Glossary

ABCDEFGHIJKLMNOPQRSTUVWXYZ

B

BYOC

Bring Your Own Cloud (BYOC)

A Bring Your Own Cloud configuration is where you will host PoliteMail via your own Azure Cloud servers, giving PoliteMail temporary access to hook everything up for you.

C

Cloudflare Tunnel

A Cloudflare Tunnel gives organizations a way to securely make internal applications and services accessible to external users while using the defenses and authentication policies enforced by the Cloudflare network.

COM add

Component Object Model. A COM add-in is a supplemental program that extends the capabilities of Microsoft Outlook by adding custom commands and specialized features. COM Add-Ins are loaded as part of the startup process and are available only in Windows. COM Add-Ins are considered an older technology that is gradually being replaced by the Outlook Add-In.

contacts

In version 5.10 and later of PoliteMail, "Contacts" is now called "People". After all, they are.

Content

Content Item

Content, or a Content Item, refers to any of the pieces of content available within PoliteMail. This includes Templates and Template Sections, Brand Themes, Paragraphs, Images, Links, and Smart Attachments. In version 5.0, Buttons were also added as a Content Item.

CSP

Content Security Policy

Contect Security Policy (CSP) is a layer of security that allows a web administrator to restrict all content so it must come from its own domain or specifically whitelisted domains. This includes images, audio, and video.

D

DACPAC

DACPAC

DACPAC stands for Data Application Component Package. A DACPAC contains the complete model of the database, and is used to restore a database from the details available in the model. DACPAC data package files are actually compressed ZIP files that contain several XML files containing information about the database model, such as tables and views, used to restore a database.

E

Engagement

Email Engagement

Email Engagement is a measurement of the user’s interaction with the email, combining the content read with click activity.

Email Reach

The percentage of your audience that has received and opened the message,and did not immediately delete or skip it.

Readership

Email Readership

The percentage of readers who skimmed, casually read, or did an engaged read of the message, based on calculated needed read time.

Entra ID

Entra ID

Formerly known as Azure Active Directory (Azure AD), Entra ID is a cloud-based identity and access management service. This service helps your employees access external resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications. Entra ID also helps them access internal resources like apps on your corporate intranet network, along with any cloud apps developed for your own organization.

EWS

Exchange Web Services

Exchange Web Services (EWS) is a cross-platform API that enables applications to access mailbox items such as email messages, meetings, and contacts from Exchange Online, Exchange Online as part of Office 365, or on-premises versions of Exchange starting with Exchange Server 2007. As of 2022, EWS authentication via Basic Auth has been deprecated, and OAuth is used instead.

F

FQDN

Fully Qualified Domain Name

A fully-qualified domain name (FQDN) is a complete domain name that specifies the exact location of a computer or a host on the internet. It consists of the hostname and domain name. For example, the FQDN of this knowledge base is www.politemail.com, where 'www' is the hostname, 'politemail' is the domain, and 'com' is the top-level domain.

G

GMSA

gMSA

Group managed service accounts (gMSAs) are domain accounts to help secure services. gMSAs can run on one server, or in a server farm, such as systems behind a network load balancing or Internet Information Services (IIS) server. gMSAs are an identity solution with greater security that help reduce administrative overhead.

GPO

Group Policy Object (GPO)

Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users. System administrators can deploy software, patches and other updates via GPO.

H

Hostname

A label assigned to a server service available on a network. A DNS server uses a hostname to make an IP address easy to remember. Examples of a hostname are "www" most web pages and “en” in en.wikipedia.org.

HSTS

HTTP Strict Transport Security

HSTS is a method used by websites to declare that they should only be accessed using a secure connection (HTTPS). If a website declares an HSTS policy, the browser must refuse all HTTP connections and prevent users from accepting insecure SSL certificates.

M

MAPI

MAPI

Messaging Application Program Interface. MAPI is a Microsoft Windows program interface that enables you to send E-mail from within a Windows application and attach a document.

Azure

Microsoft Azure

Azure is cloud platform from Microsoft that allows developers to build, run, and manage applications across multiple clouds, on-premises, with their choice of tools and frameworks.

Graph

Microsoft Graph

Graph is an application from Microsoft that provides access to the data stored in Microsoft 365 services. Custom applications can use the Microsoft Graph API to connect to data and use it in custom applications to enhance organizational productivity.

O

Open Visibility

Open Visibility allows your recipients to see interaction data in near real-time, including page views, read time, mobile opens and clicks. This information will appear at the top of your template or email message, and recipients will be able to view and refresh the data.

Outlook Add-In

Outlook add-ins are integrations built by third parties into Outlook. For an Outlook add-in, Outlook reads the manifest and hooks up the specified controls in the UI, and then loads the JavaScript and HTML. The web components all run in the context of a browser in a sandbox.

P

Personally Identifiable Information

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) is considered to be any information that permits the identity of an individual to be directly or indirectly inferred. PII can include ID numbers, address information, email addresses, financial or medical records, biometrics, and more.

PGP

PGP

PGP is short for Pretty Good Privacy, a security program that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files. It was one of the first freely available forms of public-key cryptography software.

Preflight test send

A sample of the created message generated by PoliteMail and sent to the user's email address for review. Preflight is highly recommended to ensure the message looks as desired prior to sending. Preflight test sends do not affect Metrics.

R

RCW

Runtime Callable Wrapper

The common language runtime exposes COM objects through a proxy called the runtime callable wrapper (RCW). Although the RCW appears to be an ordinary object to . NET clients, its primary function is to marshal calls between a . NET client and a COM object.

S

Self-Hosted

PoliteMail can be implemented either online as a Software as a Service (SaaS) where PoliteMail runs everything for you, an online configuration where you host everything but give PoliteMail temporary access to get everything running for you (also called Bring Your Own Cloud or BYOC), or where PoliteMail is hosted on your company premeses, which is known as Self-Hosted. This is usually the most complex to install, but also gives you the most control.

Transaction

SQL Transaction

SQL Transactions group a set of tasks into a single execution unit. Each transaction begins with a specific task and ends when all the tasks in the group successfully complete. If any of the tasks fail, the transaction fails. Therefore, a transaction has only two results: success or failure.

Subdomain

Subdomains are located on the left side of a second-level domain and sometimes indicates a section of a larger domain. For instance, help.politemail.com is a part of politemail.com, and the word “help” is the subdomain. Note that not all domains have this element.