Glossary of terms used in Nuix Workstation
The following table lists the most common terms and acronyms used in Nuix Workstation:
Term |
Definition |
||||
AIP |
Azure Information Protection |
||||
Amazon Simple Storage Service (Amazon S3) |
Amazon S3 - a storage service for the internet. |
||||
ancestor |
An item located one or more levels above the item that comprises its descendant. Also see Parent, and Child. |
||||
API |
Application Programming Interface - for example a REST API. |
||||
artifact |
Save in case notes. |
||||
audited size |
The size of an item, used to bill processing size in a per-gigabyte licensing scheme. |
||||
autoclassification / automatic classifier |
A method of supplying training items to Nuix for it to intelligently learn their characteristics, and then use that information to automatically classify or categorize other items. |
||||
Automatic Classification |
Also called Technology-Assisted Review or Machine Learning is a technology largely driven by eDiscovery that is built on Predictive Coding. |
||||
batch |
Jobs batched together for review by investigators, where each job can have specific tags and words to highlight, and associated items. Also see tagging. |
||||
batch load |
The set of items loaded or reloaded in a single load operation. |
|
|
||
bulk evidence |
Refers to uploading multiple pieces of evidence to multiple instances of Nuix Workstation from a single CSV file. |
|
|
||
CaaP |
Conversation as a Platform |
|
|
||
camel-case code |
Code in Worker Scrips with syntax: "camelCase" not "snake_case". Preferred. Also see snake-case code. |
|
|
||
carving |
Recovering deleted files from sources such as disk images, using known header and footer signatures |
|
|
||
carved items |
Areas on a file system which previously held the content of files in the file system. These files were deleted along with the metadata which would allow deleted file recovery to link back to the data. |
|
|
||
case |
A collection of loaded data comprising multiple evidence stores, a database and various other files holding information about the case itself. Cases in Nuix Automation can be of four types: |
||||
case subset |
A copy of items from a case to create a new case with those items. |
||||
child |
An item located immediately below, or inside, the item that comprises its parent. |
||||
CLI |
Command Line Interface |
|
|
||
cluster |
A collection of items related by their email header information or common text shingles. |
|
|
||
cluster run |
A calculation of clusters using a particular combination of email threading or near-duplicates at a fixed resemblance threshold. |
|
|
||
comment |
A text note which can be attached to any item. |
|
|
||
Compound Case |
A case usually containing simple cases, rather than containing the loaded data itself. Opposite of simple case. Also see case. |
|
|
||
container |
An item holding items. For instance, a zip file. A Word document can also contain items inside it, but it is not a container because it has content of its own. |
|
|
||
context |
A Global Option to configure the Context graph and Workbench limits; and customize analysis links between items and the display text for vertices. |
|
|
||
CSP |
Cloud Service Provider |
|
|
||
custodian |
The person who is the owner of an item. Typically, this is the person whose mailbox or computer the item was originally retrieved from. |
|
|
||
custom metadata |
Metadata defined by the user of the application. |
|
|
||
custom metadata template |
A template or specification file containing several custom metadata fields that can be applied to items in a single action. Additionally, the template can enforce some data entry restrictions to the fields defined in it. |
|
|
||
deduplication |
The act of identifying the originals and duplicates for a set of items. |
|
|
||
De-NISTing |
The elimination of system files or other application files with known signatures and little or no value to an investigation. |
|
|
||
descendant |
An item located one or more levels below the item that comprises its ancestor. Also see child. |
|
|
||
diagnostics |
A dialog which helps the user identify issues with missing dependencies and look at other (usually-hidden) properties of the running application. |
|
|
||
digest |
A fixed-length data sequence (usually represented as hexadecimal digits) created from the contents of an item, used to identify duplicate items. Examples of digest algorithms include MD5 and SHA-256. |
