Switching the application to fully functional mode. The application is activated by the user through submitting an activation code for a commercial license in the application interface.
A code that you receive when purchasing a license for Kaspersky Security for Microsoft Office 365. This code is required for activation of the application.
The activation code is a unique sequence of twenty letters and numbers in the format XXXXX-XXXXX-XXXXX-XXXXX.
Databases that contain information about unsolicited mass email mailings known to Kaspersky Lab as of when the anti-spam databases are released. Entries in anti-spam databases allow the signs of such mailings to be detected in scanned objects. Anti-spam databases are created and regularly updated by Kaspersky Lab specialists.
Databases that contain information about computer security threats known to Kaspersky Lab as of when the anti-virus databases are released. Entries in anti-virus databases allow malicious code to be detected in scanned objects. Anti-virus databases are created and regularly updated by Kaspersky Lab specialists.
A hidden folder specially set up in a user mailbox where messages containing threats detected in this mailbox are moved to.
Database that contains a list of web addresses whose content may be considered to be dangerous. The database is created and regularly updated by Kaspersky Lab specialists.
Database that contains a list of web addresses which have been defined as phishing web addresses by Kaspersky Lab specialists. The database is created and regularly updated by Kaspersky Lab specialists.
Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * represents any number of any characters and ? stands for any single character.
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
The Kaspersky Security for Microsoft Office 365 component that provides a user interface for configuring and tracking the operation of Kaspersky Security for Microsoft Office 365.
An infrastructure of cloud services that provides access to the Kaspersky Lab database with constantly updated information about the reputation of files, web resources, and software. Kaspersky Security Network ensures faster responses by Kaspersky Lab applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.
A time period during which you have access to the application features and rights to use additional services. The services you can use depend on the type of the license.
Web addresses pointing to malicious resources that distribute malware.
A message with information about an event (or events) that is sent by the application via other notification delivery systems (for example, email) to the specified addresses.
Administrator role in Office 365 infrastructure. Global Administrator has full access to all administrative features and other administrative roles in Office 365.
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
Phishing links point to fraudulent websites designed to steal personal data, such as bank account details. A phishing attack can be disguised, for example, as a message from your bank with a link to its official website. By clicking the link, you go to an exact copy of the bank's website and even see the bank's address in the browser, even though you are actually on a spoofed site. All of your further actions on the website are tracked and can be used to steal your personal data.
A user account that is used to access email items in Office 365 for scanning. The Administrator should grant ApplicationImpersonation and Mailbox Search roles to this account in order to enable Anti-Virus, Anti-Spam, and Anti-Phishing protection.
Unsolicited mass email mailings, most often including advertisements.
A program that infects other ones, by adding its code to them in order to gain control when infected files are run. This simple definition allows identifying the main action performed by any virus: infection.
Page top