Glossary

    B
  • A cyber threat in which the attacker sends an email whose contents impersonate a legitimate corporate email account in an attempt to gain information or money from the recipient. Typically these emails don’t contain malicious content in the form of links or files.
  • C
  • Enables you to display page results based on a date range you select. Available on the Malicious, Events, and Reports pages.
  • Provides access to client information such as the date SaaS Defense was activated for the client, the number of malicious attacks (if any) attempted on the client's Microsoft 365 applications, and the number of seats protected for each of those applications.
  • A text file that uses a comma to separate values. Each line of the file is a data record that includes one or more fields, separated by commas. Each line ends with a line break.
  • D
  • An Advanced Threat Protection (ATP) security solution specifically designed to protect the Microsoft 365 suite of applications. It uses data-independent technology enabling it to detect a threat the first time it is encountered.
  • Enables client end users to notify the MSP via Outlook when an email may have been incorrectly allowed or blocked by Datto SaaS Defense.
  • Contains the same information as the Malicious Report but in a downloaded CSV file.
  • E
  • A customized threat report listing the malicious email threats intended for the end user's inbox that Datto SaaS Defense has quarantined. Allows the end user to act on an email, if necessary. Sent at specified intervals.
  • Lists the records for which a client has submitted a report via the Defense Report Threat application indicating an email was mishandled by Datto SaaS Defense.
  • The threat of a malicious attack (i.e., denial of service, data compromise) unless payment is received.
  • F
  • Selecting page options to display only the records that match the options selected.
  • L
  • A feature that enables searching for and quarantining of malicious emails Datto SaaS Defense may have missed.
  • A service that shows your organization's vulnerability to malicious threats that have not been encountered before. It uses the freshest in-the-wild cyber attacks (instead of simulated threats) to continuously test your email defenses.
  • Available on the Reports page, the Lucky Meter Report provides a deeper dive into attack results.
  • M
  • The verdict Datto SaaS Defense assigns to a suspected threat when the application is running in Monitoring mode.
  • Contains detailed information about security threats that have been prevented by Datto SaaS Defense. Provides threat analysis tools.
  • A report available on the Reports page that provides overall attack detection information in a downloaded PDF file for the selected client and time frame. Includes total number of attacks detected and the percentage of each attack type.
  • A cyber threat where the attacker sends an email containing malicious links or files that when accessed can infect an environment.
  • In monitoring mode, Datto SaaS Defense identifies suspicious content but does not take any action. The content remains in its current location and the MSP determines the actions to take.
  • N
  • A standard message the MSP creates that is automatically sent to the MSP when a certain situation, such as a malicious attack, occurs.
  • Includes the notification records that the MSP has added to the environment.
  • O
  • Datto SaaS Defense can be run in one of two operating modes: In Prevention mode, the default operating mode, the application quarantines suspicious emails within seconds of reaching the intended recipient. In Monitoring mode, the application identifies suspicious content but does not take any action.
  • P
  • A rule you configure that automatically allows (allowlists) access to emails which match the criteria, such as the sender's email address, you specify in the rule.
  • A rule you configure that automatically allows access to the content (i.e., email, Word file, etc.,) in which a website's URL address you specify is included.
  • A cyber threat in which the attacker impersonates a legitimate entity by sending a fraudulent email that may include links to a fake website, hoping the user enters his/her credentials.
  • A rule that blocks or allows access to content based on the criteria specified in the policy.
  • The default operating mode. In prevention mode, Datto SaaS Defense quarantines suspicious content. When quarantining content, any malicious content is made inaccessible to an end user. Suspicious content determined not to be malicious, such as spam, is identified as suspicious but is still accessible to an end user. The specific quarantining steps the application performs depends on whether the suspicious content is part of an email or a document.
  • Q
  • When operating in Prevention mode, any malicious content is made inaccessible to the end user. The specific quarantining steps the application performs depends on whether the suspicious content is part of an email or a document.
  • The verdict Datto SaaS Defense assigns to a suspected threat when the application is running in Prevention mode.
  • R
  • A string of text allowing you to create patterns that help match text and perform actions.
  • Enables MSP to create customized reports that provide a high-level view of malicious traffic. Allows MSP to create multiple reports customized for each client.
  • A rule you configure that automatically blocks (blocklists) access to emails which match the criteria, such as the sender's email address, you specify in the rule.
  • A rule you configure that automatically blocks access to the content (i.e., email, Word file, etc.,) in which a website's URL address you specify is included.
  • The role assigned to a user dictates the specific rights and restrictions the user has when working with client policies.
  • S
  • Indicates an end user has a license for a specific Microsoft 365 service.
  • A specific application used in an environment.
  • An email usually sent to many recipients for commercial advertising purposes.
  • T
  • When an end user determines an email should have been quarantined or when an email should not have been quarantined. End user should report an incident using the Datto SaaS Defense Report Threat Outlook application.
  • V
  • The action taken by Datto SaaS Defense or by the MSP to handle a malicious threat.
  • W
  • At the top of each service page, the Weekly Traffic chart shows the total number of scans that have been performed on the service's content for the week.