|
|
||
digest list |
A collection of digests in a form which can be reused to perform searches. |
|
|
||
Also see NSRL Digest Lists. |
|
|
|||
DLL |
Dynamic Link Library |
|
|
||
document |
(AWS term - do we ant to use this? do we have another?) |
|
|
||
duplicate |
An item with the same content as another item, determined using a digest. |
||||
duplicates |
The collection of items comprising an original and its duplicates. |
|
|
||
ECA/EDA |
Early Case Assessment/Early Data Assessment. terminology applied to legal investigation of evidence. |
|
|
||
ECC |
Nuix Enterprise Collection Center |
|
|
||
EDB |
Exchange Database - a mailbox type, being exchange database files that store in-process and non-SMTP messages as .edb files. |
|
|
||
EDRM |
Electronic Discovery Reference Model - allows exports in legal XML formats. |
|
|
||
EGG file |
A compressed archive file containing one or more files compressed by ALZip. |
|
|
||
Elastic |
(AWS term - is this the same company we use for Elastic cases??) |
|
|
||
Elastic case |
Cases using the Elastic Security app open and track security issues directly. All cases list the original reporter and all users who contribute to a case (participants). Comments support Markdown syntax and allow linking to saved Timelines. An Elastic backed case adds the benefit of searching while indexing is in progress, thus providing a near real-time search capability. |
||||
Elasticsearch |
An open-source search engine based on Apache Lucene that Nuix Workstation uses for log analytics, full-text search, and operational intelligence use cases. It enables Nuix Workstation users to store, search, and analyze large volumes of data. |
||||
email protocol |
See IMAP, MAPI, POP, and SMTP. |
||||
email storage system |
See EDB, PST, and OST. |
||||
email thread |
A series of mail discussions where people replied to an initial mail and then those emails were replied to in turn. The entire tree of the initial mail and all its replies form a single thread. |
|
|
||
EML |
A file extension for an email message saved to a file in the MIME RFC 822 standard format by Microsoft Outlook Express as well as some other email programs. EML files can contain plain ASCII text for the headers and the main message body as well as hyperlinks and attachments. |
|
|
||
evidence |
Another word for source data. |
|
|
||
evidence container |
An item at the highest level of the item hierarchy which acts as a kind of "virtual" folder for grouping related items together. |
|
|
||
evidence repository |
A folder that can contain many evidence containers, all auto-discoverable by Nuix using a single action. This differs from regular evidence which must be individually added to the case. Different custodians can optionally be different parts of the repository. |
|
|
||
evidence store |
A database and text index holding some quantity of data for a case. |
|
|
||
exact query |
A query which matches the characters in the text exactly. Exact queries apply tokenization to break the text up into individual characters, rather than words. |
|
|
||
exclusion |
A special label attached to items which acts similarly to a tag, but also hides the item from search results by default. |
|
|
||
export |
The act of processing case data to copy information to a destination outside the case, typically files. |
|
|
||
family |
A collection of items comprising a top-level item and its descendants. Families are often treated as if they were a single unit of information. |
|
|
||
fast review |
A feature whereby review of a large number of items can be automatically subdivided into review jobs to be performed by multiple users. Also see batch. |
|
|
||
FAT file system |
File Allocation Table - a simple file system originally designed for small disks and simple folder structures. |
|
|
||
FEDRAMP |
The Federal Risk and Management Program - a cyber security RM program for the purchase and use of cloud products and services used by US federal agencies. CSPs must have FedRamp approval to work federal agencies. |
||||
file systems |
FAT, HFS, MFS or NTFS file systems. |
|
|
||
See these entries for more details. |
|
|
|||
FIPS |
Federal Information Processing Standards - a US standard to ensure requirements are met for computer security and interoperability. |
|
