SekChek for Windows: Glossary for System Config

The following table defines the columns displayed in the System Configuration report section.

Operating System

OS Name The name of the Operating System.
E.g. Microsoft Windows Server 2012 Standard
OS Version, Build The version and build number of the Operating System.
E.g. 6.2.9200
OS Architecture The architecture of the Operating System. E.g. 64-bit.
OS Locale Id The language identifier used by the operating system.
E.g. x1C09.
OS Serial Number Operating system product serial identification number.
E.g. 10497-OEM-0031416-71674.
OS Installed The date that the Operating System was installed.
Last Boot Up The date that the Operating System was last restarted.
Country Code The code for the country/region that an Operating System uses. Values are based on international phone dialing prefixes.
E.g. 1 = United States.
Time Zone The time zone defined on the computer, relative to Greenwich Mean Time.
Boot Device The name of the disk drive from which the Operating System starts.
E.g. \\Device\Harddisk0.
System Drive The physical disk partition on which the Operating System is installed.
Windows Directory The Windows directory of the operating system. E.g. C:\Windows.
System Directory The System directory of the operating system.
E.g. C:\Windows\System32.
PAE Enabled Indicates whether the physical address extensions (PAE) are enabled by the Operating System running on Intel processors. PAE allows applications to address more than 4 GB of physical memory.
Visible Memory The total amount of physical memory available to the Operating System. This value does not necessarily indicate the true amount of physical memory, but what is reported to the Operating System as available to it.
Free Memory The amount of free memory available on the computer.
Encryption Level The encryption level for secure transactions. E.g. 128-bit.
OS Language The language version of the Operating System.
OS Stock Keeping Name The Stock Keeping Unit (SKU) name for the operating system.
E.g. Standard Server Edition.
Maximum Number of Processes The maximum number of process contexts the Operating System can support.
Number of Licensed Users The number of user licenses for the Operating System.
Number of User Sessions The number of user sessions for which the Operating System is storing state information currently. Includes stale, previous user sessions.
Registered User The name of the registered user of the Operating System.
E.g. Joe Soap.
DEP Available Indicates whether Data Execution Prevention (DEP) is available. DEP is a hardware feature to prevent buffer overrun attacks by stopping the execution of code on data-type memory pages.
DEP Enabled for 32-bit Appls Indicates whether DEP is configured to work for 32-bit applications.
DEP Enabled for Drivers Indicates whether DEP is configured to work for drivers.
DEP Policy Indicates which DEP setting is applied. The DEP setting specifies the extent to which DEP applies to 32-bit applications on the system. DEP is always applied to the Windows kernel. E.g.

Always Off: DEP is turned off for all 32-bit applications on the computer with no exceptions.

Always On: DEP is enabled for all 32-bit applications on the computer.

Opt In: DEP is enabled for a limited number of binaries, the kernel, and all Windows-based services. However, it is off by default for all 32-bit applications.

Opt Out: DEP is enabled by default for all 32-bit applications. A user or administrator can explicitly remove support for a 32-bit application by adding the application to an exceptions list.

System Recovery Options

Write an Event to the System Log Indicates whether events will be written to a system log.
Send an Administrative Alert Indicates whether an alert message will be sent to the system administrator in the event of an operating system failure.
Automatically Restart Indicates whether the system will automatically reboot during a recovery operation.
Write Debugging Information Indicates the type of debugging information written to the log file.
Dump File The full path to the debug file. A debug file is created with the memory state of the computer after a computer failure.
Overwrite Any Existing File Indicates whether a new log file will overwrite an existing one.

BIOS

Manufacturer The manufacturer of the BIOS.
BIOS The version of the BIOS. E.g. 1.6.7.
Version The version of the SMBIOS (Major.Minor). E.g. 2.7
Release Date The release date of the BIOS (YYYY-MM-DD).

Baseboard (Motherboard)

Manufacturer The name of the manufacturer.
Product The baseboard part number defined by the manufacturer.
Serial Number The serial number assigned by the manufacturer.
Version The version of the baseboard.

Page Files

Number of Page Files The total number of page files.
Name of Page File #1 The name of page file 1. E.g. C:\pagefile.sys.
Temporary Page File Indicates whether the page file is temporary.
Create Date The date that the page file was created.
Allocated Size The actual amount of disk space allocated for use with this page file.
Current Usage The amount of disk space currently used by the page file.
Peak Usage The highest amount of disk space used by the page file.

Computer

Manufacturer The name of the computer manufacturer.
Model The product name assigned by the manufacturer.
System Type The type of system running on the computer.
Remote Desktop Enabled Indicates whether Remote Desktop is currently enabled.
Nbr of Processors The number of physical processors currently available on a system. This is the number of enabled processors for a system, which does not include the disabled processors.
Total Memory The total size of physical memory.
System Registry Size The current size and maximum allowed size of the system registry.
Screen Resolution The current resolution used for the display monitor.
Bootup State The boot-up state of the system when it was started. A fail-safe boot bypasses the user startup files.
Wake-up Type The event that causes the system to power up.
Boot ROM Supported Indicates whether a boot ROM is supported.
Infrared (IR) Supported Indicates whether an infrared (IR) port exists on the system.
Power Management Supported Indicates whether the computer can be power-managed. E.g. a device can be put into suspend mode.
Computer Role The role of the computer in an assigned domain workgroup.
E.g. Backup Domain Controller.
Computer Name The name of the computer.
Computer Sid (SAM) The local security id assigned by the Operating System to the computer.
Domain Name (short) The short name of the domain to which the computer belongs.
E.g. MyDom
Domain Name (DNS) The DNS name of the domain to which the computer belongs.
E.g. MyDom.sekchek.com

