Skip to main content This browser is no longer supported. Show
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Microsoft Graph permissions reference
In this articleFor your app to access data in Microsoft Graph, the user or administrator must grant it the correct permissions via a consent process. This topic lists the permissions associated with each major set of Microsoft Graph APIs. It also provides guidance about how to use the permissions. Note As a best practice, request the least privileged permissions that your app needs in order to access data and function correctly. Requesting permissions with more than the necessary privileges is poor security practice, which may cause users to refrain from consenting and affect your app's usage. To learn more about how permissions work, see Authentication and authorization basics, and watch the following video. Microsoft Graph permission namesMicrosoft Graph permission names follow a simple pattern: resource.operation.constraint. For example, User.Read grants permission to read the profile of the signed-in user, User.ReadWrite grants permission to read and modify the profile of the signed-in user, and Mail.Send grants permission to send mail on behalf of the signed-in user. The constraint element of the name determines the potential extent of access your app will have within the directory. Currently Microsoft Graph supports the following constraints:
Note In delegated scenarios, your app's access is also limited by the privileges of the signed-in user. These privileges are determined by the user's assigned roles and their relationship to the data being accessed. For example, if the signed-in user doesn't have the appropriate privileges to view a file, then the client app won't be able to read that file either, even if the app is granted the Microsoft accounts and work or school accountsNot all permissions are valid for both Microsoft accounts and work or school accounts. You can check the Microsoft Account Supported column for each permission group to determine whether a specific permission is valid for Microsoft accounts, work or school accounts, or both. Limits on requested permissions per appAzure AD limits the number of permissions that can be requested and consented by a client app. These limits depend on the
Permissions availability statusMicrosoft Graph permissions in the Azure portal are generally available and in GA status for all apps to use, except for a few sets that are in preview or private preview status. Permissions in preview are available to the public; they may change and may not be promoted to GA status. Permissions in private preview status are not and may never become available to the public. Do not use permissions in preview or private preview status in production apps. User and group search limitations for guest users in organizationsUser and group search capabilities allow the app to search for any user or group in an organization's directory by performing queries against the Note Guest users have the same access that members enabled under External Identities > External Collaboration Settings > Guest user access have. The users API works with guest tokens as well. If the signed-in user is a guest user, depending on the permissions an app has been
granted, it can read the profile of a specific user or group (for example, With the appropriate permissions, the app can read the profiles of users or groups that it obtains by following links in navigation properties; for example, Limited information returned for inaccessible member objectsContainer objects such as groups support members of various types, for example users and devices. When an application queries the membership of a container object and does not have permission to read a certain type, members of that type are returned but with limited information. The application receives a 200 response and a collection of objects. Complete information is returned for the object types that the application has permissions to read. For the object types which the application does not have permission to read, only the the object type and ID are returned. This is applied to all relationships that are of directoryObject type (not just member links). Examples include For example, let's say an application has User.Read.All and Group.Read.All permissions for Microsoft Graph. A group has been created and that group contains a user, a group, and a device. The application calls list group members. The application has access to the user and group objects in the group, but not the device object. In the response, all the selected properties of the user and group objects are returned. For the device object, however, only limited information is returned. The data type and object ID are returned for the device, but all other properties have a value of null. Apps without permission will not be able to use the ID to get the actual object.
