Glossary
Estimated reading time: 6 minutes
A
| AACA | ASD Approved Cryptographic Algorithm |
| ABAC | As Built As Configured |
| ACL | Access Control List |
| ACSC | Australian Cyber Security Centre |
| AD | Active Directory |
| ADFS | Active Directory Federation Services |
| ADMX | Administrative Template XML Based |
| AES | Advanced Encryption Standard |
| AGSVA | Australian Government Security Vetting Agency |
| AIP | Azure Information Protection |
| APAC | Asia-Pacific |
| API | Application Programming Interface |
| APP ID | Application Identifier |
| ARM | Azure Resource Manager |
| ASD | Australian Signals Directorate |
| ASR | Attack Surface Reduction |
| ATP | Advanced Threat Protection |
| AUPDNS | Australian Protective Domain Name Service |
| Autodiscover for Exchange | The Exchange Autodiscover service provides an easy way for client applications to configure itself with minimal user input |
| Autorun | Autorun shows which programs are configured to run during system bootup or login and when users start various built-in Windows applications like Internet Explorer, Explorer and media players |
| AWS | Amazon Web Services |
B
| BAU | Business as Usual |
| BIOS | Basic Input Output System |
| Bitlocker | BitLocker is a Windows encryption technology that protects data from unauthorized access by encrypting a drive and requiring one or more factors of authentication before it will unlock |
| BYOD | Bring Your Own Device |
C
| CAS | Client Access Services |
| CASB | Cloud Access Security Broker |
| CEF | Common Event Format |
| CIEM | Cloud Infrastructure Entitlements Management |
| CISO | Chief Information Security Officer |
| Checkm8 | Checkm8 is a jailbreak exploit for iOS devices. |
| CNAME | Canonical Name |
| CPU | Central Processing Unit |
| CRM | Customer Relationship Management |
| CSM | Compatibility Support Module |
| CSV | Comma Separated Values |
D
| Dataverse | Microsoft Dataverse is a secure and scalable low-code data platform. |
| DEM | Device Enrolment Manager |
| DEP | Device Enrolment Program |
| DLP | Data Loss Prevention |
| DKIM | Domain Key Identified Mail |
| DMA | Direct Memory Access |
| DMARC | Domain-based Message Authentication, Reporting and Conformance |
| DNS | Domain Name System |
| DTA | Digital Transformation Agency |
E
| EDR | Endpoint Detection and Response |
| ELAM | Early Launch Anti-Malware |
| EMET | Enhanced Mitigation Experience Toolkit |
| EMS | Enterprise Mobility and Security |
| Entra | Microsoft’s identity and network access management solution |
| Entra ID | Entra Identification; formerly known as Azure Active Directory |
| ETW | Event Tracing for Windows |
| EXODS | Exchange Online Directory Services |
F
| FIDO | FIDO Authentication, developed by the FIDO Alliance, is a global authentication standard based on public key cryptography |
| FIPS | Federal Information Processing Standard is a US and Canadian government standard that specifies the security requirements for cryptographic modules that protect sensitive information |
| FSLogix | FSLogix is a profile management solution used to apply personalisation to user sessions for application and desktop virtualisation technologies such as Citrix and Microsoft Azure AVD (Azure Virtual Desktop) and enable “roaming profiles” |
| FQDN | Fully Qualified Domain Name |
| FTP | File Transfer Protocol |
G
| GAL | Global Address List |
| GCP | Google Cloud Platform |
| GDPR | General Data Protection Regulation |
| GIF | Graphics Interchange Format |
| GIPHY | An online database and search engine that enables users to search for and share animated GIF files |
| GMT | Greenwich Mean Time |
| GPO | Group Policy Object |
H
| HDD | Hard Disk Drive |
| HIPS | Host-based Intrusion Protection System |
| HMAC | Hash-based Message Authentication Code |
| HSTI | Hardware Security Testability Specification; protects against misconfiguration of security features on Windows devices |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
I
| IAM | Identity Access Management |
| ICAP | Internet Content Adaption Protocol |
| ICT | Information and Communications Technology |
| IIS | Internet Information Services |
| IM | Instant Messaging |
| IMAP | Internet Message Access Protocol |
| InfoSec | Information Security |
| Intune | Microsoft Intune is a cloud-based endpoint management solution |
| IPMI | Intelligent Platform Module Interface |
| IRAP | InfoSec Registered Assessors Program |
| ISM | Information Security Manual |
| ISO | International Standards Organisation |
| ITSA | Information Technology Security Advisor |
J
| JIT | Just in Time |
| JPG JPEG | Joint Photographic Experts Group |
K
| Keychain | Apple’s password and account management solution |
| KMS | Key Management Services |
L
| LAN | Local Area Network |
| LAPS | Local Administrator Password Solution |
| LDAP | Lightweight Directory Access Protocol |
| LOB | Line Of Business |
| Lockbox | Customer Lockbox is a means to ensure Microsoft is restricted from accessing an organisation’s content without explicit approval from an authorised organisation representative |
| LSA | Local Security Authority |
| LTSC | Long-Term Servicing Channel |
| Lync | Microsoft Lync is a instant messaging (IM), audio and video call solution |
M
| MAK | Multiple Activation Key |
| MAM | Mobile Application Management |
| MCAS | Microsoft Cloud App Security |
| MDM | Mobile Device Management |
| MDVM | Microsoft Defender Vulnerability Management |
| MECM | Microsoft Endpoint Configuration Manager |
| MEM | Microsoft Endpoint Manager |
| MFA | Multi-Factor Authentication |
| MIM | Microsoft Identity Manager |
| MPIP | Microsoft Purview Information Protection |
| MPIM | Microsoft Privileged Identity Management |
| MSDT | Microsoft Support Diagnostic Tool |
| MS-DRS | Microsoft Directory Replication Service |
| MSIX | MSIX is a Windows app package format that provides a modern packaging experience to all Windows apps |
N
| NCCE | Non-Corporate Commonwealth Entity |
| NNR | Network Name Resolution |
| NTLM | New Technology LAN Manager |
O
| OAB | Offline Address Book |
| OATH | Open Authentication |
| OAUTH | Open Authentication |
| OEM | Original Equipment Manufacturer |
| OSPF | Open Shortest Path First |
| OTP | One-Time Password |
| OWA | Outlook on the Web |
P
| Passwordless | Passwordless authentication is a means to verify a user’s identity, without using a password |
| Portable Document Format | |
| PEM | Privacy Enhanced Mail |
| PHS | Password Hash Synchronisation |
| PII | Personally Identifiable Information |
| PIM | Privileged Identity Management |
| PIN | Personal Identification Number |
| PNG | Portable Network Graphics |
| POP | Post Office Protocol |
| PSPF | Protective Security Policy Framework |
| PST | Personal Storage Table |
| PSTN | Public Switch Telephone Network |
| PTA | Pass-Through Authentication |
Q
| - | - |
R
| RAM | Random Access Memory |
| RBAC | Role Based Access Control |
| RDP | Remote Desktop Protocol |
| REST | Representational State Transfer |
| RFC | Request for Comment |
| RHEL | Red Hat Enterprise Linux |
| RPO | Recovery Point Objective |
| RTO | Recovery Time Objective |
S
| SAN | Subject Alternate Name |
| SAW | Secure Admin Workstation |
| SCCM | Microsoft System Center Configuration Manager |
| SCIM | System for Cross-domain Identity Management |
| SEM | Security Event Management |
| SEHOP | Structured Exception Handling Overwrite Protection |
| SIEM | Security Information and Event Management |
| SIG | Secure Internet Gateway |
| SIM | Security Information Management |
| SLA | Service Level Agreement |
| SLAT | Second Level Address Translation |
| Smartcard | A smart card is a physical card that has an embedded integrated chip that acts as a security token |
| SMB | Server Message Block |
| SMS | Short Message Service |
| SMTP | Simple Mail Transport Protocol |
| SOAP | Simple Object Access Protocol |
| SOE | Standard Operating Environment |
| SPAM | Unsolicited Email |
| SPODS | SharePoint Online Directory Services |
| SPF | Sender Policy Framework |
| SQL | Structured Query Language |
| SRMP | Security Risk Management Plan |
| SRTP | Secure Real Time Protocol |
| SSL | Secure Socket Layer |
| SSO | Single Sign On |
| SSPR | Self-Service Password Reset |
| SVG | Scalable Vector Graphics |
| SWIFT | Society for Worldwide Interbank Financial Telecommunication |
T
| TCP | Transmission Control Protocol |
| TLS | Transport Layer Security |
| TOTP | Time-based One-Time Password |
| TPM | Trusted Platform Module |
U
| UAC | User Access Control |
| UDP | User Datagram Protocol |
| UEBA | User Entity Behavioural Analytics |
| UEFI | Unified Extensible Firmware Interface |
| UPN | User Principal Name |
| URL | Uniform Resource Locator |
| UWP | Universal Windows Platform |
V
| VBA | Visual Basic for Application |
| VDI | Virtual Desktop Infrastructure |
| VIP | Virtual IP address |
| VPN | Virtual Private Network |
| VSM | Virtual Secure Module |
W
| WDAC | Windows Defender Application Control |
| WDDM | Windows Display Driver Model |
| WIP | Windows Information Protection |
| WPAD | Web Proxy Auto-Discovery Protocol |
| WSUS | Windows Server Update Services |
X
| XML | Extensible Markup Language |
| XPS | XML Paper Specification |
Y
| - | - |
Z
| - | - |