Browse Definitions :
Definition

Web Proxy Autodiscovery (WPAD)

Web Proxy Autodiscovery (WPAD) is a proposed Internet protocol that allows a client, such as a Web browser or a streaming media application, to automatically locate and interface with cache services in a network so that information can be delivered more quickly to the user. A cache service stores copies of popular Web pages at a location closer to the users, usually on the outer edges of a network, for faster access. When a particular page is requested, the browser is directed to the cache service for that page instead of having to travel through the network to the originating site.

Cache services are maintained and offered by Internet service providers (ISPs) and special cache-providing services such as Akamai. The first WPAD-enabled browser was Internet Explorer 5.0. WPAD is a joint effort of Inktomi, Microsoft, Real Networks, and Sun Microsystems.

When an Internet session is started, the WPAD-enabled client automatically uses Dynamic Host Configuration Protocol (DHCP) to locate a cache service. If unsuccessful, WPAD then uses the Service Location Protocol (SLP). SLP is a protocol that allows network applications to discover the location and configuration of network services in an enterprise. If still unsuccessful, WPAD then searches through domain name system (DNS) records. Once a nearby cache service is located, WPAD automatically connects to that location for related page requests.

This was last updated in September 2005

Continue Reading About Web Proxy Autodiscovery (WPAD)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close