The following is the JSON response:
Access reviews permissionsDelegated permissions
Application permissions
RemarksAccessReview.Read.All, AccessReview.ReadWrite.All, AccessReview.ReadWrite.Membership are valid only for work or school accounts. For an app with delegated permissions to read access reviews of a group or app, the signed-in user must be a member of one of the following administrator roles: Global Administrator, Security Administrator, Security Reader or User Administrator. For an app with delegated permissions to write access reviews of a group or app, the signed-in user must be a member of one of the following administrator roles: Global Administrator or User Administrator. For an app with delegated permissions to read access reviews of an Azure AD role, the signed-in user must be a member of one of the following administrator roles: Global Administrator, Security Administrator, Security Reader or Privileged Role Administrator. For an app with delegated permissions to write access reviews of an Azure AD role, the signed-in user must be a member of one of the following administrator roles: Global Administrator or Privileged Role Administrator. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Administrative units permissionsDelegated permissions
Application permissions
RemarksWith the AdministrativeUnit.Read.All permission an application can read administrative unit information including members. With the AdministrativeUnit.ReadWrite.All permission an application can create, read, update, and delete administrative unit information including members. AdministrativeUnit.Read.All and AdministrativeUnit.ReadWrite.All are valid only for work or school accounts. Example usageNote The
For more complex scenarios involving multiple permissions, see Permission scenarios. Analytics resource permissionsDelegated permissions
Application permissionsNone. Example usageDelegated
ApplicationNone. AppCatalog resource permissionsDelegated permissions
Application permissions
RemarksCurrently the only catalog is the list of applications in Microsoft Teams. Example usageDelegated
ApplicationNone. Application resource permissionsDelegated permissions
Application permissions
RemarksCaution Permissions that allow granting authorization, such as AppRoleAssignment.ReadWrite.All, allow an application to grant additional privileges to itself, other applications, or any user. Likewise, permissions that allow managing credentials, such as Application.ReadWrite.All, allow an application to act as other entities, and use the privileges they were granted. Use caution when granting any of these permissions. The Application.ReadWrite.OwnedBy permission allows the same operations as Application.ReadWrite.All except that the former allows these operations only on applications and service principals that the calling app is an owner of. Ownership is indicated by the
Example usageDelegated
Application
Audit log permissionsDelegated permissions
Application permissions
BitLocker recovery key permissionsDelegated permissions
Application permissionsNone. Example usageDelegated
Bookings permissionsDelegated permissions
Application permissions
Example usageDelegated
Calendars permissionsDelegated permissions
Application permissions
Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Calls permissionsDelegated permissionsNone. Application permissions
Example usageApplication
For more complex scenarios involving multiple permissions, see Permission scenarios. Call records permissionsDelegated permissionsNone. Application permissions
RemarksThe CallRecords.Read.All permission grants an application privileged access to callRecords for every call and online meeting within your organization, including calls to and from external phone numbers. This includes potentially sensitive details about who participated in the call, as well as technical information pertaining to these calls and meetings that can be used for network troubleshooting, such as IP addresses, device details, and other network information. The CallRecord-PstnCalls.Read.All permission grants an application access to PSTN (calling plans) and direct routing call logs. This includes potentially sensitive information about users as well as calls to and from external phone numbers.
Example usageApplication
For more complex scenarios involving multiple permissions, see Permission scenarios. Channel permissionsDelegated permissions
Application permissions
Channel member permissionsDelegated permissions
Application permissions
Channel message permissionsDelegated permissions
Application permissions
Channel settings permissionsDelegated permissions
Application permissions
Chat permissionsDelegated permissions
Application permissions
Chat membership permissionsDelegated permissions
Application permissions
Chat resource-specific consent permissionsApplication permissions
Note Currently, these permissions are supported only in the beta version of Microsoft Graph. ChatMessage permissionsDelegated permissions
Cloud PC permissionsDelegated permissions
Application permissions
Example usageDelegated
Application
Consent requests permissionsDelegated permissions
Application permissions
Delegated permissions
Application permissions
Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Custom security attributes permissionsDelegated permissions
Application permissions
