database and text index holding some quantity of data for a case.

 

 

exact query

A query which matches the characters in the text exactly. Exact queries apply tokenization to break the text up into individual characters, rather than words.

 

 

exclusion

A special label attached to items which acts similarly to a tag, but also hides the item from search results by default.

 

 

export

The act of processing case data to copy information to a destination outside the case, typically files.

 

 

family

A collection of items comprising a top-level item and its descendants. Families are often treated as if they were a single unit of information.

 

 

fast review

A feature whereby review of a large number of items can be automatically subdivided into review jobs to be performed by multiple users. Also see batch.

 

 

FAT file system

File Allocation Table - a simple file system originally designed for small disks and simple folder structures.
‎Also see file systems.

 

 

FEDRAMP

The Federal Risk and Management Program - a cyber security RM program for the purchase and use of cloud products and services used by US federal agencies. CSPs must have FedRamp approval to work federal agencies.

file systems

FAT, HFS, MFS or NTFS file systems.

 

 

See these entries for more details.

 

 

FIPS

Federal Information Processing Standards - a US standard to ensure requirements are met for computer security and interoperability.
‎Nuix Workstation can be installed in FIPS mode or Non-FIPS mode (default).

 

 

forensic image formats

E01, L01, DD - taken directly from NTFS, FAT32, EXT2, and EXT3 volumes.

FQDN

Fully Qualified Domain Name

 

 

fuzzy hashing

A method using the SSdeep program to generate a hash value of a file. This hash value can then be used to search and identify similar files to the original hashed file, producing a percentage of similarity. Typically, investigators process their case evidence generating an MD5 hash of each item.

 

 

fuzzy hash list

A list of potentially incriminating documents that may not be located using traditional hashing methods.

 

 

fuzzy search

(AWS term) A simple search query that uses approximate string matching (fuzzy matching) to correct for typographical errors and misspellings.

 

 

GA

General Availability (meaning for general release to clients)

 

 

GID

?

 

 

GDPR

General Data Protection Regulation (a European Union regulation) that NDF helps implement.

 

 

GUID

Globally Unique Identifier - a stable identifier allocated to items which (for all practical intents) is unique for all items across all cases anywhere in the world.

 

 

HWP or HWPX file
‎(was Hancom GMD file)

A mobile evidence file format providing support for over 15,000 mobile phones.

 

 

HDMI

High-Definition Multimedia Interface

 

 

HFS

Hierarchical File System - a proprietary file system developed by Apple Inc. for computer systems running Mac OS. Designed for use on floppy and hard disks, it is also used in read-only media such as CD-ROMs. HFS is also referred to as Mac OS Standard, while its successor, HFS Plus, is also called Mac OS Extended.
‎Also see file systems.

 

 

HMAC

Hash-based Message Authentication Code – used for all communication between installed services (for example, in Nuix Automation).

(AWS term): A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. You can use it to verify both the data integrity and the authenticity of a message at the same time. AWS calculates the HMAC using a standard, cryptographic hash algorithm, such as SHA-256.

 

 

IaaS

Infrastructure as a Service

 

 

IDE

??

 

 

imaging

Production of a material item into a paper-like form such as PDF. Sometimes also referred to as ‘printing’.

 

 

imaging profile

Defines granular rules for imaging content when creating, populating stores of, or exporting images. This includes rendering options, and the use of slip-sheet templates.

 

 

IMAP

Internet Message Access Protocol - a protocol to synch and read emails.

 

 

IMF

Internet Message Format - the basic format of an email message.

 

 

immaterial item

An item which itself contains no visible information, or the information it contains is already visible when imaging its parent. Examples include embedded images, folders on a filesystem or archive files. Opposite of a material item.

 

 

ingestion

The process of loading data.
‎Also see batch load.

 

 

IOPS

Input/Output Operations per Second

 

 

ISP

Internet Service Provider

 

 

ISMS

Information Security Management System – a set of interrelated or interacting elements in an organization to establish policies, objectives and processes to achieve security of information.

 

 

item

A single document, email, folder, etc. as represented in a case.

 

 

item ID

A stable identifier allocated to items which is unique for all items in the current simple case. Item IDs in a compound case are also unique in that case, but the item ID for an item is different depending on which case it is viewed through.

 

 

item set

A collection of items which the user has grouped together. Item sets can be deduplicated up-front.

