Browse Definitions :
Definition

Universal Naming Convention (UNC)

What is the Universal Naming Convention (UNC)?

The Universal Naming Convention (UNC) is a standard for naming resources -- such as files and devices -- that are shared by computers on a network.

This standard was originally used by systems running Microsoft operating systems (OSes) and those that needed to share network resources with Microsoft platforms on a local area network. An analogous standard for Unix and Linux systems pre-dates UNC and was designed as an extension of pathnames. Modern Microsoft systems can interpret Unix and Linux pathnames as UNC strings.

UNC was first used on OS/2, an OS designed by Microsoft and IBM. Another term often used for the same concept and using the same abbreviation is Uniform Naming Convention.

The term universal makes the distinction between global and local names. Universal names are interpreted globally; local names are interpreted in a local context. The term uniform is used to emphasize that the same naming convention is used regardless of the type of resource it refers to.

How do you use the Universal Naming Convention?

In Microsoft Windows, a name is specified in a UNC string and adheres to the following format:

\\<server name>\<share point>\<path to resource>

where:

  • <server name> refers to the device that holds the resource.
  • <share point> refers to the shared data area.
  • <path to resource> is the logical directory where the requested information can be found, along with the name of the resource.

In Unix and Linux systems, UNC strings are specified in a slightly different way -- forward slashes are used instead of backslashes.

//<hostname>/<pathname>

where:

  • <hostname> refers to the device that holds the resource.
  • <pathname> refers to the logical directory where the resource can be found, along with the name of the resource. The <pathname> can be pre-fixed with <share point> when the resource is on a Microsoft platform.

History of the Universal Naming Convention

The idea of a standard way of referencing a resource on another computer dates back to at least March 1974, when it was the subject of RFC 615 "Proposed Network Standard Data Pathname syntax." A decade later, the idea was an integral part of engineering workstations, including Apollo Computer Inc., which was later acquired by Hewlett Packard, and Sun, which was later acquired by Oracle Corp. The idea is examined in Chapter 1 of the Domain System User's Guide, which discusses the Unix-like OS for Apollo computers.

The term Universal Naming Convention appears in patent US5363487A, filed by Microsoft in August 1989, and in patent US534199A, filed by IBM in April 1992. In both patents, example use cases mention OS/2, the OS that began as a joint project between Microsoft and IBM. The IBM patent specifically names IBM and Microsoft as co-inventers of the Universal Naming Convention -- and states that other companies, such as Novell, which was later acquired by Micro Focus, implement UNC in their products so third-party DOS and OS/2 applications can request services from their servers.

By 1995, UNC was a native feature of both Windows NT and Windows 95.

Alternatives to UNC

Windows Explorer, the Windows Command Prompt or Windows PowerShell can be used instead of a UNC path to map network drives and access folders on a computer remotely using a drive letter instead of a UNC path.

Learn what UNC path injection is and how a now-patched vulnerability in the Zoom Windows client could have exposed user credentials.

This was last updated in February 2023

Continue Reading About Universal Naming Convention (UNC)

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close