All Terms

A fully-loaded environment

A fully-loaded environment

A "fully-loaded" migration environment has plenty of work to be performed at all stages of the migration and in queue ...
Access Control List

Access Control List

A list of objects allowed access to a resource or other object. Other Names ACL ...
Account Based Marketing (ABM)

Account Based Marketing (ABM)

Account Based Marketing, or ABM, essentially means that you treat an account as a market itself, and you create marketing ...
/ Industry terms, xVerified
Active Directory

Active Directory

A Microsoft application that runs on Windows Server. It's used to manage permissions and access to networked resources. Active Directory ...
Add Your Own Definition

Add Your Own Definition

AYOD, or Add Your Own Definition, is a new term related to this dictionary website. If you find a term ...
/ Industry terms, xVerified
Administrator

Administrator

A role granted to someone who'll oversee the operations within an organization: managing groups, networks, resources, applications, users' access to ...
Adoption

Adoption

For us, adoption means that a user started using an application. This is the first step in a user's journey ...
/ Industry terms, IT, Nova, xVerified
Adoption Accelerator

Adoption Accelerator

This is a Nova service that is used to encourage users to adopt Office 365 applications. For example, I could ...
/ Nova, Quadrotech, xVerified
Adoption goal

Adoption goal

The actions you want a user to perform for them to be considered to have adopted the workload. The user ...
/ Nova, Quadrotech, xVerified
Advanced Encryption Standard

Advanced Encryption Standard

Encryption standard for electronic data Other Names AES AES256 ...
/ Industry terms, IT, xVerified
Advanced Ingestion Protocol

Advanced Ingestion Protocol

This is the name for the technology we use to transfer data into Exchange or another Exchange-like target system (eg ...
Advanced Threat Protocol (ATP)

Advanced Threat Protocol (ATP)

Advanced Threat Protection, or ATP, is an Office 365 security measure protects your organization from potentially malicious threats within email ...
Amazon Web Services

Amazon Web Services

Amazon's cloud platform that provides web application hosting and data storage. A competitor of Microsoft Azure. Other Names AWS Other ...
AP classic role

AP classic role

This role gives a user access to the Nova Delegation & Policy Control (DPC) service (formerly known as Autopilot) ...
/ DPC, Nova, Quadrotech, xVerified
Application Programming Interface

Application Programming Interface

In software development, these are a set of subroutine definitions, communication protocols, and tools. In general terms, it is a ...
Application Programming Interface (API)

Application Programming Interface (API)

You can find more information about API, or Application Programming Interface, here ...
/ Industry terms, xVerified
Application Streaming Wrapper (ASW)

Application Streaming Wrapper (ASW)

The Application Streaming Wrapper (ASW) is designed for environments that utilize virtual application streaming to provide Outlook to users. The ...
Archive

Archive

A journal archive targets a journal mailbox. A journal mailbox typically contains a copy of every message that leaves your ...