|
||
forensic image formats |
E01, L01, DD - taken directly from NTFS, FAT32, EXT2, and EXT3 volumes. |
||||
FQDN |
Fully Qualified Domain Name |
|
|
||
fuzzy hashing |
A method using the SSdeep program to generate a hash value of a file. This hash value can then be used to search and identify similar files to the original hashed file, producing a percentage of similarity. Typically, investigators process their case evidence generating an MD5 hash of each item. |
|
|
||
fuzzy hash list |
A list of potentially incriminating documents that may not be located using traditional hashing methods. |
|
|
||
fuzzy search |
(AWS term) A simple search query that uses approximate string matching (fuzzy matching) to correct for typographical errors and misspellings. |
|
|
||
GA |
General Availability (meaning for general release to clients) |
|
|
||
GID |
? |
|
|
||
GDPR |
General Data Protection Regulation (a European Union regulation) that NDF helps implement. |
|
|
||
GUID |
Globally Unique Identifier - a stable identifier allocated to items which (for all practical intents) is unique for all items across all cases anywhere in the world. |
|
|
||
HWP or HWPX file |
A mobile evidence file format providing support for over 15,000 mobile phones. |
|
|
||
HDMI |
High-Definition Multimedia Interface |
|
|
||
HFS |
Hierarchical File System - a proprietary file system developed by Apple Inc. for computer systems running Mac OS. Designed for use on floppy and hard disks, it is also used in read-only media such as CD-ROMs. HFS is also referred to as Mac OS Standard, while its successor, HFS Plus, is also called Mac OS Extended. |
|
|
||
HMAC |
Hash-based Message Authentication Code – used for all communication between installed services (for example, in Nuix Automation). |
||||
(AWS term): A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. You can use it to verify both the data integrity and the authenticity of a message at the same time. AWS calculates the HMAC using a standard, cryptographic hash algorithm, such as SHA-256. |
|
|
|||
IaaS |
Infrastructure as a Service |
|
|
||
IDE |
?? |
|
|
||
imaging |
Production of a material item into a paper-like form such as PDF. Sometimes also referred to as ‘printing’. |
|
|
||
imaging profile |
Defines granular rules for imaging content when creating, populating stores of, or exporting images. This includes rendering options, and the use of slip-sheet templates. |
|
|
||
IMAP |
Internet Message Access Protocol - a protocol to synch and read emails. |
|
|
||
IMF |
Internet Message Format - the basic format of an email message. |
|
|
||
immaterial item |
An item which itself contains no visible information, or the information it contains is already visible when imaging its parent. Examples include embedded images, folders on a filesystem or archive files. Opposite of a material item. |
|
|
||
ingestion |
The process of loading data. |
|
|
||
IOPS |
Input/Output Operations per Second |
|
|
||
ISP |
Internet Service Provider |
|
|
||
ISMS |
Information Security Management System – a set of interrelated or interacting elements in an organization to establish policies, objectives and processes to achieve security of information. |
|
|
||
item |
A single document, email, folder, etc. as represented in a case. |
|
|
||
item ID |
A stable identifier allocated to items which is unique for all items in the current simple case. Item IDs in a compound case are also unique in that case, but the item ID for an item is different depending on which case it is viewed through. |
|
|
||
item set |
A collection of items which the user has grouped together. Item sets can be deduplicated up-front. |
|
|
||
Kafka |
An open-source software platform for streaming real-time data feeds. |
|
|
||
launching |
In NWS, setting up email messages to open in the Native tab (in their native application?). |
|
|
||
legal export |
An export of items that may contain several types of artifacts for each item and a load file. The artifacts are different views of each item such as PDFs, TIFF images, native files or text, which correspond to the different tabs in the item’s preview. The load file is an index of all items and artifacts produced. It is generated in different formats corresponding to what the target third party review tool is able to read. WHY NOT WITH NEXT ENTRY? |
|
|
||
load file |
