Term
|
Definition
|
Advanced Threat Protection
|
This technology protects Exchange Online email accounts and SharePoint Online data
files
from viruses and malware. It also deletes email attachments deemed harmful. And finally,
it
blocks any suspicious URLs found in an email (and optionally in an email attachment)
or
SharePoint file, based on its web reputation. This technology is delivered through
the
Advanced Threat Protection Engine. This engine, along with the Data Loss Prevention
Engine
comprise the Cloud Email and Collaboration
Protection Scanning Component.
|
ApplicationImpersonation Role
|
This management role enables applications to impersonate users in order to perform
tasks
on behalf of the user. Cloud Email and Collaboration
Protection uses
ApplicationImpersonation to perform message scanning on individual mailboxes.
ApplicationImpersonation is one of several built-in roles in the Role Based Access
Control
(RBAC) permissions model in Microsoft Exchange Online.
|
Authorized Account
|
An authorized account is an email address that is associated with
an administrator. Through this account, Cloud Email and Collaboration
Protection is
granted the ability to access a protected cloud application or service.
Cloud Email and Collaboration
Protection uses access tokens
to:
|
Business Email Compromise
|
The FBI defines Business Email Compromise (BEC) as
a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments.Formerly known as Man-in-the-Email scams, these schemes compromise official business email accounts to conduct unauthorized fund transfers. For more information, see FBI Public Service Announcement. |
Data Loss Prevention
|
This technology protects Exchange Online email accounts and SharePoint Online data
files
based on specified compliance templates, such as HIPAA and GLBA. This technology is
delivered through the Data Loss Prevention Engine. This engine, along with the Advanced
Threat Protection comprise the Cloud Email and Collaboration
Protection Scanning
Component.
|
Delegate Account
|
A Delegate Account is not associated with an actual person. A Delegate Account is
a tenant account that Cloud Email and Collaboration
Protection requires to integrate with Microsoft 365 services. For Exchange Online, Cloud Email and Collaboration
Protection uses the Delegate Account to access mailbox accounts designated for protection, and
"listens" for arriving email messages. For SharePoint Online and OneDrive, Cloud Email and Collaboration
Protection uses the Delegate Account to access site collections and user profiles designated
for protection, and "listens" for users uploading, creating, synchronizing, or modifying
files.
|
Exchange Admin Center
|
Accessed through the Microsoft 365 admin center (
), this web-based management console is where you manage items related to
email that you cannot manage through the Microsoft 365 admin center. This includes
the
management of recipients, permissions, compliance management, organization, protection,
mail
flow, mobile devices, public folders, and unified messaging. |
Facet
|
A facet is an index field that represents a category that you want to use to refine
and
filter search results. When you submit search requests to Cloud Email and Collaboration
Protection, you can request facet information to narrow a search
to a specific data set.
|
Mailbox Search Role
|
This management role enables administrators to search the content of one or more mailboxes
in an organization. Mailbox Search is one of several built-in roles in the Role Based
Access
Control (RBAC) permissions model in Microsoft Exchange Online.
|
New Role Group
|
A management role group simplifies the assignment of management roles to a group of
users.
All members of a role group are assigned the same set of roles. Role groups are assigned
administrator and specialist roles that define major administrative tasks in Exchange
Online. Role groups enable you to more easily assign a broader set of permissions
to a group
of administrators or specialist users.
|
Microsoft 365 Admin Center
|
Launched from the top left corner of the navigation bar, the admin center is where
you can perform various administrative tasks for Microsoft 365, which include system
setup, reports, email services, users and groups, domains, product subscriptions and
licenses, policies, service support requests, and additional account services requests.
|
New Role Group
|
A management role group simplifies the assignment of management roles to a group of
users.
All members of a role group are assigned the same set of roles. Role groups are assigned
administrator and specialist roles that define major administrative tasks in Exchange
Online. Role groups enable you to more easily assign a broader set of permissions
to a group
of administrators or specialist users.
|
Role Management Role
|
This role enables administrators to manage management role groups; role assignment
policies and management roles; and role entries, assignments, and scopes in an organization.
This role is not required to be assigned to the Delegate Account.
|
Suspicious Objects
|
A suspicious object is a known malicious or potentially malicious IP address, domain,
URL,
SHA-1 value, SHA-256 value, or sender address found in submitted samples. Trend Micro
Threat
Connect correlates suspicious objects detected in your environment and threat data
from
the Trend Micro Smart Protection Network to provide relevant and actionable intelligence.
|
Virtual Analyzer
|
Virtual Analyzer is a cloud-based virtual environment designed for analyzing suspicious
files. Sandbox images allow observation of file behavior in an environment that simulates
endpoints on your network without any risk of compromising the network.
|
Views: