Topic
This article provides definitions for terms and acronyms that are commonly used with our product and within our help guides. We may continue to add new terms and definitions to this document. If you are looking for a specific term and do not see it listed here, please use our Community.
Environment
NinjaOne platform
Description
- Acronyms
- File Extensions
- Product Terms
- Automation Library Descriptions
- Available Integration and Feature Descriptions
- Icons and Visual Aids
Acronyms
| Term | Definition | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3PP | "Third-party Patching" Related documentation: Policies: Mac Third-Party Software Patch Management | ||||||||||||
ABM | "Apple Business Manager" is used for mobile device management when enabling the Apple Business Manager. Related documentation: MDM: Apple Device Enrollment (BETA) | ||||||||||||
AAD | "Azure Active Directory" | ||||||||||||
AAP | "Android Application Package" | ||||||||||||
AD | "Active Directory" | ||||||||||||
ADB | "Android Debug Bridge" Related documentation: Android Debug Bridge (adb) | Android Studio | Android Developers (external) | ||||||||||||
ADE | "Automated Device Enrollment" is used for mobile device management when enabling the Apple Business Manager. Related documentation: MDM: Apple Device Enrollment (BETA) | ||||||||||||
ADK | "Assessment and Deployment Kit" | ||||||||||||
AES | "Advanced Encryption Standard" Related documentation: Credential Exchange: FAQ | ||||||||||||
AFC | "Ask for Confirmation" is an option that prompts the end user for permission before a technician initiates a remote session to their device. | ||||||||||||
AMAPI | "Android Management Application Programming Interface" | ||||||||||||
API | "Application Programming Interface" | ||||||||||||
APNS | "Apple Push Notification Server" Apple specific requirement for using push notifications within the app. | ||||||||||||
APT | "Advanced Package Tool" | ||||||||||||
ARM | "Advanced RISC Machines" is a family of RISC instruction set architectures (ISAs) for computer processors. | ||||||||||||
AWS | "Amazon Web services" is what NinjaOne uses to store data. | ||||||||||||
BAA | "Business Associate Agreement" is a legal contract related to HIPAA enforcement. | ||||||||||||
BIOS | "Basic Input Output System" Alternative acronyms: SMBIOS (System Management BIOS) | ||||||||||||
CD | "Change Directory" is used with CMD shell scripts and batch files. Also known as "chdir". | ||||||||||||
CFS | "Common File System" | ||||||||||||
CLI | "Command Line Interface" Related documentation: Command Line Interface (CLI) | ||||||||||||
CMD | "Command Prompt" Related documentation: Command Line Interface (CLI) and Branding: Systray Icon | ||||||||||||
CPU | "Central Processing Unit" | ||||||||||||
CRM | "Customer Relationship Management" | ||||||||||||
CRUD | "Create, Read, Update, and Delete" Related documentation: NinjaOne Public API Operations | ||||||||||||
CSP | "Cloud Service Provider" | ||||||||||||
CVE | "Common Vulnerabilities and Exposures" | ||||||||||||
CVSS | "Common Vulnerability Scoring System"
| ||||||||||||
DFS | "Depth-First Search" or "Distributed File System" | ||||||||||||
DHCP | "Dynamic Host Configuration Protocol" | ||||||||||||
DLP | "Data Loss Protection" or "Data Loss Prevention" Related documentation: Backup | ||||||||||||
DMG | "Disk Image File" Resource: How to open a Mac DMG file in Windows | AppleInsider (external) | ||||||||||||
DNF | "Dandified"; the next generation version of YUM | ||||||||||||
DNS | "Domain Name System" | ||||||||||||
DPC | "Deferred Procedure Calls" | ||||||||||||
DTO | "Data Transfer Object" | ||||||||||||
DUNS | "Data Universal Numbering System" Used for mobile device management when enabling the Apple Business Manager. | ||||||||||||
EDR | "Endpoint Detection and Response" | ||||||||||||
Enum | "Enumerated Type" User-defined data or value type defined by a set of named constants. Used in scripting, API or programming (C#, C++). | ||||||||||||
EPP | "Endpoint Protection Platform" | ||||||||||||
ESXi | "Elastic Sky X Integrated" (Formerly ESX) VMware operating system that deploys and serves virtual computers. See VMware Monitoring. | ||||||||||||
FRP | "Factory Reset Protection" | ||||||||||||
GA | "General Availability" Feature is available to all customers in production and not in beta. | ||||||||||||
GPO | "Group policy object" Refers to a collection of Group Policy configurations defined in Active Directory. | ||||||||||||
GSM | "Global System for Mobile Communication" | ||||||||||||
HDD | "Hard Disk Drives" | ||||||||||||
HIPAA | "Health Insurance Portability and Accountability Act" of 1996 Related documentation: CDC | Public Health Professionals Gateway | ||||||||||||
HTTP | "Hypertext Transfer Protocol" (deprecated in favor of HTTPS) | ||||||||||||
HTTPS | "Hypertext Transfer Protocol Secure" (HTTP, but encrypted for security) | ||||||||||||
IaaS | Infrastructure as a Service" | ||||||||||||
IAM | "Identity and Access Management" is used to control who is authenticated (signed in) and authorized (has permissions) to use resources. Related documentation: System for Cross-domain Identity Management (SCIM) | ||||||||||||
IdP | "Identity Provider" service that stores and manages users' digital identities | ||||||||||||
IDS | "Intrusion Detection System" | ||||||||||||
IMEI | "International Mobile Equipment Identity" | ||||||||||||
IP | "Internet Protocol" | ||||||||||||
ISO | "International Standards Organization" | ||||||||||||
JSON | "A lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language Standard ECMA-262 3rd Edition - December 1999." from: www.json.org | ||||||||||||
LAN | "Local Area Network" | ||||||||||||
LibTIFF | A library for reading and writing Tag Image File Format (TIFF) files. | ||||||||||||
MASQ | A software suite that provides private browsing experience. Related documentation: What is MASQ Network? | MASQ Network | ||||||||||||
MFA | "Multi-Factor Authentication" Related documentation: Multi-Factor (2-Factor) Authentication | ||||||||||||
