What Is Universal Naming Convention (UNC)? - TechTarget

  • Home
  • IT operations
  • Share this item with your network:
Pat Brans By
  • Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
Published: Feb 13, 2023

What is the Universal Naming Convention (UNC)?

The Universal Naming Convention (UNC) is a standard for naming resources -- such as files and devices -- that are shared by computers on a network.

This standard was originally used by systems running Microsoft operating systems (OSes) and those that needed to share network resources with Microsoft platforms on a local area network. An analogous standard for Unix and Linux systems pre-dates UNC and was designed as an extension of pathnames. Modern Microsoft systems can interpret Unix and Linux pathnames as UNC strings.

UNC was first used on OS/2, an OS designed by Microsoft and IBM. Another term often used for the same concept and using the same abbreviation is Uniform Naming Convention.

The term universal makes the distinction between global and local names. Universal names are interpreted globally; local names are interpreted in a local context. The term uniform is used to emphasize that the same naming convention is used regardless of the type of resource it refers to.

How do you use the Universal Naming Convention?

In Microsoft Windows, a name is specified in a UNC string and adheres to the following format:

\\<server name>\<share point>\<path to resource>

where:

  • <server name> refers to the device that holds the resource.
  • <share point> refers to the shared data area.
  • <path to resource> is the logical directory where the requested information can be found, along with the name of the resource.

In Unix and Linux systems, UNC strings are specified in a slightly different way -- forward slashes are used instead of backslashes.

//<hostname>/<pathname>

where:

  • <hostname> refers to the device that holds the resource.
  • <pathname> refers to the logical directory where the resource can be found, along with the name of the resource. The <pathname> can be pre-fixed with <share point> when the resource is on a Microsoft platform.

History of the Universal Naming Convention

The idea of a standard way of referencing a resource on another computer dates back to at least March 1974, when it was the subject of RFC 615 "Proposed Network Standard Data Pathname syntax." A decade later, the idea was an integral part of engineering workstations, including Apollo Computer Inc., which was later acquired by Hewlett Packard, and Sun, which was later acquired by Oracle Corp. The idea is examined in Chapter 1 of the Domain System User's Guide, which discusses the Unix-like OS for Apollo computers.

The term Universal Naming Convention appears in patent US5363487A, filed by Microsoft in August 1989, and in patent US534199A, filed by IBM in April 1992. In both patents, example use cases mention OS/2, the OS that began as a joint project between Microsoft and IBM. The IBM patent specifically names IBM and Microsoft as co-inventers of the Universal Naming Convention -- and states that other companies, such as Novell, which was later acquired by Micro Focus, implement UNC in their products so third-party DOS and OS/2 applications can request services from their servers.

By 1995, UNC was a native feature of both Windows NT and Windows 95.

Alternatives to UNC

Windows Explorer, the Windows Command Prompt or Windows PowerShell can be used instead of a UNC path to map network drives and access folders on a computer remotely using a drive letter instead of a UNC path.

Learn what UNC path injection is and how a now-patched vulnerability in the Zoom Windows client could have exposed user credentials.

Continue Reading About Universal Naming Convention (UNC)

  • 7 features for managing Windows 10 updates and upgrades
  • Coronavirus: Is Zoom safe and should security teams ban it?
  • VMware vSAN file service introduces NFS, SMB file shares
  • Why move to PowerShell 7 from Windows PowerShell?
  • Critical Windows RPC vulnerability raises alarm

Related Terms

What is a configuration management database? A configuration management database (CMDB) is a file -- usually in the form of a standardized database -- that contains all ... See complete definition What is a standard operating procedure (SOP)? A standard operating procedure is a set of step-by-step instructions for performing a routine activity. See complete definition What is enterprise architecture (EA)? An enterprise architecture (EA) is a conceptual blueprint that defines an organization's structure and operation. See complete definition

New & Updated Definitions

  • What is a data scientist? What do they do?

    A data scientist is an analytics professional who collects, analyzes, and interprets data to transform it into actionable insights that can facilitate decision-making. See More.

  • What is 5G New Radio (5G NR)?
  • What is multi-access edge computing? Benefits and use cases
  • What is 5G?
  • What is a small cell in wireless networks?
  • What is 6G? Overview of 6G networks & technology
  • phase-locked loop (PLL)
  • What is identity and access management? Guide to IAM
  • What are AI agents? Types and examples
Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is multi-access edge computing? Benefits and use cases

    Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...

  • What is 5G?

    Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.

  • What is a small cell in wireless networks?

    A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...

Search Security
  • What is identity and access management? Guide to IAM

    No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...

  • What is data masking?

    Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...

  • What is antivirus software?

    Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...

Search CIO
  • What is a chief data officer (CDO)?

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • What is user-generated content?

    User-generated content (UGC) is published information that an unpaid contributor provides to a website.

  • What is business process outsourcing (BPO)?

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

Search HRSoftware
  • What is compensation management?

    Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...

  • What is HR technology (human resources tech)?

    HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...

  • What is core HR (core human resources)?

    Core HR (core human resources) is an umbrella term that refers to the essential, mandatory and fundamental tasks and functions of...

Search Customer Experience
  • What are virtual agents and how are they being used?

    A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...

  • Customer acquisition cost (CAC): How to calculate and reduce it

    Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...

  • What is direct marketing?

    Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...

Close

Tag » What Is Universal Naming Convention