 

 

Kafka

An open-source software platform for streaming real-time data feeds. 

 

 

launching

In NWS, setting up email messages to open in the Native tab (in their native application?).

 

 

legal export

An export of items that may contain several types of artifacts for each item and a load file. The artifacts are different views of each item such as PDFs, TIFF images, native files or text, which correspond to the different tabs in the item’s preview. The load file is an index of all items and artifacts produced. It is generated in different formats corresponding to what the target third party review tool is able to read. WHY NOT WITH NEXT ENTRY?

 

 

load file

Used by litigation support software, a file used to indicate the data and metadata to load into a database, or  to link images, with commands to carry out certain functions with the data found in them.
‎Produced by Autonomy, Concordance, or EDRM XML 1.2.

 

 

loading

The act of processing data from source data into a case. Sometimes called ingestion.

Logstash

A free open source tool for collecting and parsing log files. It uses a simple workflow and can parse any log files the investigator needs to analyze using a range of filters. Using the output file from Logstash, Nuix Workstation can ingest the log entries and apply context to the results that can assist investigators in the analysis of the log entries, using a forensic tool. 

 

 

loose file

A file which is present directly on the filesystem, as opposed to being inside an archive or attached to an email. Also see physical file, which might seem similar.

 

 

LSV

Legal Services Vendor

 

 

LUN

Logical Unit Number

 

 

mailbox types

PST, OST, and EDB.
‎See these entries for more details.

 

 

markup set

A collection of markups to PDF documents which users have made as part of redaction.

MAPI

Message Application Program Interface – a Microsoft proprietary API that allows programs to become email-aware. While designed to be independent of the protocol, it is usually used to communicate with Microsoft Exchange Server.

 

 

material item

An item which contains visible information, where that information is not already included when imaging its parent. Examples would be a document attached to an email, or files inside an archive. Opposite of immaterial item.

 

 

MBOX

A file storing personal information used in B12.

 

 

MD5

A message-digest algorithm that is a cryptographically broken but still a widely used hash function producing a 128-bit hash value. 

 

 

metadata

Data about data, such as filesystem timestamps or author information.

 

 

Metadata Export Profile

Defines how to export metadata to an external database while the processing occurs. 

 

 

Metadata Import Profile

 Defines how to import metadata into a case where existing items are matched by a defined parameter such as item GUID. 

 

 

MFC

Microsoft Foundation Classes

 

 

MFT

Master File Table - a file system comprising a database that stores every file’s information including file name, creation date, access permissions, data content and size on an NTFS volume. A file may have one or more MFT records.
‎Also see file systems.

 

 

MIME

Multipurpose Internet Mail Extensions - an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.
‎Message bodies may consist of multiple parts, and header information may be specified in non-ASCII character sets.
‎Email messages with MIME formatting are typically transmitted with standard protocols, such as the SMTP. See SMTP.

MIME types

The file types of evidence Nuix Workstation processes, which fall under these categories:
‎•  Email   • Containers   • Databases   • Logs 
‎•  System Files  • Contacts    • Chat Conversations  • Chat Messages  • Multimedia
‎ Documents   • Other Documents  • Presentations  • Spreadsheets
‎Calendar  • Drawings  • Images  • No Data  •  Unrecognized
‎In case content, these are automatically detected using Nuix Data API.
‎The Nuix Supported File Types document lists all current file types for each category.

MIME Type Settings

A  tab enabling you to control types of evidence items processed by Nuix Workstation.

MSAB

A partner company of Nuix producing tools, products and services in mobile forensics (extraction, analysis and system management).

 

 

MSG

A file format used by Microsoft Outlook and Exchange to store email messages, contact, appointment, or other tasks. Such messages may contain one or more email fields, with the sender, recipient, subject, date, and message body, or contact information, appointment particulars, and one or more task specifications.

 

 

named entity

A run of text identified as belonging to a predefined category, such as an organization, monetary value or credit card number. These are configured using regular expressions.

 

 

Named entities are used in profiles to search on items, or to extract them from text, properties and communications.

 

 

Named Entity Profile

Defines the preferred entity or entities to be used for consistent processing across cases. This requires the NDF (Nuix Data Finder) add-on.

 

 

native file

Related to exporting, this strictly is the original file in the original format in which it was created, but as Nuix converts some formats on export, we mean "files that require a viewer that isn't just an image viewer or a PDF viewer".