MBR | "Master Boot Record" | ||||||||||||
MDM | "Mobile Device Management" Related documentation: Mobile Device Management (MDM) (BETA) | ||||||||||||
MDR | "Managed Detection & Response" | ||||||||||||
MFA | "Multi-Factor Authentication" | ||||||||||||
MIB | "Management Information Base" is a collection of info available for a device, comprised of OIDs. | ||||||||||||
MSI | "Microsoft Installer" is an installer package file format used by Windows. | ||||||||||||
MSP | "Managed Service Provider" | ||||||||||||
MSSP | "Managed Security Service Provider" | ||||||||||||
NAS | "Network Attached Storage" Related documentation: NinjaOne Backup: Network Storage | ||||||||||||
NAT | "Network Address Translation" | ||||||||||||
NDP | "NinjaOne Data Protection" | ||||||||||||
NFC | "Near-field Communication" | ||||||||||||
NIC | "Network Interface Card" | ||||||||||||
NMS | "Network Management System" Related documentation: NMS and Network Discovery — Resource Catalogue | ||||||||||||
NTFS | "New Technology File System" Proprietary journaling file system developed by Microsoft. | ||||||||||||
OAuth | "Open Authorization" Industry-standard protocol for authorization. | ||||||||||||
OEM | "Original Equipment Manufacturer" | ||||||||||||
OID | "Object Identifier" A unique identifier for a particular object or data metric. | ||||||||||||
OOB | "Out of the Box" Related documentation: What is Mobile Device Management (MDM) | ||||||||||||
OS | "Operating System" | ||||||||||||
OST | "Offline Storage Table" An offline Microsoft Outlook data file used to store email messages. Related documentation: Announcement: New and Updated Scripts — June 2024 | ||||||||||||
OU | "Organizational Unit" | ||||||||||||
PKG | "Package" is the configuration PKG file format is used for several file formats that contain packages of software and other files to be installed; the contents can be extracted and installed using the Apple Installer. | ||||||||||||
PHI | "Personal Health Information" | ||||||||||||
QR | "Quick Response" code; machine readable. | ||||||||||||
PaaS | "Platform as a Service" | ||||||||||||
PSA | "Professional Services Agreement" software | ||||||||||||
PSK | "Pre-Shared Key" | ||||||||||||
RAID | "Redundant Array of Independent Disks" | ||||||||||||
RBAC | "Role-Based Access Control" | ||||||||||||
RDP | "Remote Desktop Protocol" is used for communication between the terminal server and the terminal server client. | ||||||||||||
RDS | "Remote Desktop Services" or "Amazon Relational Database Service" | ||||||||||||
REST | "Representational State Transfer client" | ||||||||||||
RMM | "Remote Monitoring and Management" | ||||||||||||
RPM | Originally "Red Hat Package Manager" this is a file format (.rpm) and package manager program. | ||||||||||||
SaaS | "Software as a Service" | ||||||||||||
SAM | "Single App Mode" (or Kiosk Mode) Related documentation: What is Mobile Device Management (MDM) | ||||||||||||
SAML | "Security Assertion Markup Language" is an authentication protocol used to confirm digital identities for accessing SaaS applications. This is a form of Single Sign On. See SAML/SSO. | ||||||||||||
SAN | "Storage Area Network" Related documentation: Health Statuses: FAQ | ||||||||||||
SDK | "Software Development Kit" A collection of software tools to install a package. Related documentation: Bitdefender SDK: Integration Guide | ||||||||||||
SIEM | "Security Information and Event Management" Related documentation: NinjaOne Backup: FAQ | ||||||||||||
SMB | "Server Message Block" | ||||||||||||
SMTP | "Simple Mail Transfer Protocol" | ||||||||||||
SNMP | "Simple Network Monitoring Protocol" | ||||||||||||
SPM | "Service Project Management" or "Strategic Portfolio Management" | ||||||||||||
SQL | "Structured Query Language" | ||||||||||||
SSD | "Solid-State Drive" | ||||||||||||
SSH | "Secure Shell Protocol" | ||||||||||||
SSL | "Secure Socket Layer" | ||||||||||||
SSO | "Single Sign-On" Related documentation: Single Sign-On and Multi-Factor Authentication (SSO & MFA). | ||||||||||||
TCP | "Transmission Control Protocol" | ||||||||||||
Telnet | "Teletype Network" | ||||||||||||
TLD | "Top-level Domain" | ||||||||||||
TLS | "Transport Layer Security" | ||||||||||||
TOTP | "Time-based One-time Password" is an authentication token that generates a one-time password that uses the current time as a source of uniqueness. | ||||||||||||
TPM | "Trusted Platform Module" | ||||||||||||
TTL | "Time to Live" is a limit set on the lifespan or lifetime of data in a computer or network. | ||||||||||||
UAC | "User Account Control" | ||||||||||||
UDF | "User-defined Fields" Related documentation: Custom Fields Types | ||||||||||||
UDP | "User Datagram Protocol" | ||||||||||||
UEFI | "Unified Extensible Firmware Interface" | ||||||||||||
URL | "Uniform Resource Locator" | ||||||||||||
USB | "Universal Serial Bus" | ||||||||||||
UUID | "Universally Unique Identifier" | ||||||||||||
VHDX | "Virtual Hard Disk Drive" Microsoft-specific virtual hard drive formats. | ||||||||||||
VLAN | "Virtual Local Area Network" | ||||||||||||
VM | "Virtual Machine" | ||||||||||||
VMDK | "Virtual Machine Disk" ESXi virtual hard drive format. | ||||||||||||
VNC | "Virtual Network Computing" | ||||||||||||
VSS | "Volume Shadow Copy Service" Refer to this Microsoft documentation (external) for more information. | ||||||||||||
WAMP | "Web Application Messaging Protocol" | ||||||||||||
WAN | "Wide area network" | ||||||||||||
WinPE | "Windows Preinstallation Environment" | ||||||||||||
WMI | "Windows management instrumentation" | ||||||||||||
WPA | "Wi-Fi Protected Access" (sometimes combined with PSK—Pre-Shared Key) | ||||||||||||
WPM | "Windows Patch Management" | ||||||||||||
WSUS | "Windows Server Update Services" Related documentation: How to use patching with a WSUS server | ||||||||||||
WYSIWYG | "What You See is What You Get" | ||||||||||||
XDR | "Extended Detection and Response" | ||||||||||||
YUM | "Yellowdog Updater Modified" |
File Extensions
The following table describes common file types accepted by NinjaOne.
| Term | Definition |
|---|---|
| CAB | "Cabinet" archive file format for Microsoft Windows that stores compressed files in a file library. |
| CSV | "Comma-Separated Values" plain text file that stores data in a tabular format, where each line represents a row and each value within the row is separated by a comma. |
| DOC | "Document" file for Microsoft Word used for various types of written documents. |
| DOCX | "Document" file for Microsoft Word based on the Microsoft Word Open XML format |
| DOT | A file template created by Microsoft Word that contains pre-formatted document settings. |
| HTML | "Hypertext Markup Language" file for creating web pages. |
| ID | Identification |
| JPEG and JPG | "Joint Photographic Experts Group" file for digital images. |
| LOG | Log files are automatically generated to records events from software and operating systems. |
| ODS | "OpenDocument Spreadsheet" is an open-source spreadsheet that stores and formats data in columns and rows. |
| "Portable Document Format" is used to preserve formatting in a read-only file. | |
| PNG | "Portable Network Graphics" is a raster image file that supports lossless data compression and various color modes. |
| PPS and PPSX | "PowerPoint Show" developed by Microsoft PowerPoint that opens directly as a slide show rather than in editing mode. |
| PPT and PPTX | "PowerPoint" is a presentation program developed by Microsoft. |
| RAR | "Roshal Archive Compressed" is a compressed file archiver utility, developed by Eugene Roshal of win.rar GmbH. |
| RTF | "Rich Text Format" supports various font styling options and images. |
| SLDX | Microsoft PowerPoint Open XML slide file used to store individual slides. |
| SMTP | Simple Mail Transfer Protocol |
| TAR | "Tape Archive" file packages multiple files together for easier storage and sharing. |
| TXT | "Text" file format that contains plain text without formatting. |
| VSD and VSDX | "Visio Drawing" file developed by Microsoft Visio, a diagramming and vector graphics application. |
| WBK | "Word Backup" file created by Microsoft Word that contains a backup copy of a Word document. |
| XLS and XLSX | "Excel" file created by Microsoft that uses a workbook format that stores calculation or computation data in a table format. |
| XML | "Extensible Markup Language" file that uses custom tags to describe the structure and features of the document when storing, transmitting, and reconstructing data. |
| ZIP | The ZIP format is used to compress files and reduce storage space. |
Product Terms
| Term | Definition |
|---|---|
Azure Active Directory | A Microsoft technology used to provide SSO, MFA, and other types of access to improve security against cybersecurity attacks. Related documentation: |
Active Directory | A Microsoft technology used to manage users, computers and other devices on a network. It is a primary feature of Windows Server, an operating system that runs both local and Internet-based servers. Related documentation: |
Advanced Package Tool | A collection of tools that work with core libraries to install and manage software packages for Linux devices. Related documentation: Dashboards: Patching Software Inventory |
Agent | The remote tool (service or daemon, depending on the OS) on a device that allows end users to monitor the device's health and activity from the NinjaOne console. Agents that are installed on a device transmit the device's information to the NinjaOne console for monitoring and management. Simply put, it is a type of computer program that acts on behalf of a user or other program. The NinjaOne agent can take action on managed devices based on conditions being triggered or scheduled automations/tasks running. Other delegates can also be instantiated for optional functionality (e.g., VMware). Related documentation: Ninja Agent Installation |
Allowlist | Previously referred to as "whitelist." A security feature that specifies which IP addresses or subnets are permitted to access the system. This is designed to protect against man-in-the-middle attacks while allowing known good IP addresses through uninterrupted. |
Amazon Web Services | Cloud provider used by NinjaOne to host data. Related documentation: Cloud Computing Services - Amazon Web Services (AWS) |
Antivirus/Antimalware | Terms generally used interchangeably to indicate software that can be used to detect and prevent the installation of computer malware and, in some cases, quarantine affected computers or eradicate the malware and restore the operation of the system. Related documentation: |
Application programming interface | Defined rules for software communication; allows applications to communicate with each other and automates workflows between software tools. Related documentation: |
Backup | Data backup is the process of storing a copy of files/data to a separate storage location so that they can be restored in the event the files/data are lost or damaged. Related documentation: NinjaOne Backup |
Basic Input Output System | Firmware that is used to perform hardware initialization and configuration services for operating systems. |
BitLocker | A Windows encryption software designed to protect data for entire volumes. Related documentation: BitLocker/FileVault Encryption Key Management |
Branding | The ability to customize the NinjaOne interface with your own styling elements. Related documentation: |
Breadcrumb navigation | Breadcrumb navigation is used in web design as a secondary path scheme. The trail of text links shows users the path to the page that they are currently on—for example, if you look at the top of this page right above the article title, you will see "NinjaOne Dojo > Documentation > New To NinjaOne > Getting Started". "Getting Started" is the section in which this article is located, which is a subfolder of the NinjaOne Dojo landing page. You can click any of the hypertext links to navigate to that specific folder from this page. |
Central Processing Unit | Also referred to as "central processor" or "main processor", this electronic component executes a sequence of instructions to control various computer program operations. Related documentation: Agents Failing / High CPU / WMI Issues |
Chassis | The device frame or the main supporting structure of a machine. Related documentation: NinjaOne Agent: Advanced Installer Options |
(the) Cloud | An IT paradigm that refers to software and services that run on the Internet, instead of locally on your computer.
