The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.
A collection of information about the system. It can include (but is not limited to), information about disk drives, volumes, file systems, network adapters, network properties, drivers, and other system software components. Most BMR operations are performed on configurations. A configuration is the template used to rebuild a protected system.
Follow us for all the latest news, tips and updates.