Bring Your Own Cloud (BYOC)
A Bring Your Own Cloud configuration is where you will host PoliteMail via your own Azure Cloud servers, giving PoliteMail temporary access to hook everything up for you.
Component Object Model. A COM add-in is a supplemental program that extends the capabilities of Microsoft Outlook by adding custom commands and specialized features. COM Add-Ins are loaded as part of the startup process and are available only in Windows. COM Add-Ins are considered an older technology that is gradually being replaced by the Outlook Add-In.
Content, or a Content Item, refers to any of the pieces of content available within PoliteMail. This includes Templates and Template Sections, Brand Themes, Paragraphs, Images, Links, and Smart Attachments. In version 5.0, Buttons were also added as a Content Item.
Content Security Policy
Contect Security Policy (CSP) is a layer of security that allows a web administrator to restrict all content so it must come from its own domain or specifically whitelisted domains. This includes images, audio, and video.
DACPAC stands for Data Application Component Package. A DACPAC contains the complete model of the database, and is used to restore a database from the details available in the model. DACPAC data package files are actually compressed ZIP files that contain several XML files containing information about the database model, such as tables and views, used to restore a database.
Email Engagement is a measurement of the user’s interaction with the email, combining the content read with click activity.
The percentage of your audience that has received and opened the message,and did not immediately delete or skip it.
The percentage of readers who skimmed, casually read, or did an engaged read of the message, based on calculated needed read time.
Formerly known as Azure Active Directory (Azure AD), Entra ID is a cloud-based identity and access management service. This service helps your employees access external resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications. Entra ID also helps them access internal resources like apps on your corporate intranet network, along with any cloud apps developed for your own organization.
Exchange Web Services
Exchange Web Services (EWS) is a cross-platform API that enables applications to access mailbox items such as email messages, meetings, and contacts from Exchange Online, Exchange Online as part of Office 365, or on-premises versions of Exchange starting with Exchange Server 2007. As of 2022, EWS authentication via Basic Auth has been deprecated, and OAuth is used instead.
Fully Qualified Domain Name
A fully-qualified domain name (FQDN) is a complete domain name that specifies the exact location of a computer or a host on the internet. It consists of the hostname and domain name. For example, the FQDN of this knowledge base is www.politemail.com, where 'www' is the hostname, 'politemail' is the domain, and 'com' is the top-level domain.
Group managed service accounts (gMSAs) are domain accounts to help secure services. gMSAs can run on one server, or in a server farm, such as systems behind a network load balancing or Internet Information Services (IIS) server. gMSAs are an identity solution with greater security that help reduce administrative overhead.
Group Policy Object (GPO)
Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users. System administrators can deploy software, patches and other updates via GPO.
A label assigned to a server service available on a network. A DNS server uses a hostname to make an IP address easy to remember. Examples of a hostname are "www" most web pages and “en” in en.wikipedia.org.
HTTP Strict Transport Security
HSTS is a method used by websites to declare that they should only be accessed using a secure connection (HTTPS). If a website declares an HSTS policy, the browser must refuse all HTTP connections and prevent users from accepting insecure SSL certificates.
Messaging Application Program Interface. MAPI is a Microsoft Windows program interface that enables you to send E-mail from within a Windows application and attach a document.
Azure is cloud platform from Microsoft that allows developers to build, run, and manage applications across multiple clouds, on-premises, with their choice of tools and frameworks.
Graph is an application from Microsoft that provides access to the data stored in Microsoft 365 services. Custom applications can use the Microsoft Graph API to connect to data and use it in custom applications to enhance organizational productivity.
Open Visibility allows your recipients to see interaction data in near real-time, including page views, read time, mobile opens and clicks. This information will appear at the top of your template or email message, and recipients will be able to view and refresh the data.
Personally Identifiable Information
Personally Identifiable Information (PII)
Personally Identifiable Information (PII) is considered to be any information that permits the identity of an individual to be directly or indirectly inferred. PII can include ID numbers, address information, email addresses, financial or medical records, biometrics, and more.
PGP is short for Pretty Good Privacy, a security program that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files. It was one of the first freely available forms of public-key cryptography software.
Preflight test send
A sample of the created message generated by PoliteMail and sent to the user's email address for review. Preflight is highly recommended to ensure the message looks as desired prior to sending. Preflight test sends do not affect Metrics.
Runtime Callable Wrapper
The common language runtime exposes COM objects through a proxy called the runtime callable wrapper (RCW). Although the RCW appears to be an ordinary object to . NET clients, its primary function is to marshal calls between a . NET client and a COM object.
PoliteMail can be implemented either online as a Software as a Service (SaaS) where PoliteMail runs everything for you, an online configuration where you host everything but give PoliteMail temporary access to get everything running for you (also called Bring Your Own Cloud or BYOC), or where PoliteMail is hosted on your company premeses, which is known as Self-Hosted. This is usually the most complex to install, but also gives you the most control.
SQL Transactions group a set of tasks into a single execution unit. Each transaction begins with a specific task and ends when all the tasks in the group successfully complete. If any of the tasks fail, the transaction fails. Therefore, a transaction has only two results: success or failure.
Subdomains are located on the left side of a second-level domain and sometimes indicates a section of a larger domain. For instance, help.politemail.com is a part of politemail.com, and the word “help” is the subdomain. Note that not all domains have this element.