Glossary
Estimated reading time: 6 minutes
A
AACA | ASD Approved Cryptographic Algorithm |
ABAC | As Built As Configured |
ACL | Access Control List |
ACSC | Australian Cyber Security Centre |
AD | Active Directory |
ADFS | Active Directory Federation Services |
ADMX | Administrative Template XML Based |
AES | Advanced Encryption Standard |
AGSVA | Australian Government Security Vetting Agency |
AIP | Azure Information Protection |
APAC | Asia-Pacific |
API | Application Programming Interface |
APP ID | Application Identifier |
ARM | Azure Resource Manager |
ASD | Australian Signals Directorate |
ASR | Attack Surface Reduction |
ATP | Advanced Threat Protection |
AUPDNS | Australian Protective Domain Name Service |
Autodiscover for Exchange | The Exchange Autodiscover service provides an easy way for client applications to configure itself with minimal user input |
Autorun | Autorun shows which programs are configured to run during system bootup or login and when users start various built-in Windows applications like Internet Explorer, Explorer and media players |
AWS | Amazon Web Services |
B
BAU | Business as Usual |
BIOS | Basic Input Output System |
Bitlocker | BitLocker is a Windows encryption technology that protects data from unauthorized access by encrypting a drive and requiring one or more factors of authentication before it will unlock |
BYOD | Bring Your Own Device |
C
CAS | Client Access Services |
CASB | Cloud Access Security Broker |
CEF | Common Event Format |
CIEM | Cloud Infrastructure Entitlements Management |
CISO | Chief Information Security Officer |
Checkm8 | Checkm8 is a jailbreak exploit for iOS devices. |
CNAME | Canonical Name |
CPU | Central Processing Unit |
CRM | Customer Relationship Management |
CSM | Compatibility Support Module |
CSV | Comma Separated Values |
D
Dataverse | Microsoft Dataverse is a secure and scalable low-code data platform. |
DEM | Device Enrolment Manager |
DEP | Device Enrolment Program |
DLP | Data Loss Prevention |
DKIM | Domain Key Identified Mail |
DMA | Direct Memory Access |
DMARC | Domain-based Message Authentication, Reporting and Conformance |
DNS | Domain Name System |
DTA | Digital Transformation Agency |
E
EDR | Endpoint Detection and Response |
ELAM | Early Launch Anti-Malware |
EMET | Enhanced Mitigation Experience Toolkit |
EMS | Enterprise Mobility and Security |
Entra | Microsoft’s identity and network access management solution |
Entra ID | Entra Identification; formerly known as Azure Active Directory |
ETW | Event Tracing for Windows |
EXODS | Exchange Online Directory Services |
F
FIDO | FIDO Authentication, developed by the FIDO Alliance, is a global authentication standard based on public key cryptography |
FIPS | Federal Information Processing Standard is a US and Canadian government standard that specifies the security requirements for cryptographic modules that protect sensitive information |
FSLogix | FSLogix is a profile management solution used to apply personalisation to user sessions for application and desktop virtualisation technologies such as Citrix and Microsoft Azure AVD (Azure Virtual Desktop) and enable “roaming profiles” |
FQDN | Fully Qualified Domain Name |
FTP | File Transfer Protocol |
G
GAL | Global Address List |
GCP | Google Cloud Platform |
GDPR | General Data Protection Regulation |
GIF | Graphics Interchange Format |
GIPHY | An online database and search engine that enables users to search for and share animated GIF files |
GMT | Greenwich Mean Time |
GPO | Group Policy Object |
H
HDD | Hard Disk Drive |
HIPS | Host-based Intrusion Protection System |
HMAC | Hash-based Message Authentication Code |
HSTI | Hardware Security Testability Specification; protects against misconfiguration of security features on Windows devices |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
I
IAM | Identity Access Management |
ICAP | Internet Content Adaption Protocol |
ICT | Information and Communications Technology |
IIS | Internet Information Services |
IM | Instant Messaging |
IMAP | Internet Message Access Protocol |
InfoSec | Information Security |
Intune | Microsoft Intune is a cloud-based endpoint management solution |
IPMI | Intelligent Platform Module Interface |
IRAP | InfoSec Registered Assessors Program |
ISM | Information Security Manual |
ISO | International Standards Organisation |
ITSA | Information Technology Security Advisor |
J
JIT | Just in Time |
JPG JPEG | Joint Photographic Experts Group |
K
Keychain | Apple’s password and account management solution |
KMS | Key Management Services |
L
LAN | Local Area Network |
LAPS | Local Administrator Password Solution |
LDAP | Lightweight Directory Access Protocol |
LOB | Line Of Business |
Lockbox | Customer Lockbox is a means to ensure Microsoft is restricted from accessing an organisation’s content without explicit approval from an authorised organisation representative |
LSA | Local Security Authority |
LTSC | Long-Term Servicing Channel |
Lync | Microsoft Lync is a instant messaging (IM), audio and video call solution |
M
MAK | Multiple Activation Key |
MAM | Mobile Application Management |
MCAS | Microsoft Cloud App Security |
MDM | Mobile Device Management |
MDVM | Microsoft Defender Vulnerability Management |
MECM | Microsoft Endpoint Configuration Manager |
MEM | Microsoft Endpoint Manager |
MFA | Multi-Factor Authentication |
MIM | Microsoft Identity Manager |
MPIP | Microsoft Purview Information Protection |
MPIM | Microsoft Privileged Identity Management |
MSDT | Microsoft Support Diagnostic Tool |
MS-DRS | Microsoft Directory Replication Service |
MSIX | MSIX is a Windows app package format that provides a modern packaging experience to all Windows apps |
N
NCCE | Non-Corporate Commonwealth Entity |
NNR | Network Name Resolution |
NTLM | New Technology LAN Manager |
O
OAB | Offline Address Book |
OATH | Open Authentication |
OAUTH | Open Authentication |
OEM | Original Equipment Manufacturer |
OSPF | Open Shortest Path First |
OTP | One-Time Password |
OWA | Outlook on the Web |
P
Passwordless | Passwordless authentication is a means to verify a user’s identity, without using a password |
Portable Document Format | |
PEM | Privacy Enhanced Mail |
PHS | Password Hash Synchronisation |
PII | Personally Identifiable Information |
PIM | Privileged Identity Management |
PIN | Personal Identification Number |
PNG | Portable Network Graphics |
POP | Post Office Protocol |
PSPF | Protective Security Policy Framework |
PST | Personal Storage Table |
PSTN | Public Switch Telephone Network |
PTA | Pass-Through Authentication |
Q
- | - |
R
RAM | Random Access Memory |
RBAC | Role Based Access Control |
RDP | Remote Desktop Protocol |
REST | Representational State Transfer |
RFC | Request for Comment |
RHEL | Red Hat Enterprise Linux |
RPO | Recovery Point Objective |
RTO | Recovery Time Objective |
S
SAN | Subject Alternate Name |
SAW | Secure Admin Workstation |
SCCM | Microsoft System Center Configuration Manager |
SCIM | System for Cross-domain Identity Management |
SEM | Security Event Management |
SEHOP | Structured Exception Handling Overwrite Protection |
SIEM | Security Information and Event Management |
SIG | Secure Internet Gateway |
SIM | Security Information Management |
SLA | Service Level Agreement |
SLAT | Second Level Address Translation |
Smartcard | A smart card is a physical card that has an embedded integrated chip that acts as a security token |
SMB | Server Message Block |
SMS | Short Message Service |
SMTP | Simple Mail Transport Protocol |
SOAP | Simple Object Access Protocol |
SOE | Standard Operating Environment |
SPAM | Unsolicited Email |
SPODS | SharePoint Online Directory Services |
SPF | Sender Policy Framework |
SQL | Structured Query Language |
SRMP | Security Risk Management Plan |
SRTP | Secure Real Time Protocol |
SSL | Secure Socket Layer |
SSO | Single Sign On |
SSPR | Self-Service Password Reset |
SVG | Scalable Vector Graphics |
SWIFT | Society for Worldwide Interbank Financial Telecommunication |
T
TCP | Transmission Control Protocol |
TLS | Transport Layer Security |
TOTP | Time-based One-Time Password |
TPM | Trusted Platform Module |
U
UAC | User Access Control |
UDP | User Datagram Protocol |
UEBA | User Entity Behavioural Analytics |
UEFI | Unified Extensible Firmware Interface |
UPN | User Principal Name |
URL | Uniform Resource Locator |
UWP | Universal Windows Platform |
V
VBA | Visual Basic for Application |
VDI | Virtual Desktop Infrastructure |
VIP | Virtual IP address |
VPN | Virtual Private Network |
VSM | Virtual Secure Module |
W
WDAC | Windows Defender Application Control |
WDDM | Windows Display Driver Model |
WIP | Windows Information Protection |
WPAD | Web Proxy Auto-Discovery Protocol |
WSUS | Windows Server Update Services |
X
XML | Extensible Markup Language |
XPS | XML Paper Specification |
Y
- | - |
Z
- | - |