Granular delegated admin privileges (GDAP) permissionsDelegated permissions
Application permissions
Device permissionsDelegated permissions
Application permissions
Note Before December 3rd, 2020, when the application permission Device.ReadWrite.All was granted, the Device Managers directory role was also assigned to the app's service principal. This directory role assignment is not removed automatically when the associated application permissions is revoked. To ensure that an application's access to read or write to devices is removed, customers must also remove any related directory roles that were granted to the application. A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11th, 2021. Directory roles are no longer automatically assigned when application permissions are granted. Example usageApplication
For more complex scenarios involving multiple permissions, see Permission scenarios. Directory permissionsDelegated permissions
Application permissions
RemarksDirectory permissions provide the highest level of privilege for accessing directory resources such as user, group, and device in an organization. They also exclusively control access to other directory resources like: organizational contacts, schema extension APIs, Privileged Identity Management (PIM) APIs, as well as many of the resources and APIs listed under the Azure Active Directory node in the v1.0 and beta API reference documentation. These include administrative units, directory roles, directory settings, policy, and many more. Note Before December 3rd, 2020, when the application permission Directory.Read.All was granted, the Directory Readers directory role was also assigned to the app's service principal. When Directory.ReadWrite.All was granted, the Directory Writers directory role was also assigned. These directory roles are not removed automatically when the associated application permissions are revoked. To remove an application's access to read or write to the directory, customers must also remove any directory roles that were granted to the application. A service update disabling this behavior began rolling out on December 3rd, 2020. Deployment to all customers completed on January 11th, 2021. Directory roles are no longer automatically assigned when application permissions are granted. The Directory.ReadWrite.All permission grants the following privileges:
Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Domain permissionsDelegated permissions
Application permissions
eDiscovery permissionsDelegated permissions
Application permissionsNone Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Education permissionsDelegated permissions
Application permissions
Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Employee learning permissionsDelegated permissions
Application permissions
Entitlement management permissionsDelegated permissions
Application permissions
Files permissionsDelegated permissions
Application permissions
Remarks
The Files.Read.Selected and Files.ReadWrite.Selected delegated permissions are only valid on work or school accounts and are only exposed for working with Office 365 file handlers (v1.0). They should not be used for directly calling Microsoft Graph APIs. The Files.ReadWrite.AppFolder delegated permission is only valid for personal accounts and is used for accessing the App Root special folder with the OneDrive Get special folder Microsoft Graph API. Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Financials permissionsDelegated permissions
Group permissionsDelegated permissions
Application permissions
RemarksGroup functionality is not supported on personal Microsoft accounts. For Microsoft 365 groups, Group permissions grant the app access to the contents of the group; for example, conversations, files, notes, and so on. For application permissions, there are some limitations for the APIs that are supported. For more information, see known issues. In some cases, an app may need Directory permissions to read some group properties like To set a Microsoft 365 group's preferredDataLocation attribute, an app needs Directory.ReadWrite.All permission. When users in a multi-geo environment create a Microsoft 365 group, the preferredDataLocation value for the group is automatically set to that of the user. For more information about groups' preferred data location, see Create a Microsoft 365 group with a specific PDL. Group permissions are used to control access to Microsoft Teams resources and APIs. Personal Microsoft accounts are not supported. Group permissions are also used to control access to Microsoft Planner resources and APIs. Only delegated permissions are supported for Microsoft Planner APIs; application permissions are not supported. Personal Microsoft accounts are not supported. Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Identity provider permissionsDelegated permissions
RemarksIdentityProvider.Read.All and IdentityProvider.ReadWrite.All are valid only for work or school accounts. For an app to read or write identity providers with delegated permissions, the signed-in user must be assigned the Global Administrator role. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Example usageDelegatedThe following usages are valid for both delegated permissions:
For more complex scenarios involving multiple permissions, see Permission scenarios. Identity protection risk permissionsDelegated permissions