 

 

 

 

near-duplicates

Items A and B are said to be near-duplicates of one another if their resemblance measure exceeds a given resemblance threshold.

 

 

 

 

NLP

Natural Language Processing - software that helps computer systems better understand text and spoken words at speed and scale.

 

 

 

 

Nonresponsive tag

DEFINE. See tag, and Responsive tag.

 

 

 

 

NRT

Nuix Report Template - these enable the generation of reports by defining how a report is be processed, using the scripting API.

 

 

 

 

NSF

A database file format used by Lotus Notes, now known as HCL Notes. Can be converted to Outlook.

 

 

 

 

NSRL Digest Lists

National Software Reference Library (NSRL) Digest Lists (Hash Sets).
‎You can directly import them into Nuix Workstation.
‎See digest list. 

 

 

 

 

NTFS

New Technology File System - the default journaling file system of Microsoft’s Windows NT family offering reliably advanced data structures and disk space use, and a security system based on access control lists. It is also supported in Linux and BSD.
‎Also see file systems.

 

 

NTLM

NT (New Technology) LAN Manager - a suite of Microsoft security protocols providing authentication, integrity, and confidentiality to users in a Windows network.

Nuix Connector

A plug-in that can pull into NWS any MS O365 application file 

 

 

 

 

numbering

A number allocated to an item at the time of creating a production set or exporting the items. Can also be the process of adding these numberings.

 

 

 

 

OCR

Optical Character Recognition, used to perform refined recognition of characters in PDFs. Requires installation of ABBYY.

 

 

 

 

OCR Profile

Defines how document files are OCR'd during ingestion and processing. 

 

 

 

 

OEM

Original Equipment Manufacturer - producing equipment marketed by another manufacturer, or the maker of a system that includes components made by another company.

 

 

 

 

original

In the context of deduplication, an item which is not a duplicate. The original item is chosen based on some criteria chosen by the user.

 

 

 

 

OST

Outlook STore - - a mailbox type, being an encrypted Offline Outlook Data file (.ost) created when you set up an account in Outlook. It cannot be opened directly in an Outlook profile or account.

 

 

 

 

P12

A file type (.p12) for a PKCS#12 based private key certificate which requires a password.

 

 

 

 

parent

An item located immediately above, or outside, the item which makes its child.

 

 

 

 

Passware

Integrated with Nuix Workstation has to decrypt encrypted disk images and containers using user names and passwords provided by users in a wordlist. It enables decryption and filtering of forensic images before processing data using PGP/Symantec and McAfee Drive. See PGP.

 

 

 

 

PFX

A file type (.pfx)for a PKCS#12 based private key certificate which requires a password.

 

 

 

 

PGP

Pretty Good Privacy -  an encryption program providing cryptographic privacy and authentication for data communication. Used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications.

 

 

 

 

physical file

A file which the user has directly added as evidence to process. Distinct from a loose file because a file inside a disk image would be a loose file, yet the disk image itself would be the physical file.

 

 

 

 

PKF

Passware Kit Forensics - with Passware license allows decryption of files, drives and disk images in NWS.

 

 

 

 

poisoned

A property of an item which has problems which caused errors so severe that processing the item caused the worker to terminate unexpectedly multiple times.

 

 

 

 

POP, POP3

Post Office Protocol – a protocol used to read emails.

 

 

 

 

printed image

An exported file in PDF format which looks the same as what you would get if you printed an item.

 

 

 

 

processing

The action of processing data, generally to multiple items.
‎Covers loading, exporting and similar long-running operations.
‎There are Processing Settings to generate printed images, export metadata during ingestion, and perform OCR during ingestion.

 

 

 

 

Processing Profile 

Defines how items are processed when added into Nuix Workstation or Nuix Automation.

 

 

Product profile

Contains the licenses associated with a product to access specific or all features of a product.

 

 

Production Profile

Defines how document files in a case are produced when exported or printed. This includes settings for stamping, numbering, and redaction.

 

 

 

 

profile

Allows users of Nuix Workstation and Nuix Automation to build and configure settings used for repetitive processes to simplify processing jobs for achieve a faster overall user experience. Types of profiles include:

Imaging Profile

Metadata Export Profile

Named Entity Profile

OCR Profile

Processing Profile

Production Profile

See the separate definitions for each profile type.

