All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A service that is found in Office Communications Server 2007 that enables voice media to be passed through devices that use Network Address Translation (NAT) or firewalls. [Exchange 2007]
- Browse Related Terms: A/V Authentication Service, ASR (Automatic Speech Recognition), Autodiscover service, device password, Direct Push, Exchange ActiveSync, heartbeat interval, IP gateway, remote device wipe, text-to-speech, TTS (Text-to-Speech), VoIP gateway, WebReady Document Viewing
All > Technology > E-mail > Lotus Domino
In a user interface, a key or combination of keys that invokes an application-defined function. For example, ALT+F shows the File menu. In IBM® Lotus® Notes® menus, accelerators are underlined. See also extended.
- Browse Related Terms: accelerator, Adjacent Domain document, alarm, application catalog, Blog, CA (Certificate Authority), database, database cache, encryption key, extended ACL, form, hierarchical naming, IMAP (Internet Message Access Protocol), LDAP directory, library, manager access, named element, newsgroup, Personal Address Book, portal applications catalog, Replica, Sametime Contacts, SSL (Secure Sockets Layer), tag, TCP port, User-ID, WebDAV (Web-based Authoring and Versioning), XML (Extensible Markup Language)
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
Any SMTP namespace for which an Exchange organization sends and receives e-mail. Accepted domains include those domains for which the Exchange organization is authoritative. An Exchange organization is authoritative when it handles mail delivery for recipients in the accepted domain. Accepted domains also include domains for which the Exchange organization receives mail and then relays to an e-mail server that is outside the Active Directory forest for delivery to the recipient. [Exchange 2007]
- Browse Related Terms: accepted domain, Active Directory contact, address rewriting, Address Rewritting, dynamic distribution group, mail contact, RBL (real-time block list), Safe Senders List, spoofed mail, Spoofing
All > Technology > E-mail > Lotus Domino
In computer security, the process of ensuring that users can access only those resources of a computer system for which they are authorized.
- Browse Related Terms: access control, ACL (Access Control List), Authentication, command key, Digital Signature, keyboard shortcut, private key, public key, Public Key Cryptography, Secure/MIME (S/MIME), SLIP/PPP, SOCKS (Sockets Secure), symmetric encryption
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
The security mechanism in Windows Server(tm) 2003 that limits access to information, objects, or controls for designated users and groups. [Exchange 2003]
- Browse Related Terms: access control, ACE (access control entry), ACL (Access Control List), DACL (discretionary access control list), Delegation, Policy, privilege, security context, security descriptor
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object. [Exchange 2007]
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
Also listed in:
All > Technology > E-mail > Lotus Domino
A defined area on a form that allows only certain users to edit the fields in the section. In addition to fields, an access-controlled section can include objects, layout regions, and text.
- Browse Related Terms: access-controlled section, data type, document, field, Notes/FX, role, Section, shared field, static text, temporary field
All > Technology > E-mail
An account consists of an email address and a password, used to log into a mail server to retrieve or send mail.
Also listed in:
All > Technology > E-mail > Lotus Domino
A document that contains information such as the user name and password about an Internet connection. When you set up Internet mail, Notes creates at least one Account document in your Personal Address Book for incoming (POP or IMAP) mail, and one for outgoing (SMTP) mail if you don't send your Internet mail through a Domino server.
- Browse Related Terms: Account document, Connection document, Contacts, domain, group, Name & Address Book, server connection
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group. [Exchange 2003]
- Browse Related Terms: access control, ACE (access control entry), ACL (Access Control List), DACL (discretionary access control list), Delegation, Policy, privilege, security context, security descriptor
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object. [Exchange 2007]
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
All > Technology > E-mail > Lotus Domino
In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights.
- Browse Related Terms: access control, ACL (Access Control List), Authentication, command key, Digital Signature, keyboard shortcut, private key, public key, Public Key Cryptography, Secure/MIME (S/MIME), SLIP/PPP, SOCKS (Sockets Secure), symmetric encryption
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
A list of security protections that apply to an entire object, or a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system. [Exchange 2003]
- Browse Related Terms: access control, ACE (access control entry), ACL (Access Control List), DACL (discretionary access control list), Delegation, Policy, privilege, security context, security descriptor
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A list of security protections that apply to an entire object, a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system. [Exchange 2007]
- Browse Related Terms: ACL (Access Control List), disclaimer, EXCH50 binary large object, fallback action, GAL (global address list), GUID (globally unique identifier), Microsoft Exchange Troubleshooting Assistant, predicate, Queue Viewer, Replication ID, rule, rule collection, Security Exchange Commission Rule 17a-4 (SEC Rule 17 A-4), transport rule
Also listed in:
- All > Law > E-Discovery
- All > Technology > Storage
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
The process of converting a storage group copy to a production storage group. Local continuous replication (LCR) and standby continuous replication (SCR) storage group copies are always manually activated, and continuous cluster replication (CCR) storage group copies can be automatically activated. [Exchange 2007]
- Browse Related Terms: activation, CCR (cluster continuous replication), clustered mailbox server, file share witness, handoff, lossy failover, MNS (Majority Node Set), SCC (single copy cluster), SCR (standby continuous replication), source, standby cluster, TARGET, transport dumpster
Also listed in:
- All > Technology > Programming > Java
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
The Windows-based directory service. Microsoft(r) Active Directory(r) directory service stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects. [Exchange 2003]
- Browse Related Terms: Active Directory, ADSI (Active Directory Service Interfaces), CDO (Collaboration Data Objects), ESE (Extensible Storage Engine) (fka JET), InetOrgPerson, MAPI (Messaging Application Programming Interface), mixed-mode site, RPC (remote procedure call), service account, SRS (Site Replication Service), System attendant
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
The Windows-based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects. [Exchange 2007]
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
Also listed in:
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
Although there is no performance impact or special considerations about the impact of journaling on Active Directory®, it is important to understand how journaling uses Active Directory. As with almost all user and configuration data on which Exchange relies, journaling configuration data is stored in Active Directory. There are two relevant Active Directory attributes:
- heuristic: This attribute enables envelope journaling at the Exchange organizational level.
- msExchMessageJournalRecipient This attribute specifies the journal mailbox for the particular mailbox store.
Both of these attributes are read and cached by Directory Service Access (DSAccess), which is the local directory cache on each Exchange server. DSAccess is updated every 15 minutes; therefore, any configuration change you make to these attributes takes no more than 15 minutes to update on the local Exchange computer (you must also take into account replication for multiple domains).
- Browse Related Terms: Active Directory and Journaling, device credentials, Domain Controller, DomainPrep, Exchange-enabled object, extended permission, extended rights, Forest, ForestPrep, Global Catalog, trust relationship, WAP (Wireless Application Protocol)
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
An Active Directory object that contains information about an individual such as name, address, and job title. It can include a foreign e-mail address.
- Browse Related Terms: accepted domain, Active Directory contact, address rewriting, Address Rewritting, dynamic distribution group, mail contact, RBL (real-time block list), Safe Senders List, spoofed mail, Spoofing
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
The Windows-based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A stand-alone directory service that is designed specifically for use with directory-enabled applications. Active Directory Application Mode (ADAM) does not require or depend on Active Directory forests or domains. ADAM stores and replicates only application-related information. ADAM does not store or replicate network operating system (NOS)-related information.
- Browse Related Terms: Active Directory Lightweight Directory Services, ADAM (Active Directory Application Mode), AV (antivirus software), checksum, cluster-aware, cluster-aware application, Defense In-Depth, direct trust, DoS (denial of service attack), ESE (Extensible Storage Engine) (fka JET), failover, FRS (File Replication Service), Lightweight Directory Services, MAPI (Messaging Application Programming Interface), split brain syndrome, Trojan horse, Virus
Also listed in:
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A directory service model and a set of Component Object Model (COM) interfaces. ADSI enables Windows applications and Active Directory clients to access several network directory services, including Active Directory. ADSI is supplied as a software development kit (SDK).
- Browse Related Terms: access control, ACE (access control entry), Active Directory, Active Directory Domain Services (AD DS), Active Directory Service Interfaces, ADSI (Active Directory Service Interfaces), DACL (discretionary access control list), DNS (Domain Name System), mail user, Mailbox, mailbox user, property set, recipient
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
An administrative tool used by administrators to perform day-to-day Active Directory administrative tasks. The tasks that can be performed with this tool include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. Examples of objects in Active Directory are organizational units, users, contacts, groups, computers, printers, and shared file objects. [Exchange 2003]
- Browse Related Terms: Active Directory Users and Computers, Attribute, Authentication, CA (Certification Authority), CTL (certificate trust list), distinguished name, DNS (Domain Name System), FQDN (fully qualified domain name), Namespace, Object
All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
A process by which antivirus and anti-spam agents and filters are applied to e-mail messages for the purpose of stopping unsolicited or malicious e-mails from entering the organization.
- Browse Related Terms: Active Messaging Protection, Address Rewriting Inbound agent, Address Rewriting Outbound agent, directory harvest attack, IP Allow list, IP Block list, junk e-mail, SMTP (Simple Mail Transfer Protocol), SPAM, tarpitting
All > Technology > E-mail > Lotus Domino
A shared space in which team members organize work and collaborate. Activity members can post messages, share files and Web links, create and assign To Do items, and keep track of current and completed activities with a Notes client or the Web-based Activity Dashboard.
Also listed in:
All > Technology > E-mail > Lotus Domino
A process used to collect information about the activity in an enterprise.
- Browse Related Terms: activity, activity logging, note header, note ID, UNID (Universal ID), UNID table