Used by litigation support software, a file used to indicate the data and metadata to load into a database, or to link images, with commands to carry out certain functions with the data found in them. |
|
|
||
loading |
The act of processing data from source data into a case. Sometimes called ingestion. |
||||
Logstash |
A free open source tool for collecting and parsing log files. It uses a simple workflow and can parse any log files the investigator needs to analyze using a range of filters. Using the output file from Logstash, Nuix Workstation can ingest the log entries and apply context to the results that can assist investigators in the analysis of the log entries, using a forensic tool. |
|
|
||
loose file |
A file which is present directly on the filesystem, as opposed to being inside an archive or attached to an email. Also see physical file, which might seem similar. |
|
|
||
LSV |
Legal Services Vendor |
|
|
||
LUN |
Logical Unit Number |
|
|
||
mailbox types |
PST, OST, and EDB. |
|
|
||
markup set |
A collection of markups to PDF documents which users have made as part of redaction. |
||||
MAPI |
Message Application Program Interface – a Microsoft proprietary API that allows programs to become email-aware. While designed to be independent of the protocol, it is usually used to communicate with Microsoft Exchange Server. |
|
|
||
material item |
An item which contains visible information, where that information is not already included when imaging its parent. Examples would be a document attached to an email, or files inside an archive. Opposite of immaterial item. |
|
|
||
MBOX |
A file storing personal information used in B12. |
|
|
||
MD5 |
A message-digest algorithm that is a cryptographically broken but still a widely used hash function producing a 128-bit hash value. |
|
|
||
metadata |
Data about data, such as filesystem timestamps or author information. |
|
|
||
Metadata Export Profile |
Defines how to export metadata to an external database while the processing occurs. |
|
|
||
Metadata Import Profile |
Defines how to import metadata into a case where existing items are matched by a defined parameter such as item GUID. |
|
|
||
MFC |
Microsoft Foundation Classes |
|
|
||
MFT |
Master File Table - a file system comprising a database that stores every file’s information including file name, creation date, access permissions, data content and size on an NTFS volume. A file may have one or more MFT records. |
|
|
||
MIME |
Multipurpose Internet Mail Extensions - an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs. |
||||
MIME types |
The file types of evidence Nuix Workstation processes, which fall under these categories: |
||||
MIME Type Settings |
A tab enabling you to control types of evidence items processed by Nuix Workstation. |
||||
MSAB |
A partner company of Nuix producing tools, products and services in mobile forensics (extraction, analysis and system management). |
|
|
||
MSG |
A file format used by Microsoft Outlook and Exchange to store email messages, contact, appointment, or other tasks. Such messages may contain one or more email fields, with the sender, recipient, subject, date, and message body, or contact information, appointment particulars, and one or more task specifications. |
|
|
||
named entity |
A run of text identified as belonging to a predefined category, such as an organization, monetary value or credit card number. These are configured using regular expressions. |
|
|
||
Named entities are used in profiles to search on items, or to extract them from text, properties and communications. |
|
|
|||
Named Entity Profile |
Defines the preferred entity or entities to be used for consistent processing across cases. This requires the NDF (Nuix Data Finder) add-on. |
|
|
||
native file |
Related to exporting, this strictly is the original file in the original format in which it was created, but as Nuix converts some formats on export, we mean "files that require a viewer that isn't just an image viewer or a PDF viewer". |
|
|
|
|
near-duplicates |
Items A and B are said to be near-duplicates of one another if their resemblance measure exceeds a given resemblance threshold. |
|
|
|
|
NLP |
Natural Language Processing - software that helps computer systems better understand text and spoken words at speed and scale. |
|
|
|
|
Nonresponsive tag |
DEFINE. See tag, and Responsive tag. |
|
|
|
|
NRT |
Nuix Report Template - these enable the generation of reports by defining how a report is be processed, using the scripting API. |
|
|
|
|
NSF |
A database file format used by Lotus Notes, now known as HCL Notes. Can be converted to Outlook. |
|
|
|
|
NSRL Digest Lists |
National Software Reference Library (NSRL) Digest Lists (Hash Sets). |
|
|
|
|
NTFS |
New Technology File System - the default journaling file system of Microsoft’s Windows NT family offering reliably advanced data structures and disk space use, and a security system based on access control lists. It is also supported in Linux and BSD. |
|
|
||
NTLM |
NT (New Technology) LAN Manager - a suite of Microsoft security protocols providing authentication, integrity, and confidentiality to users in a Windows network. |
||||
Nuix Connector |
A plug-in that can pull into NWS any MS O365 application file |
|
|
|
|
numbering |
A number allocated to an item at the time of creating a production set or exporting the items. Can also be the process of adding these numberings. |
|
|
|
|
OCR |
Optical Character Recognition, used to perform refined recognition of characters in PDFs. Requires installation of ABBYY. |
|
|
|
|
OCR Profile |
Defines how document files are OCR'd during ingestion and processing. |
|
|
|
|
OEM |
Original Equipment Manufacturer - producing equipment marketed by another manufacturer, or the maker of a system that includes components made by another company. |
|
|
|
|
original |
In the context of deduplication, an item which is not a duplicate. The original item is chosen based on some criteria chosen by the user. |
|
|
|
|
OST |
Outlook STore - - a mailbox type, being an encrypted Offline Outlook Data file (.ost) created when you set up an account in Outlook. It cannot be opened directly in an Outlook profile or account. |
|
|
|
|
P12 |
A file type (.p12) for a PKCS#12 based private key certificate which requires a password. |
|
|
|
|
parent |
An item located immediately above, or outside, the item which makes its child. |
|
|
|
|
Passware |
Integrated with Nuix Workstation has to decrypt encrypted disk images and containers using user names and passwords provided by users in a wordlist. It enables decryption and filtering of forensic images before processing data using PGP/Symantec and McAfee Drive. See PGP. |
|
|
|
|
PFX |
A file type (.pfx)for a PKCS#12 based private key certificate which requires a password. |
|
|
|
|
PGP |
Pretty Good Privacy - an encryption program providing cryptographic privacy and authentication for data communication. Used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications. |
|
|
|
|
physical file |
A file which the user has directly added as evidence to process. Distinct from a loose file because a file inside a disk image would be a loose file, yet the disk image itself would be the physical file. |
|
|
|
|
PKF |
Passware Kit Forensics - with Passware license allows decryption of files, drives and disk images in NWS. |
|
|
|
|
poisoned |
A property of an item which has problems which caused errors so severe that processing the item caused the worker to terminate unexpectedly multiple times. |
|
|
|
|
POP, POP3 |
Post Office Protocol – a protocol used to read emails. |
|
|
|
|
printed image |
An exported file in PDF format which looks the same as what you would get if you printed an item. |
|
|
|
|
processing |
The action of processing data, generally to multiple items. |
|
|
|
|
Processing Profile |
Defines how items are processed when added into Nuix Workstation or Nuix Automation. |
|
|
||
Product profile |
Contains the licenses associated with a product to access specific or all features of a product. |
|
|
||
Production Profile |
Defines how document files in a case are produced when exported or printed. This includes settings for stamping, numbering, and redaction. |
|
|
|
|
profile |
Allows users of Nuix Workstation and Nuix Automation to build and configure settings used for repetitive processes to simplify processing jobs for achieve a faster overall user experience. Types of profiles include: Imaging Profile Metadata Export Profile Named Entity Profile OCR Profile Processing Profile Production Profile See the separate definitions for each profile type. |
|
|
|
|
PST |
Personal Information Store (.pst) - a file storing personal information used in Microsoft Outlook, Exchange and Teams; includes messages, contacts, attachments, and addresses. |