 

 

 

 

PST

Personal  Information Store  (.pst) - a file storing personal information used in Microsoft Outlook, Exchange and Teams; includes messages, contacts, attachments, and addresses.

 

 

RAM image

A sequence of machine-coded instructions and associated data kept permanently in the non-volatile ROM memory of an embedded system, which is copied into volatile RAM by a bootstrap loader. 

 

 

redaction

The modification of printed images by the user to prepare to give them to another party. Usually involves masking information which is not relevant to the case so it cannot be read.

 

 

Regex (Regular Expression)

A pattern used to match text content, for example, in searches. (Not used outside advanced searches).

 

 

resemblance measure

A mathematical formula to rate how closely two text documents resemble one another. Nuix uses the Jaccard Similarity Coefficient as a resemblance measure. Given two items A and B, both of which possess sets of text shingles, the resemblance measure gives a numerical value between 0.0 and 1.0 (inclusive). The closer this value is to 1.0, the more closely items A and B are said to resemble one another.

 

 

resemblance threshold

A value between 0.0 and 1.0 (inclusive). If the resemblance measure of items A and B exceeds the threshold, the items are said to be near-duplicates one another. Conversely, if the resemblance measure for A and B is less than the resemblance threshold, the items are not considered to be near-duplicates of one another.

 

 

Responsive tag

DEFINE. See tag, and Nonresponsive tag.

 

 

REST

Representational State Transfer, an architectural style for providing communication standards between computer systems on the web. REST-compliant systems separate client and server concerns.
‎(AWS term) A simple stateless architecture that generally runs over HTTPS/TLS. Its resources have unique and hierarchical identifiers (URIs) represented by common media types (such as HTML, XML, or JSON), and its operations on the resources are either predefined or discoverable within the media type. In practice, this generally results in a limited number of operations. 

 

 

review job

A collection of items which people will eventually look at as part of a fast review session. As items are reviewed, the application keeps track of who reviewed what, and when.

 

 

RMS

Rights Management Services – a Siemens API

 

 

 

 

S3

See Amazon Simple Storage Service (Amazon S3).

 

 

 

 

SaaS

Software as a Service allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365)

 

 

 

 

SCC

Security Compliance Center - Microsoft Office 365 audit logs

 

 

 

 

scraped message

A message which was "scraped" from an HTML (or potentially plain text) file by looking at patterns in the file and recognizing bits and pieces which look like the parts of an email message.

 

 

 

 

search type

Can be one of the following:  COMPARE WITH AUTOMATION

 

 

 

 

script

A program, often written by the user, to run a series of operations in an automated fashion.

 

 

 

 

search macro

A configurable shortcut, allowing use of shorter search syntax, which expands to full syntax when the search is run.

 

 

SEO

Search Engine Optimization - the process of improving the quality and quantity of website traffic to a website or a web page from search engines. 

 

 

 

 

set

A collection of items which is either created by the user to organize the items into a collection for export, or created automatically as part of an export. Items in a production set are numbered before the export takes place.

 

 

 

 

settings 

Advanced settings include those for Elasticsearch and Kafka. Also see Elasticsearch and Kafka.

 

 

 

 

shingle (or n-gram)

A contiguous sequence of tokens. Sometimes called W-shingles.

 

 

 

 

shingle list

A collection of shingles in a form which can be reused to perform searches.

 

 

 

 

similar items

Items deemed similar to a given item, based on their content.

 

 

 

 

Simple Case

A case which contains loaded data. Opposite of compound case.

 

 

 

 

slack space

Space at the end of a file inside the space the file system has allocated to the file.

 

 

 

 

slip sheet

A printed image substituted in situations where printing the item was not possible or the user chose to deliberately suppress the printing for the item.

 

 

 

 

slop

An amount of inaccuracy specified in a query of multiple sequential terms (a phrase query) which specifies how much the hit is permitted to differ from the query. This is not used outside advanced search docs.

 

 

 

 

SMTP

Simple Mail Transfer Protocol – used to send emails between computers.

 

 

 

 

(AWS term) The standard used to exchange email messages between internet hosts for the purpose of routing and delivery.

 

 

 

 

snake-case code

Code in Worker Scrips with syntax: "snake_case" not "camelCase". Not preferred. Also see camel-case code.