Application permissions
All identity risk permissions are valid only for work or school accounts. For an app with delegated permissions to read identity risk information, the signed-in user must be a member of one of the following Azure AD administrator roles: Global Administrator, Security Administrator, or Security Reader. Example usageThe following usages are valid for both delegated and application permissions: Read risk events
Read risky users
Read risky service principals
For more complex scenarios involving multiple permissions, see Permission scenarios. Identity user flow permissionsDelegated permissions
Application permissions
RemarksIdentityUserFlow.Read.All and IdentityUserFlow.ReadWrite.ALL is valid only for work or school accounts. For an app with delegated permissions to read user flows, the signed-in user must be a member of one of the following administrator roles: Global Administrator, External Identities User Flow Administrator, or Global Reader. For an app with delegated permissions to write user flows, the signed-in user must be a member of one of the following administrator roles: Global Administrator or External Identities User Flow Administrator. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Example usageDelegated and ApplicationThe following usages are valid for both delegated and application permissions:
For more complex scenarios involving multiple permissions, see Permission scenarios. Incidents permissionsDelegated permissions
Application permissions
RemarksIncidents permissions are valid only on work or school accounts. Example usageDelegated
Application
Information protection policy permissionsDelegated permissions
Application permissions
Intune device management permissionsDelegated permissions
Application permissions
Remarks
These permissions are only valid for work or school accounts. Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Lifecycle workflows permissionsDelegated permissions
Application permissions
Mail permissionsDelegated permissions
Application permissions
RemarksMail.Read.Shared, Mail.ReadWrite.Shared, and Mail.Send.Shared are only valid for work or school accounts. All other permissions are valid for both Microsoft accounts and work or school accounts. With the Mail.Send or Mail.Send.Shared permission, an app can send mail and save a copy to the user's Sent Items folder, even if the app does not use a corresponding Mail.ReadWrite or Mail.ReadWrite.Shared permission. Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Managed tenant permissionsDelegated permissions
Application permissionsNone. Member permissionsDelegated permissions
Application permissions
RemarksMember.Read.Hidden is valid only on work or school accounts. Membership in some Microsoft 365 groups can be hidden. This means that only the members of the group can view its members. This feature can be used to help comply with regulations that require an organization to hide group membership from outsiders (for example, a Microsoft 365 group that represents students enrolled in a class). Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Notes permissionsDelegated permissions
Application permissions
RemarksNotes.Read.All and Notes.ReadWrite.All are only valid for work or school accounts. All other permissions are valid for both Microsoft accounts and work or school accounts. With the Notes.Create permission, an app can view the OneNote notebook hierarchy of the signed-in user and create OneNote content (notebooks, section groups, sections, pages, etc.). Notes.ReadWrite and Notes.ReadWrite.All also allow the app to modify the permissions on the OneNote content that can be accessed by the signed-in user. For work or school accounts, Notes.Read.All and Notes.ReadWrite.All allow the app to access other users' OneNote content that the signed-in user has permission to within the organization. Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. Notifications permissionsDelegated permissions
RemarksNotifications.ReadWrite.CreatedByApp is valid for both Microsoft accounts and work or school accounts. The CreatedByApp constraint associated with this permission indicates that the service will apply implicit filtering to results based on the identity of the calling app, either the Microsoft account app ID or a set of app IDs configured for a cross-platform application identity. Example usageDelegated
Online meetings permissionsDelegated permissions
Application permissions
Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. On-premises publishing profiles permissionsDelegated permissions
Application permissions
OpenID Connect (OIDC) scopes