NinjaOne is a Cloud application that can be accessed from any device with an internet connection—uses Amazon Web Services (AWS) to host our data. |
Cloud monitors | Cloud monitors are agent-less monitors that are created by sending a request from NinjaOne Amazon servers that query an IP for various services like ping, ports, DNS information etc. Related documentation: Cloud Monitors |
Cloud service provider | A Microsoft-specific term that allows you to manage other tenants. |
Common Vulnerabilities and Exposures | Used with a CVSS to determine security threat levels in relation to patch management. The CVE glossary is maintained by the MITRE Corporation and assigns severity on a scale from 1–10. Related documentation: Dashboards: Patch Management |
Customer relationship management | A software tool that allows MSPs and IT departments to keep track of clients and prospects, as well as their interactions with them. |
Data Protection | Refer to NinjaOne Backup. |
Data Transfer Object | An object that carries data between processes or layers of an application in a computer program to define how data is sent over a network. |
Delegate | Runs in conjunction with the agent and provides optional additional functionality. |
Depth-First Search | An algorithm used to search tree or graph data structures, starting at the root node. |
Device | A machine (e.g., laptop, server, cell phone, etc.) or network that can be monitored remotely through NinjaOne. This is where the agent is installed. NinjaOne’s primary function is to monitor devices. Related documentation: Device Details |
Device Class | Related documentation: Device Roles |
Distributed File System | A file system that affects multiple servers or locations. Allows users to share data by using a Common File System. |
Division | A NinjaOne customer, also may be referred to as customer's data (in code and the databases). A division is the top of a hierarchy and contains organizations, which contain locations, which contain devices. |
Disaster Recovery | A set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the information technology (IT) or technology systems supporting critical business functions as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events; it can therefore be considered a subset of business continuity. Disaster recovery assumes that the primary site is not recoverable for some time and represents a process of restoring data and services to a secondary survived site, which is opposite to the process of restoring back to its original place. Related documentation: Backup |
Domain Name System | Domain names serve as memorizable names for websites, internal devices/hosts, and other services on the Internet. However, computers access Internet devices by their IP addresses. DNS translates domain names into IP addresses, allowing you to access an Internet location by its domain name. Related documentation: Cloud Monitors |
Dynamic Host Configuration Protocol | A network management protocol used on IP networks to automatically assign IP addresses and other communication or network configuration parameters to devices connected on a network. Uses a client–server architecture. |
Encryption | The process of encoding data to prevent unauthorized access during transmission in remote sessions. Related documentation: BitLocker/FileVault Encryption Key Management |
Endpoint | A device that can have an RMM agent installed on it to perform services. Related documentation: |
Endpoint Detection and Response | Considered to be the next level of protection beyond antivirus. Includes antivirus, and also contains many security tools like firewall, whitelisting, monitoring, etc. to provide comprehensive protection against digital threats. Primary purpose of EDR:
|
End User | The primary user of the endpoints/devices that are managed in NinjaOne. The difference between end user and technician in NinjaOne is the level of access and account permissions; an end user may not have configuration abilities, but will be able to use documentation and submit tickets if given access. |
Feature | A piece of functionality that can be enabled or disabled in NinjaOne. |
Firewall | A firewall acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. A firewall can be created using either hardware or software. Many businesses and organizations protect their internal networks using hardware firewalls. Related documentation: |
Friendly Name | A name given to a device that is different from its technical identifier, or a title that helps to easily identify a purpose or use. |
Group Policy Object | Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users. Related documentation: Mass Deployment of NinjaOne Installer. |
Hierarchy | The organizational permission structure within NinjaOne Remote that allows for granular control of settings. Device Overrides > Organization Overrides > Global Settings. |
Host | A network layer device. A computer with a Web server that serves the pages for one or more Web sites or a company that provides hosting service. Related documentation: |
Installer | A software packaged used to install an application or agent. (e.g., NinjaRMM or the NinjaOne Remote Player.) |
Instance | A geographical representation of the platform that can be used externally or internally for the purposes of QA testing, software development and training. An instance may have different versions of a software (such as NinjaRMM) during a release cycle. Related documentation: Whitelist Information. |
International Standards Organization | The ISO is an international standard-setting body composed of representatives from various national organizations, which has its headquarters in Geneva, Switzerland. It was founded in 1947 and promotes worldwide industrial and commercial standards. |
International Mobile Equipment Identity | The unique 15-digit number assigned to authenticated mobile devices running on the GSM network. Related documentation: Mobile Device Management |
Internet Protocol | An identifying numerical label for computers on a network. To be monitored by NinjaOne NMS, the devices must have an IP address assigned. Related documentation: User Login Restriction by IP Address. |
Intrusion Detection System | Monitors network traffic for suspicious activity. It may be comprised of hardware, software, or a combination of the two. IDSes are similar to firewalls but are designed to monitor traffic that has entered a network, rather than preventing access to a network entirely. This allows IDSes to detect attacks that originate from within a network. |
Local area network | A group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area. IT administrators set up LANs so network nodes (endpoints) can communicate and share resources such as printers or network storage. |
Lockhart | The internal code name of NinjaOne's backup product. |
Log | A recorded history of events, actions, or errors within the NinjaOne Remote system, useful for auditing and troubleshooting. |
Managed detection & response | A managed cyber security service that provides intrusion detection of malware and malicious activity in your network and assists in rapid incident response to eliminate those threats with succinct remediation actions. Related to EDR. |
Managed Security Service Provider |
|
Master Boot Record | A type of boot sector that supports partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. |
Mobile device management | Software that allows IT administrators to control, secure and enforce policies on smartphone, tablets, and sometimes laptops. |
Modal window | Similar to a popup window, a modal or "child" window is subordinate to an application's main window. In NinjaOne, modal windows are most often used to change an application's or feature's settings.