|
|
||
RAM image |
A sequence of machine-coded instructions and associated data kept permanently in the non-volatile ROM memory of an embedded system, which is copied into volatile RAM by a bootstrap loader. |
|
|
||
redaction |
The modification of printed images by the user to prepare to give them to another party. Usually involves masking information which is not relevant to the case so it cannot be read. |
|
|
||
Regex (Regular Expression) |
A pattern used to match text content, for example, in searches. (Not used outside advanced searches). |
|
|
||
resemblance measure |
A mathematical formula to rate how closely two text documents resemble one another. Nuix uses the Jaccard Similarity Coefficient as a resemblance measure. Given two items A and B, both of which possess sets of text shingles, the resemblance measure gives a numerical value between 0.0 and 1.0 (inclusive). The closer this value is to 1.0, the more closely items A and B are said to resemble one another. |
|
|
||
resemblance threshold |
A value between 0.0 and 1.0 (inclusive). If the resemblance measure of items A and B exceeds the threshold, the items are said to be near-duplicates one another. Conversely, if the resemblance measure for A and B is less than the resemblance threshold, the items are not considered to be near-duplicates of one another. |
|
|
||
Responsive tag |
DEFINE. See tag, and Nonresponsive tag. |
|
|
||
REST |
Representational State Transfer, an architectural style for providing communication standards between computer systems on the web. REST-compliant systems separate client and server concerns. |
|
|
||
review job |
A collection of items which people will eventually look at as part of a fast review session. As items are reviewed, the application keeps track of who reviewed what, and when. |
|
|
||
RMS |
Rights Management Services – a Siemens API |
|
|
|
|
S3 |
See Amazon Simple Storage Service (Amazon S3). |
|
|
|
|
SaaS |
Software as a Service allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365) |
|
|
|
|
SCC |
Security Compliance Center - Microsoft Office 365 audit logs |
|
|
|
|
scraped message |
A message which was "scraped" from an HTML (or potentially plain text) file by looking at patterns in the file and recognizing bits and pieces which look like the parts of an email message. |
|
|
|
|
search type |
Can be one of the following: COMPARE WITH AUTOMATION |
|
|
|
|
script |
A program, often written by the user, to run a series of operations in an automated fashion. |
|
|
|
|
search macro |
A configurable shortcut, allowing use of shorter search syntax, which expands to full syntax when the search is run. |
|
|
||
SEO |
Search Engine Optimization - the process of improving the quality and quantity of website traffic to a website or a web page from search engines. |
|
|
|
|
set |
A collection of items which is either created by the user to organize the items into a collection for export, or created automatically as part of an export. Items in a production set are numbered before the export takes place. |
|
|
|
|
settings |
Advanced settings include those for Elasticsearch and Kafka. Also see Elasticsearch and Kafka. |
|
|
|
|
shingle (or n-gram) |
A contiguous sequence of tokens. Sometimes called W-shingles. |
|
|
|
|
shingle list |
A collection of shingles in a form which can be reused to perform searches. |
|
|
|
|
similar items |
Items deemed similar to a given item, based on their content. |
|
|
|
|
Simple Case |
A case which contains loaded data. Opposite of compound case. |
|
|
|
|
slack space |
Space at the end of a file inside the space the file system has allocated to the file. |
|
|
|
|
slip sheet |
A printed image substituted in situations where printing the item was not possible or the user chose to deliberately suppress the printing for the item. |
|
|
|
|
slop |
An amount of inaccuracy specified in a query of multiple sequential terms (a phrase query) which specifies how much the hit is permitted to differ from the query. This is not used outside advanced search docs. |
|
|
|
|
SMTP |
Simple Mail Transfer Protocol – used to send emails between computers. |
|
|
|
|
(AWS term) The standard used to exchange email messages between internet hosts for the purpose of routing and delivery. |
|
|
|
|
|
snake-case code |