Processors

Number of Processors The number of physical processors currently available on a system. This is the number of enabled processors for a system, which does not include the disabled processors.
Manufacturer The name of the manufacturer. E.g. GenuineIntel.
Name The name assigned by the manufacturer.
Family The processor family type. E.g. AMD Opteron 6172.
Description A description of the processor.
E.g. AMD64 Family 16 Model 9 Stepping 1.
Processor Id A unique identifier for the processor. E.g. 078BFBFF00100F91.
Clock Speed The current speed of the processor, in MHz.
External Clock Speed The external clock frequency, in MHz.
Address Width On a 32-bit Operating System, the value is 32 and on a 64-bit operating system it is 64.
Data Width On a 32-bit Operating System, the value is 32 and on a 64-bit operating system it is 64.
Level 2 Cache Size The size of the Level 2 processor cache. A Level 2 cache is an external memory area that has a faster access time than the main RAM memory.
Level 2 Cache Speed The clock speed of the Level 2 processor cache.
Number of Cores The number of cores for the processor. A core is a physical processor on the integrated circuit. For example, in a dual-core processor this property has a value of 2.
Nbr of Logical Processors The number of logical processors for the processor. For processors capable of hyperthreading, this value includes only the processors which have hyperthreading enabled.
Chip Socket The chip socket used on the circuit. E.g. CPU1.
Availability The availability and status of the processor.
E.g. Running/Full Power, Degraded.

Network Adaptors (IP Enabled)

Connection Id The name of the network connection as it appears in the Network Connections Control Panel program.
E.g. Local Area Connection 2.
Connection Status The state of the network adapter connection to the network.
E.g. Connected, Hardware malfunction.
Name The label by which the network adapter is known.
Service Name The service name of the network adapter. E.g. netvsc.
Manufacturer The manufacturer of the network adapter. E.g. 3COM.
Adapter Type The network medium in use. E.g. Ethernet 802.3.
Speed (Mbs) The current bandwidth of the network adaptor.
Last Reset The date/time that the network adaptor was last reset.
IP Enabled Indicates whether TCP/IP is bound and enabled on this network adapter.
IP Address The IP addresses associated with the network adapter.
IP Subnet The subnet masks associated with the current network adapter.
E.g. 255.255.254.0, 64
Default Gateway IP addresses of default gateways that the computer system uses.
MAC Address The Media Access Control (MAC) address of the network adapter.
A MAC address is assigned by the manufacturer to uniquely identify the network adapter.
E.g. 00:80:C7:8F:6C:96
DHCP Enabled Indicates whether the dynamic host configuration protocol (DHCP) server automatically assigns an IP address to the computer system when establishing a network connection.
DHCP Lease Expires The expiration date and time for a leased IP address that was assigned to the computer by the DHCP server.
DHCP Lease Obtained The date and time the lease was obtained for the IP address assigned to the computer by the DHCP server.
DHCP Server The IP address of the DHCP server.
DNS Search Order The IP addresses used when querying for DNS servers.

Windows Firewall

Firewall State The current state of the Firewall.
Inbound Connections Indicates the behaviour for inbound connections.
E.g. Block, allow exceptions (default).
Outbound Connections Indicates the behaviour for outbound connections.
Display Notifications Indicates whether a notification is displayed when a program is blocked from receiving inbound connections.
Allow Unicast Response Indicates whether a unicast response is allowed to multicast or broadcast network traffic.

Region & Language Options

Current Format The current Region and Language format.
Time Format An example of the format used for time displays.
Short Date An example of the short date format. E.g. 06-Feb-2014
Long Date An example of the long date format. E.g. 06 February 2014
Short Date Format The short format used when displaying date values.
E.g. dd-MMM-yyyy
Long Date Format The long format used when displaying date values.
E.g. dd MMMM yyyy
Currency Symbol The commonly used currency symbol.
Currency (International) The international 3-character code used for the currency. E.g. GBP
System Locale The system locale used by the operating system.
E.g. English (United Kingdom)

Screen Saver Policy

Scan Account The user account used for the scan process.
Screen Saver Enabled Indicates whether a screen saver is enabled for the scan account.
Screen Saver Timeout The screen saver timeout for the scan account.
Screen Saver Secure Indicates whether the screen saver for the scan account is password protected.

User Access Control (UAC)

UAC Enabled Indicates whether UAC is currently enabled.

UAC can help prevent unauthorised changes to your computer because it notifies you when changes are going to be made that require administrator-level permission. These types of changes can affect the security of your computer or can affect settings for other people that use the computer.

We recommend that you set UAC on.

About SekChek IPS
SekChek® IPS is a leading provider of computer security review, auditing and benchmarking tools and has served many of the world’s largest companies and public institutions in 140 countries since 1996. SekChek’s clients include security and audit professionals in IT departments, audit firms, internal audit functions, regulatory compliance and corporate governance departments. SekChek’s benchmarking features compare security policies and controls against a unique statistics database containing more than 30 million anonymous and real-life security measurements compiled from 80,000 computer systems across all major industry sectors.

SekChek for..

Popular Downloads..

Popular Links..