|
Near-field communication | A set of communication protocols that allows devices to exchange data over short distances (up to 4 cm or 1.57 in). Related documentation: NinjaOne Mobile App |
Network | A network consists of multiple devices that communicate with one another. It can be as small as two computers or as large as billions of devices. While a traditional network is comprised of desktop computers, modern networks may include laptops, tablets, smartphones, televisions, gaming consoles, smart appliances, and other electronics. |
Network Interface Card | A hardware component that connects a computer to a computer network. |
Node | A link layer device. In a network, a node is a connection point or endpoint for data transmission. While this term is often used synonymously with device, it more properly refers to the abstraction of a device which is stored in the node table. |
OAuth 2.0 | The industry-standard protocol for authorization. OAuth 2.0 focuses on client developer simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and living room devices. Related documentation: API OAuth Token Configuration |
Operating System | The operating system is the software you use (e.g., Mac, Windows, Linux, Android, etc.) to manage your computer hardware and software program services. |
Organization | A container for a group of devices, likely grouped by the Company or Department that the Technician manages. Related documentation: Organizations: Creating and Editing Organizations |
Organizational Unit | Part of the Microsoft Active Directory logical model hierarchy, the OU is a container used to group objects for administrative purposes. |
Patching | The process of applying changes to an application/operating system with the purpose of fixing bugs and making improvements. Patch management is one of the most important processes that is managed by an IT professional, since keeping up to date is the first line of defense against security flaws. NinjaOne provides built-in tools to help automate two different types of patching:
Related documentation: Patch Management |
Ping | An OS tool that tests network connections for data transmissions. Related documentation: |
Player | The independently installed remote agent application used by technicians to establish a remote session into other devices. End users also use the Player when remoting into their managed devices. |
Policy | A set of conditions, scripts, and various settings like patching, remote access, and antivirus which can be collectively applied to a group of devices that are members of that policy. Related documentation: Policies: Create a New Policy Parent Policy vs. Child Policy: Using policy inheritance, you can make a "child" of a "parent" policy. This means that the policy will follow all of the conditions, scheduled scripts, and other settings found in the parent policy, but will also include whatever changes/additions are made to the child policy. This is helpful in situations where you want to set one primary policy template that you can alter for specific client needs, without creating the whole policy from scratch. With the exception of any overrides, changes made to the parent policy also populate down to child policies. |
Port | In the computer world, the term "port" has three different meanings. It may refer to:
|
Port 443 | A universal, secure version of HTTPS for all encrypted traffic on the Web/Internet. |
Professional Services Agreement | The second core tool that all (or most) MSPs use. A PSA helps MSPs organize and deliver on the business side of managed services (customer management, billing, invoicing, marketing, etc.). MSPs need a PSA to help ensure their business operations (everything other than service delivery) run effectively and profitably. Related documentation: PSA articles |
Protocol | A protocol is a standard set of rules that allow electronic devices to communicate with each other. (kind of “language”). These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. |
Redundant array of independent disks | A hardware device or software program used as a type of data storage virtualization technology. Provides protection for stored data and improves access to stored data. RAID can be monitored in NinjaOne through Policies > Activities for Windows devices. Related documentation: |
Releases | A new version of software deployed to end users that includes enhancements and bug fixes. NinjaOne deploys three different types of releases:
Related documentation: Release Notes |
Remote Access | Technicians or end users can view and access their desktop devices remotely. A user connects to a device — which needs to be powered on, and approved for remote access for that user — via remote access on their web portal or mobile app. They need to have a remote access application on their device: see RDP (Remote Desktop Protocol) below for more information and documentation. |
Remote Desktop Protocol/Services |
Related documentation: |
Remote Monitoring and Management |
|
REpresentational State Transfer client | A component of the REST client-server web application architecture. REST architecture is used by developers to access a wide variety of publicly available APIs containing a large amount of data that allows them to build client-server applications. |
Role-Based Access Control | A method of regulating access to system resources based on the roles of individual users within an organization/division. You may see this acronym mentioned when using authentication API tokens. Related documentation: SentinelOne: FAQ |
Router | A router is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection. A router acts like a coin sorting machine, allowing only authorized machines to connect to other computer systems. Most routers also keep log files about the local network activity. |
Screen Blanking | A feature that allows the Player to blank the remote (streamer side) screen during a session for privacy. Related documentation: Remote Access — Resource Catalog |
Scripts | A list of commands executed by a certain program or scripting engine, these files are usually just text documents that contain instructions written in a certain scripting language. NinjaOne supports custom scripts in multiple languages (PowerShell, Batch, JavaScript, ShellScript, and VBScript), which allows you to automate almost any task across Windows/MacOS/Linux. Related documentation: Scripting/Automation |
Secure Shell Protocol | a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. To configure this connection, you can use both command line and graphical interface. |
Server | Computers which serve information, resources, data, or programs to other computers referred to as clients over a network connection. There are many types of server computers:
Technicians can use NinjaOne to monitor Windows, Mac, and Linux servers. In NinjaOne terminology, the server refers to our backend and is written in Java. It is where our business logic lives and is the primary driver of our Web app. |
Server Message Block | A network file sharing protocol, and as implemented in Microsoft Windows is known as Microsoft SMB Protocol. Reference: Microsoft SMB Protocol and CIFS Protocol Overview - Win32 apps | Microsoft Learn |
Session Recording | The option to record remote sessions for later review or compliance purposes. Related documentation: Remote Access — Resource Catalog |
Simple Mail Transfer Protocol | Responsible for sending, receiving and relaying outgoing mail between email senders and receivers. |
Simple Network Monitoring Protocol | An application-layer protocol for monitoring and managing network devices on a LAN. Provides network devices such as routers, servers and printers with a common language for sharing information with an NMS. |
Secure Socket Layer | A computing protocol that encrypts data sent through the Internet. |
Shard | Used in Site Reliability Engineering (SRE) terminology. The process of sharding separates datasets into different databases. The word “Shard” means “a small part of a whole." |
SOCKS5 | SOCKS is a computer network protocol for circuit-level gateways that exchanges network packets between clients and servers through a proxy. SOCKS5 adds options for authentication and support for IPv6 and UDP. Related documentation: NinjaOne Remote: Set up, Download and Install |
Software as a Service | SaaS is a centrally hosted software licensing model that allows customers to use the software on a subscription basis. Benefits over traditional on-premises software includes (but is not limited to) on-demand deployment and regular releases for new features and improvements, greater scalability and flexibility with application integrations, and lower costs. |
Streamer | The process running on the endpoint device that streams the device's screen and other data to the technician during a remote session. |
Structured Query Language | Standard language used for querying stored information in a relational database. |
Switch | A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can have more than 50 ports and often are rack mounted. |
Syslog | A standardized way of collecting event logs for devices, syslog is the protocol that is used to send messages. Typically, a server is responsible for aggregating those logs, and then subsequently providing alerts. Related documentation: NMS: Device Roles and Policies. |
System Administrator | This is a super user who has unrestricted access to all devices, applications, and settings in NinjaOne. When a user first creates a new Division (i.e., environment), that user is granted the system administrator role. This role can be assigned to additional technicians. |
Systray | System tray that is part of the taskbar in Windows/MacOS/Linux. Within NinjaOne, this is a branding system setting in Administration. Related documentation: |
Technician | This user is responsible for managing devices/tickets inside the NinjaOne console. They can be given global access to all organizations/devices or they can be restricted to specific organizations. Related documentation: Create a Technician |
Teletype Network | A client/server application protocol that provides access via LAN or Internet to virtual or remote systems that are running the telnet server service. Related documentation: Telnet | Microsoft Learn. |
Ticketing | Tickets are requests for IT teams to perform a task or remediate an issue. A ticketing tool allows IT teams to accept, prioritize, respond to, and manage these requests. Related documentation: Ticketing. |
Toast Message/Notification | Text that displays as a popup window to provide alerts, instructions, or other forms of communication on a screen. |
Top-level Domain | The highest level in the Domain Name System (DNS) of the Internet after the root domain, or the last segment of a domain name after the punctuation (e.g., com, org, net, etc.). |
Transmission Control Protocol | A standard communication protocol for reliable data transmission between network devices, ensuring all data packets arrive in order. By default, NinjaOne Remote uses a hybrid TCP/UDP transmission to provide a balanced and effective stream. Requires an established connection on an IP network. |
Transport Layer Security | A cryptographic protocol that provides secure communication over a computer network. |
Trusted Platform Module | A TPM is a security processor that is usually automatically installed on Windows PCs. It is a secure way to provide additional encryption for your device. You can learn more about this feature from Microsoft. Related documentation: Additional Filters for Device Search. |
Unified Extensible Firmware Interface | Specifies the requirements of the firmware used for booting the computer hardware and its interaction with the operating system. Can replace traditional BIOS. |
Uniform Resource Locator | A URL is the address of a specific webpage or file on a network. |
Universal Serial Bus | The industry standard for data exchange through connection of peripherals to personal computers. |
Universally Unique Identifier | This is a specific form of identification value that is completely unique with a virtually negligible chance of being identical. These also may be referred to as "GUID" (Globally Unique Identifier) by services such as Microsoft. You can learn more by referring to this documentation from the Internet Engineering Task Force (IETF). |
User Account Control | A security feature in Windows operating systems designed to prevent unauthorized changes to the system. UAC prompts users for administrative approval when performing tasks that could affect system stability or security, such as installing software or changing settings. Related documentation: Automation Library: Template Scripts |
User Datagram Protocol | A communication protocol used for time-sensitive transmissions like video playback, utilized in remote sessions for faster data transfer. By default, NinjaOne Remote uses a hybrid TCP/UDP transmission to provide a balanced and effective stream. UDP can be disabled via NinjaOne Remote advanced settings. |
UDP Hole-punching | A technique used to establish bidirectional UDP connections between Internet hosts in private networks that use network address translators. |
Virtual Local Area Network | VLANs are assigned an identifier and operate as an abstraction layer on top of physical hardware. Very often they are used for logical segregation of different types of network traffic. Related documentation: Agent FAQs. |
Virtual Machine | Emulation of a computer system.
