Firewall solution that places two firewalls in front of the internal network. This allows for resources to be placed between them in a perimeter network so that external users can access them safely. These types of setups are also known as DMZs.
baseline
Initial sampling of data that is used as a comparison point for troubleshooting system performance.
bastion host
Firewall solution that uses a single firewall in front of the internal network but does not allow for a perimeter network.
Block Inheritance
The method of stopping GPOs from upper levels within the Group Policy hierarchy from being processed unless the upper-level GPOs are enforced.
brute force attack
Attack type that attempts to break the security of a system by continuous attempts at discovering the password or encryption key.