RemarksYou can use these scopes to specify artifacts that you want returned in Azure AD authorization and token requests. They are supported differently by the Azure AD v1.0 and v2.0 endpoints. With the Azure AD v1.0 endpoint, only the openid scope is used. You specify it in the scope parameter in an authorization request to return an ID token when you use the OpenID Connect protocol to sign in a user to your app. For more information, see Authorize access to web applications using OpenID Connect and Azure Active Directory. To successfully return an ID token, you must also make sure that the User.Read permission is configured when you register your app. With the Azure AD v2.0 endpoint, you specify the offline_access scope in the scope parameter to explicitly request a refresh token when using the OAuth 2.0 or OpenID Connect protocols. With OpenID Connect, you specify the openid scope to request an ID token. You can also specify the email scope, profile scope, or both to return additional claims in the ID token. You do not need to specify the User.Read permission to return an ID token with the v2.0 endpoint. For more information, see OpenID Connect scopes. Important The Microsoft Authentication Library (MSAL) currently specifies offline_access, openid, profile, and email by default in authorization and token requests. This means that, for the default case, if you specify these scopes explicitly, Azure AD may return an error. Organization permissionsDelegated permissions
Application permissions
Example usageDelegated
Application
Delegated permissions
Application permissions
Example usageDelegated
People permissionsDelegated permissions
Application permissions
RemarksThe People.Read.All permission is only valid for work and school accounts. Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Privileged access permissionsDelegated permissions
Application permissions
Places permissionsDelegated permissions
Application permissions
Policy permissionsDelegated permissions
Application permissions
Example usageThe following usages are valid for both delegated and application permissions:
For more complex scenarios involving multiple permissions, see Permission scenarios. Presence permissionsDelegated permissions
Application permissions
Example usage
Programs and program controls permissionsDelegated permissions
Application permissions
RemarksProgramControl.Read.All and ProgramControl.ReadWrite.All are valid only for work or school accounts. For an app with delegated permissions to read programs and program controls, the signed-in user must be a member of one of the following administrator roles: Global Administrator, Security Administrator, Security Reader or User Administrator. For an app with delegated permissions to write programs and program controls, the signed-in user must be a member of one of the following administrator roles: Global Administrator or User Administrator. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Records management permissionsDelegated permissions
Application permissions
Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Reports permissionsDelegated permissions
Application permissions
Remarks
Example usageApplication
For more complex scenarios involving multiple permissions, see Permission scenarios. Role management permissionsDelegated permissions
Application permissions
RemarksCaution Permissions that allow granting authorization, such as RoleManagement.ReadWrite.Directory, allow an application to grant itself, other applications, or any user, additional privileges. Use caution when granting any of these permissions. With the RoleManagement.Read.Directory permission an application can read directoryRoles and directoryRoleTemplates. This includes reading membership information for directory roles. With the RoleManagement.ReadWrite.Directory permission an application can read and write directoryRoles (directoryRoleTemplates are readonly resources). This includes adding and removing members to and from directory roles. Role management permissions are only valid for work or school accounts. Example usage
For more complex scenarios involving multiple permissions, see Permission scenarios. Schedule management permissions (private preview)Application permissions
Delegated permissions
Search permissionsApplication permissions
Delegated permissions
RemarksSearch permissions are only valid for work or school accounts. This search permission is only applicable to ingested data from the indexing API. Access to data via search requires the read permission to the item. Ex : Files.Read.All to access files via search. Example usageDelegated
Search configuration permissionsDelegated permissions
Application permissions
RemarksSearch configuration permissions are only valid for work or school accounts. Example usageDelegated and Application
Security permissionsDelegated permissions
Application permissions
RemarksSecurity permissions are valid only on work or school accounts. Example usageDelegated
Application
Service communications permissionsDelegated permissions
Application permissions
Short Notes permissions (private preview)Delegated permissions
Application permissions
Sites permissionsDelegated permissions
Application permissions
RemarksSites permissions are valid only on work or school accounts. The Sites.Selected application permission is available only in the Microsoft Graph API. Example usageDelegated
Subject rights request permissionsDelegated permissions
Application permissionsNone. Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Tasks permissionsDelegated permissions
Application permissionsNone. RemarksTasks permissions are used to control access for To Do tasks and Outlook tasks(deprecated). Access for Microsoft Planner tasks is controlled by Group permissions. Shared permissions are currently only supported for work or school accounts. Even with Shared permissions, reads and writes may fail if the user who owns the shared content has not granted the accessing user permissions to modify content within the folder. Example usageDelegated