VMWare and Hyper-V are both hypervisors, which is a specialized type of software that allows IT professionals to create virtual computer environments etc. NinjaOne supports management of both VMWare and Hyper-V hypervisors and their virtual guest machines (virtual hosts). Related documentation: Virtual Monitoring |
Virtual Network Computing | A graphical desktop-sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. |
Web Application Messaging Protocol | WAMP is an open standard WebSocket subprotocol that provides two application messaging patterns in one unified protocol. Related documentation: The WebSocket Protocol | Datatracker Internet Engineering Task Force (IETF) and WebSocket Protocol Registries | IANA.org |
Web-based software | Also known as "Webapp". Software you use over the internet with a Web browser (NinjaOne's app is an example of this).
|
Webhook | A method of communication/callbacks between web applications. Webhooks allow you to send data and notifications for specified events. Related documentation: Notification Channels. |
Wide area network | A wide area network is not limited to a single area but spans multiple locations. WANs are often comprised of multiple LANs that are connected over the Internet. A company WAN, for example, may extend from the headquarters to other offices around the world. |
Windows Management Implementation | The purpose of WMI is to define a proprietary set of environment-independent specifications which allow management information to be shared between management applications. Related documentation: Agents Failing / High CPU / WMI Issues |
Windows server update services | Using a WSUS server with NinjaOne’s Windows patch management enables you to have your devices reach out towards your WSUS server instead of downloading the updates directly from Microsoft. Related documentation: |
Yellowdog Updater Modified | A command-line tool for installing, patching, and removing software packages on Linux devices using the RPM Package Manager. Related documentation: Dashboards: Patching Software Inventory |
Automation Library Descriptions
Refer to the table below for definitions of acronyms used in NinjaOne's template scripts.
| Term | Definition |
|---|---|
| Active Directory (AD) | A Microsoft technology used to provide SSO, MFA, and other types of access that improve security against cybersecurity attacks. Refer to the following articles for more information: |
| Blue Screen of Death (BSOD) | Microsoft Windows and ReactOS display a critical error screen if a serious issue causes an unexpected shutdown and restart. Also known as a "blue screen error" or a "STOP code error." |
| Common Information Model (CIM) | A CIM session is a type of connection to a local or remote computer using PowerShell. The connection remains dormant until a command is issued, at which point it connects to retrieve the results before disconnecting from the remote system. |
| Cmdlet | Within PowerShell, this single command attribute performs an action and returns an object to the next command in the pipeline or queue. |
| Group Policy Object (GPO) | Microsoft's Group Policy Object is a collection of group policy settings that defines what a system will look like and how it will behave for a defined group of users. Refer to Mass Deployment of NinjaOne Installer for more information. |
| HKEY_LOCAL_MACHINE (HKLM) | A Microsoft Windows Registry root key for system configuration settings. |
| Internet Group Management Protocol (IGMP) | IGMP is a network-layer protocol that uses hosts and routers to create a multicast group. |
| International Organization for Standardization (ISO) | The ISO is an international standard-setting body composed of representatives from various national organizations. Its headquarters are in Geneva, Switzerland. Founded in 1947, the ISO promotes worldwide industrial and commercial standards. |
| Lan Manager (LM0 | A LAN Manager is an IT professional that responsible for managing a company's local area network (LAN) |
| Message-Digest Algorithm 5 (MD5) | MD5 is the name of a message-digest algorithm and cryptographic hash function used to encode sensitive information. For more information, refer to MD5 Class (System.Security.Cryptography) | Microsoft Learn (external link) . |
| Microsoft Management Console (MMC) | A MMC is a centralized graphical framework within Microsoft Windows that lets administrators manage computers and network components. Refer to What is MMC - Windows Server | Microsoft Learn(external link) for more information<>. |
| Network Basic Input/Output System (NetBIOS) | NetBIOS is a network function for Microsoft Windows servers that allows applications on separate endpoints to communicate over a LAN. |
| Microsoft .NET Framework 4 (NetFx4) | NetFx4 is a legacy software development platform released by Microsoft in 2010. NetFx4 provides the runtime environment and libraries required to run certain applications on Windows. For more information, refer to Microsoft .NET Framework 4.6 (Offline Installer) | Official Microsoft Download Center (external link). |
| New Technology LAN Manager (NTLM) | NTLM is a suite of Microsoft security protocols providing authentication, integrity, and confidentiality for Windows systems. NTLM primarily serves as a single sign-on (SSM) tool. For more information, refer to NTLM Overview | Microsoft Learn (external link) |
| Offline Storage Table (OST) | OST files are where Microsoft Outlook stores information for accounts. Refer to Introduction to Outlook Data Files (.pst and .ost) - Microsoft Support (external link) for more information. |
| Potentially Unwanted Applications (PUA) | PUAs are software that may not be explicitly malicious, but may negatively impact device performance, user experience, or system integrity. For more information, refer to Protect your PC from potentially unwanted applications - Microsoft Support (external link) |
| Remote Server Administration Tool (RSAT) | RSAT is a suite of utilities that let IT administrators remotely manage Windows Server roles. For more information, refer to Download RSAT for Windows 10 from the Official Microsoft Download Center (external link). |
| Secure Socket Layer (SSL) | SSL is a protocol for authenticating and encrypting links between networked computers. This protocol was deprecated with the release of TLS in 1999. |
| Server Message Block (SMB) | The Microsoft SMB Protocol is a network file sharing protocol implemented in Microsoft Windows. For more information, refer to Microsoft SMB Protocol and CIFS Protocol Overview - Win32 apps | Microsoft Learn (external link) |
| Toast message | Toast message is a feedback message that displays on your computer without interrupting running applications. Refer to Toast notifications - Windows apps | Microsoft Learn (external link) for more information. |
| Transport Layer Security (TLS) | TLS is the standard cryptographic protocol for providing secure encrypted communication over a network. TLS is the successor to SSL. |
| User Account Control (UAC) | User Account Control is a Windows security feature designed to protect the operating system from unauthorized changes. For more information, refer to User Account Control - Windows Security | Microsoft Learn (external link). |
| Universal Plug and Play (UPnP) | UPnP is a set of protocols that allow networked devices to discover each other over the network and establish a connection. For more information, refer to Overview of UPnP Architecture - Win32 apps | Microsoft Learn (external link). |
Available Integration and Feature Descriptions
The following includes all applications, including integrated third-party applications, within NinjaOne that are generally available (i.e., not in beta or early access).