Code in Worker Scrips with syntax: "snake_case" not "camelCase". Not preferred. Also see camel-case code. |
|
|
|
|
source data |
Data which gets loaded into a case. |
|
|
|
|
SPOOLS |
Temporarily hidden folders created by Microsoft for storing Microsoft Teams and Channel data; a "digital twin". Seen in MIME Types listings. |
|
|
|
|
SSH |
Secure Shell - a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. |
|
|
|
|
Not supported in FIPS mode. |
|
|
|
|
|
SSL |
Secure Sockets Layer - a cryptographic protocol providing security for communication over the internet. It is used to secure trusted certificates and keys used in Nuix products such as NMS, Investigate and Automation. See TSL, a later version of SSL. |
|
|
|
|
stemming |
Chopping the end from terms when indexing text, in order to convert multiple related terms down to the same term |
|
|
|
|
STM |
Short Text Message (.stm) - a file storing personal information used in ??? |
|
|
|
|
Stop Words |
Words omitted from the index, despite their existence in the text content. |
|
|
|
|
SVG |
Scalable Vector Graphics - an XML-based vector image format for two-dimensional graphics that supports interactivity and animation. |
|
|
|
|
tagging |
Allows you to configure if family and duplicate counts should be shown when the tagging dialog appears. |
|
|
|
|
tag |
A label attached to items by the user for classification or other purposes. |
|
|
||
(AWS term) Metadata you define and assign as a label to ….? |
|
|
|||
telemetry |
The in-situ collection of measurements or other data at remote points and their automatic transmission to receiving equipment (telecommunication) for monitoring. |
|
|
|
|
term |
A single unit of indexed information. Roughly similar to a single word, but without the cultural vagueness which comes from the word "word." HUH! |
|
|
||
timestamp |
(AWS term) A date/time string in ISO 8601 format. |
|
|
|
|
tokenization |
Breaking text into multiple runs of characters for analysis (e.g. indexing). |
|
|
|
|
top-level item |
An item such as an email or a file on a filesystem which has no other top-level item higher up in the hierarchy. Top-level items are always material items. |
|
|
|
|
TSL |
Transport Socket Layer – a cryptographic protocol providing security for communications over the internet. A more secure communications protocol than its predecessor, Secure Sockets Layer (SSL). |
|
|
|
|
unallocated space |
Space in a partition or filesystem not allocated to store files or directories. |
|
|
|
|
UNC |
Universal Naming Convention – a Microsoft convention for specifying the path to access a shared network folder or printer. |
|
|
|
|
Unicode |
Universal Coded Character Set. See UTF-8. |
|
|
|
|
Unrecognized MIME-type |
One of four types: XML OLE2 TXT Unknown binary |
|
|
||
URI |
Uniform Resource Identifier - a string of characters used to identify the location of something. In the context of Nuix, this is typically used for locations of source data. |
|
|
||
UTF-8 |
A type of character set related to Work Lists. |
|
|
||
See Work List. |
|
|
|||
UUID |
Uxxxxx User ID (relates to an NMS installation when configuring dongles on a Unix machine) |
|
|
||
VHD |
Virtual Hard Disk drive |
|
|
|
|
VPAT |
Voluntary Product Accessibility Template – a document that explains how information and communication technology (ICT, which includes software, hardware, electronic content and support documentation) conform to the Revised 508 Standards for IT accessibility. It is used by buyers to determine how accessible a product is and where potential deficiencies exist. |
|
|
|
|
WIA |
Windows Integrated Authentication |
|
|
|
|
Word List |
A collection of words and phrases in a form which can be reused to perform searches. |
|
|
|
|
Workbench |
The main tab used to perform searches and other operations. |
|
|
|
|
worker |
• A processing worker: A single process spawned to perform processing jobs. |
|
|
||
worker script |
Enables you to provide customized code to each worker during case processing using the following languages: ECMAScript Python Ruby |
|
|
||
writing script |
In the context of filters, a system people use to write the words of their language. |
|
|
||
WWS |
Worker Side Scripting or Worker Side Script, depending on context. |
|
|
||
XRY logs |
Logs derived from XRY, an app, that run on a Windows OS to extract high-quality evidence data. |
|
|