 

 

 

 

source data

Data which gets loaded into a case.

 

 

 

 

SPOOLS

 Temporarily hidden folders created by Microsoft for storing Microsoft Teams and Channel data; a "digital twin". Seen in MIME Types listings.

 

 

 

 

SSH

Secure Shell - a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

 

 

 

 

Not supported in FIPS mode.

 

 

 

 

SSL

Secure Sockets Layer - a cryptographic protocol providing security for communication over the internet. It is used to secure trusted certificates and keys used in Nuix products such as NMS, Investigate and Automation. See TSL, a later version of SSL.

 

 

 

 

stemming

Chopping the end from terms when indexing text, in order to convert multiple related terms down to the same term

 

 

 

 

STM

Short Text Message (.stm) - a file storing personal information used in ???

 

 

 

 

Stop Words

Words omitted from the index, despite their existence in the text content.

 

 

 

 

SVG

Scalable Vector Graphics  - an XML-based vector image format for two-dimensional graphics that supports interactivity and animation. 

 

 

 

 

tagging

Allows you to configure if family and duplicate counts should be shown when the tagging dialog appears.
‎The Enable family and duplicate counts option controls the counts on the Review and Tag panel, which helps Nuix Workstation perform better.
‎Also see batch.

 

 

 

 

tag

A label attached to items by the user for classification or other purposes.

 

 

(AWS term) Metadata you define and assign as a label to ….?

 

 

telemetry

The in-situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment (telecommunication) for monitoring.
‎OR Information collected by products for licensing, pricing, and business intelligence insights. It is a subset of all analytics which could be collected by a product around customer usage, and relates specifically to information the business must have to license, invoice, and price the products. 

 

 

 

 

term

A single unit of indexed information. Roughly similar to a single word, but without the cultural vagueness which comes from the word "word." HUH!

 

 

timestamp

(AWS term) A date/time string in ISO 8601 format.

 

 

 

 

tokenization

Breaking text into multiple runs of characters for analysis (e.g. indexing).

 

 

 

 

top-level item

An item such as an email or a file on a filesystem which has no other top-level item higher up in the hierarchy. Top-level items are always material items.

 

 

 

 

TSL

Transport Socket Layer – a cryptographic protocol providing security for communications over the internet. A more secure communications protocol than its predecessor, Secure Sockets Layer (SSL).

 

 

 

 

unallocated space

Space in a partition or filesystem not allocated to store files or directories.

 

 

 

 

UNC

Universal Naming Convention – a Microsoft convention for specifying the path to access a shared network folder or printer.

 

 

 

 

Unicode

Universal Coded Character Set. See UTF-8.
‎Allows searching on characters in languages other than ones using the Western letter alphabet.

 

 

 

 

Unrecognized MIME-type

One of four types:

XML

OLE2

TXT

Unknown binary

 

 

URI

Uniform Resource Identifier - a string of characters used to identify the location of something. In the context of Nuix, this is typically used for locations of source data.

 

 

UTF-8

A type of character set related to Work Lists.

 

 

See Work List.

 

 

UUID

Uxxxxx User ID (relates to an NMS installation when configuring dongles on a Unix machine)

 

 

VHD

Virtual Hard Disk drive

 

 

 

 

VPAT

Voluntary Product Accessibility Template – a document that explains how information and communication technology (ICT, which includes software, hardware, electronic content and support documentation) conform to the Revised 508 Standards for IT accessibility. It is used by buyers to determine how accessible a product is and where potential deficiencies exist.

 

 

 

 

WIA

Windows Integrated Authentication

 

 

 

 

Word List

A collection of words and phrases in a form which can be reused to perform searches.

 

 

 

 

Workbench

The main tab used to perform searches and other operations.
‎(Also, the previous name of Nuix Workstation.)

 

 

 

 

worker

• A processing worker: A single process spawned to perform processing jobs.
‎• Nuix Worker: An application run on another computer to join processing jobs.

 

 

worker script

Enables you to provide customized code to each worker during case processing using the following languages:

ECMAScript

Python

Ruby

 

 

writing script

In the context of filters, a system people use to write the words of their language.

 

 

WWS

Worker Side Scripting or Worker Side Script, depending on context.

 

 

XRY logs

Logs derived from XRY, an app, that run on a Windows OS to extract high-quality evidence data.