Word of the Week

Single sign-on

Week 35: Single sign-on Single sign-on provides a true single sign-on (SSO) experience for users to access both the on-premises and Office 365 service offerings with a single user name and password. Additionally, single sign-on allows administrators to easily control...

SharePoint Online

Week 34: SharePoint Online The Office 365 solution for collaboration. The SharePoint Online service is built on SharePoint Server 2010.

Service request

Week 33:Service request A service request (SR) is how customers engage Office 365 support for reactive and proactive issues.

Outlook Web App (OWA)

Week 32:Outlook Web App (OWA) This is the browser based email client used to access Exchange Online. Formerly known as Outlook Web Access.

Lync Online

Week 31:Lync Online The Office 365 solution for instant messaging, audio and video calling, and online meetings. The Lync Online service is built on Lync 2010 Server.

Office Web Apps

Week 30:Office Web Apps Online companions to Word, Excel, PowerPoint, and One Note, which let you review and make light edits to documents directly from a browser.

Email coexistence

Week 29:Email coexistence Email coexistence enables organizations with on-premises Exchange Server email environments to establish a connection between their on-premises mail environment and the Office 365 Exchange Online mail environment. With coexistence configured,...


Week 28:Authentication This is the process of determining whether someone or something is, in fact, who or what it is declared to be. Authentication is commonly performed through the use of user name and logon passwords.

Active Directory Federation Services (AD FS):

Week 27:Active Directory Federation Services (AD FS): AD FS provides the various end-points that the Microsoft Federation Gateway uses to redirect clients to the AD FS server for different types of authentication. AD FS must be installed on a separate physical server...


Week 26: Gnutella An Internet file sharing utility. Gnutella acts as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other users.


Week 25: Zombies A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many ina botnet, and will be used to...


Week 24: Smurf The Smurf attack works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the target.