| Integration | Description |
|---|---|
Accelo | Type: PSA Provides automations and notifications on a cloud-based platform. |
Autotask | Type: PSA Autotask is a Datto/Kaseya tool on a centralized cloud-based platform that helps to organize business operations and workflows. |
Bitdefender GravityZone | Type: Antivirus Provides integrated entry-level anti-malware solutions. Deploy, alert, and remediate threats in NinjaOne. |
Cloudberry | Type: Data Protection/Backup Provides users the ability to speed up the backup process, significantly reduce the amount of data moved into storage, and prevent loss of valuable data. |
ConnectWise | Type(s): PSA and Remote Access The ConnectWise Control (ScreenConnect) integration allows you to seamlessly initiate remote connections via your existing ConnectWise Control account without having to leave your NinjaOne console. |
ITGlue | Type: Documentation An integration with NinjaOne that allows users to automatically sync critical endpoint data, including device details, from Ninja into IT Glue. |
NinjaOne Assist | Type: Mobile App The application currently targeted for end users. Sometimes referred to as N1 Assist, N1A, or the Companion App. This application will eventually provide a technician experience and will replace the current Technician App (NinjaOne Mobile). |
NinjaOne Remote | Type: Remote Access A proprietary remote access product built by NinjaOne. This product allows users to remotely access servers, workstations, and mobile devices. |
Quick Connect | Also known as 'Share my screen' inside the N1 Assist app. Technically a form of remote access for mobile, this allows a technician to connect to non-managed devices such as servers, computer, and mobile devices. Related documentation: NinjaOne Remote: Quick Connect |
RepairShopr | Type: PSA RepairShopr is an all-in-one system that integrates tickets, CRM, invoices, and marketing into a platform designed for repair shops. |
SentinelOne | Type: Antivirus Also known as "S1", SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. You can review additional SentinelOne resources here. |
Splashtop | Type: Remote Access Integrated, secure, one-click remote access solution. |
TeamViewer | Type: Remote Access Integrated, secure, one-click remote access solution. |
Webroot | Type: Antivirus Integrated entry-level anti-malware solution. Deploy, alert, and remediate threats in NinjaOne.
Related documentation: Webroot. |
Icons and Visual Aids
Icons may have different names across the world. In this section, we outline the names for the icons used in the NinjaOne platform. For a list of health icons and their meanings, please see Health Statuses.
| Image | Name and Purpose |
|---|---|
![]() | "System Dashboard" Found in the main left navigation pane and on the System Dashboard page. |
| "Organization" Found on an organization dashboard next to the organization name. | |
![]() | "Favorite" or "Star" Adds the dashboard, page, or file under the Favorites section on the left navigation pane. When activated, the icon displays a solid yellow color. ![]() |
![]() | "Action" or "Play" Shows additional actions or functionality. |
![]() | "Tooltip" Hover your cursor (mouse pointer) over the icon to see helpful information. |
![]() | "Magnifying glass" or "Search" Highlights search fields; find data by keyword or title. |
| "Refresh" Updates the page or table to reflect the most recent data. | |
![]() | "Help resource" or "Help link" Click to navigate to NinjaOne Dojo help guides or other resources. |
| "Export" Download the data to a CSV Excel file or Adobe PDF. | |
| "Gear" or "Table settings" Filter, sort, or order the data; add or remove columns. Identifies the Administration section in the left navigation pane. | |
![]() ![]() | "Caret" Identifies a dropdown or the ability to expand a section to see more options. |
![]() | "Actions" Shows additional actions or functionality. |
![]() | "Create" Adds a new entry. |
![]() | "Edit" Edits or updates a document. |
![]() | "Folder" Identifies a folder (one or more documents) for the NinjaOne Documentation app. |
![]() | "File" Identifies a file (single document) for the NinjaOne Documentation app. |
![]() | "Summary Report" Identifies the Reporting dashboard and all summary reports. |
![]() | "Data Table Report" Identifies data table reports on the Reporting dashboard. |
![]() | "Software" Identifies software tasks and activity. |
![]() | "Remote Desktop" Identifies RDP tasks and activity. |
![]() | "TeamViewer" Identifies TeamViewer tasks and activity. |
![]() | "Remote" Identifies NinjaOne Remote tasks and activity, and the Quick Connect dashboard. |
![]() | "OS Patching" Identifies patching tasks and activity. |
![]() | "Policy" Identifies policy tasks and activity. |
![]() | "Backup" or "NMS" Identifies backup tasks and activity or VMware devices. |
![]() | "ConnectWise Control" Navigates the user to the ScreenConnect login page when ConnectWise is enabled. |
![]() | "Windows workstation" Identifies a device as a Windows workstation. |
![]() | "Cloud monitor" Identifies a device as a cloud monitor target. |
| "Linux" Identifies a device as a Linux workstation. | |
| "Apple" or "Mac" Identifies a device as an Apple product (mobile or desktop). | |
![]() | "Recents" Shows all recently visited pages in NinjaOne from the left navigation pane. |




























Related documentation: