Abbreviations and Acronyms
| Acronym | Definition |
|---|---|
| AAD | Azure Active Directory |
| ABAC | As Built As Configured |
| ACL | Access Control List |
| ACSC | Australian Cyber Security Centre |
| AD | Active Directory |
| ADMX | Administrative Template XML Based |
| AES | Advanced Encryption Standard |
| AIP | Azure Information Protection |
| API | Application Programming Interface |
| APP ID | Application Identifier |
| ARM | Azure Resource Manager |
| ASR | Attack Surface Reduction |
| ATP | Advanced Threat Protection |
| AWS | Amazon Web Services |
| BAU | Business as Usual |
| BIOS | Basic Input Output System |
| BYOD | Bring Your Own Device |
| CAS | Client Access Services |
| CASB | Cloud Access Security Broker |
| CDC | Canberra Data Centre |
| CEF | Common Event Format |
| CISO | Chief Information Security Officer |
| CNAME | Canonical Name |
| CPU | Central Processing Unit |
| CRM | Customer Relationship Management |
| CRT | Cathode Ray Tube |
| CSM | Compatibility Support Module |
| CSV | Comma Separated Values |
| DEM | Device Enrolment Manager |
| DEP | Device Enrolment Program |
| DLP | Data Loss Prevention |
| DKIM | Domain Key Identified Mail |
| DMA | Direct Memory Access |
| DMARC | Domain-based Message Authentication, Reporting and Conformance |
| DNS | Domain Name System |
| DTA | Digital Transformation Agency |
| EDR | Endpoint Detection and Response |
| EMET | Enhanced Mitigation Experience Toolkit |
| EMS | Enterprise Mobility & Security |
| ETW | Event Tracing for Windows |
| FQDN | Fully Qualified Domain Name |
| FTP | File Transfer Protocol |
| GAL | Global Address List |
| GCP | Google Cloud Platform |
| GDPR | General Data Protection Regulation |
| GIF | Graphics Interchange Format |
| GMT | Greenwich Mean Time |
| GPO | Group Policy Object |
| HDD | Hard Disk Drive |
| HIPS | Host-based Intrusion Protection System |
| HRIP | Health Records and Information Privacy |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IAM | Identity Access Management |
| ICAP | Internet Content Adaption Protocol |
| ICT | Information and Communications Technology |
| IIS | Internet Information Services |
| IMAP | Internet Message Access Protocol |
| IPMI | Intelligent Platform Module Interface |
| Intune | Microsoft Endpoint Manager - Intune |
| IRAP | Information Security Registered Assessors Program |
| ISM | Information Security Manual |
| ISO | International Standards Organisation |
| JIT | Just in Time |
| JPG JPEG |
Joint Photographic Experts Group |
| KMS | Key Management Services |
| LAN | Local Area Network |
| LAPS | Local Administrator Password Solution |
| LDAP | Lightweight Directory Access Protocol |
| LOB | Line Of Business |
| LSA | Local Security Authority |
| LTSC | Long-Term Servicing Channel |
| MAK | Multiple Activation Key |
| MAM | Mobile Application Management |
| MDM | Mobile Device Management |
| MECM | Microsoft Endpoint Configuration Manager |
| MEM | Microsoft Endpoint Manager |
| MFA | Multi-Factor Authentication |
| MIM | Microsoft Identity Manager |
| MIP | Microsoft Information Protection |
| NNR | Network Name Resolution |
| NTLM | New Technology LAN Manager |
| OAB | Offline Address Book |
| OATH | Open Authentication |
| OAUTH | Open Authentication |
| OEM | Original Equipment Manufacturer |
| OTP | One-Time Password |
| OWA | Outlook on the Web |
| PAW | Privileged Access Workstation |
| Portable Document Format | |
| PEM | Privacy Enhanced Mail |
| PHS | Password hash synchronisation |
| PII | Personally Identifiable Information |
| PIM | Privileged Identity Management |
| PIN | Personal Identification Number |
| PNG | Portable Network Graphics |
| POP | Post Office Protocol |
| POS | Point of Sale |
| PSPF | Protective Security Policy Framework |
| PST | Personal Storage Table |
| PTA | Pass-Through Authentication |
| RAM | Random Access Memory |
| RBAC | Role Based Access Control |
| RDP | Remote Desktop Protocol |
| REST | Representational State Transfer |
| RFC | Request for Comment |
| RHEL | Red Hat Enterprise Linux |
| RPO | Recovery Point Objective |
| RTO | Recovery Time Objective |
| SAN | Subject Alternate Name |
| SCCM | Microsoft System Center Configuration Manager |
| SEM | Security Event Management |
| SIEM | Security Information and Event Management |
| SIG | Secure Internet Gateway |
| SIM | Security Information Management |
| SLA | Service Level Agreement |
| SLAT | Second Level Address Translation |
| SMB | Server Message Block |
| SMS | Short Message Service |
| SMTP | Simple Mail Transport Protocol |
| SOAP | Simple Object Access Protocol |
| SOE | Standard Operating Environment |
| SPAM | Unsolicited Commercial Email |
| SPF | Sender Policy Framework |
| SQL | Structured Query Language |
| SSL | Secure Sockets Layer |
| SSO | Single Sign On |
| SVG | Scalable Vector Graphics |
| SWIFT | Society for Worldwide Interbank Financial Telecommunication |
| TBA | To be advised |
| TCP | Transmission Control Protocol |
| TLS | Transport Layer Security |
| TPM | Trusted Platform Module |
| UAC | User Access Control |
| UDP | User Datagram Protocol |
| UEBA | User Entity Behavioural Analytics |
| UEFI | Unified Extensible Firmware Interface |
| UK | United Kingdom |
| UPN | User Principal Name |
| URL | Uniform Resource Locator |
| US | United States |
| UWP | Universal Windows Platform |
| VBA | Visual Basic for Application |
| VDI | Virtual Desktop Infrastructure |
| VIP | Virtual IP address |
| VPN | Virtual Private Network |
| VSM | Virtual Secure Module |
| WDAC | Windows Defender Application Control |
| WIP | Windows Information Protection |
| WPAD | Web Proxy Auto-Discovery Protocol |
| WSUS | Windows Server Update Services |
| XPS | XML Paper Specification |