For more complex scenarios involving multiple permissions, see Permission scenarios. Taxonomy permissionsDelegated permissions
RemarksTaxonomy permissions are valid only on work or school accounts. Example usageDelegated
Teams permissionsDelegated permissions
Application permissions
Team settings permissionsDelegated permissions
Application permissions
Teams activity permissionsDelegated permissions
Application permissions
Teams app permissions (deprecated)Note These permissions are deprecated. Use the equivalent TeamsAppInstallation.*.All permissions instead. Delegated permissions
Application permissions
Teams app installation permissionsDelegated permissions
Application permissions
Teams device management permissionsDelegated permissions
Application permissions
Team member permissionsDelegated permissions
Application permissions
Team resource-specific consent permissionsApplication permissions
Teams settings permissionsDelegated permissions
Application permissions
Teams tab permissionsDelegated permissions
Application permissions
Teams tag permissionsDelegated permissions
Application permissions
Tenant information permissionsDelegated permissions
Application permissions
Terms of use permissionsDelegated permissions
RemarksAll the permissions above are valid only for work or school accounts. For an app to read or write all agreements or agreement acceptances with delegated permissions, the signed-in user must be assigned the Global Administrator, Conditional Access Administrator or Security Administrator role. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Example usageDelegatedThe following usages are valid for both delegated permissions:
For more complex scenarios involving multiple permissions, see Permission scenarios. Threat assessment permissionsDelegated permissions
Application permissions
RemarksThreat assessment permissions are valid only on work or school accounts. Example usageDelegated
Application
Universal Print permissionsDelegated permissions
Application permissions
Remarks
Example usageDelegated
Application
User permissionsDelegated permissions
Application permissions
RemarksWith the User.Read permission, an app can also read the basic company information of the signed-in user for a work or school account through the organization resource. The following properties are available: id, displayName, and verifiedDomains. For work or school accounts, the full profile
includes all of the declared properties of the User resource. On reads, only a limited number of properties are returned by default. To read properties that are not in the default set, use
User.ReadWrite and User.Readwrite.All delegated permissions allow the app to update the following profile properties for work or school accounts:
With the User.ReadWrite.All application permission, the app can update all of the declared properties of work or school accounts except for password. With the User.ReadWrite.All delegated or application permission, updating another user's businessPhones, mobilePhone or otherMails is only allowed on users who are non-administrators or assigned one of the following roles: Directory Readers, Guest Inviter, Message Center Reader and Reports Reader. For more details, see Helpdesk (Password) Administrator in Azure AD available roles. To read or write direct reports ( The User.ReadBasic.All permission constrains app access to a limited set of properties known as the basic profile. This is because the full profile might contain sensitive directory information. The basic profile includes only the following properties:
To read the group memberships of a user ( With the User.ManageIdentities.All delegated or application permission, it is possible to update the identities ( Example usageDelegated
Application
For more complex scenarios involving multiple permissions, see Permission scenarios. User activity permissionsDelegated permissions
Application permissionsNone. RemarksUserActivity.ReadWrite.CreatedByApp is valid for both Microsoft accounts and work or school accounts. The CreatedByApp constraint associated with this permission indicates the service will apply implicit filtering to results based on the identity of the calling app, either the MSA app id or a set of app ids configured for a cross-platform application identity. Example usageDelegated
User authentication method permissions (preview)Delegated permissions
Application permissions
RemarksUser authentication method permissions are used to manage authentication methods on users. With these permissions, a delegated user or application can register new authentication methods on a user, read the authentication methods the user already has registered, update those authentication methods, and remove them from the user. With these permissions, all authentication methods can be read and managed on a user. This includes methods used for:
Windows updates permissionsDelegated permissions
Application permissions
RemarksAll the permissions above are valid only for work or school accounts. For an app to read or write all Windows update deployment settings with delegated permissions, the signed-in user must be assigned the Global Administrator, Intune Administrator, or Windows Update Deployment Administrator role. For more information about administrator roles, see Assigning administrator roles in Azure Active Directory. Example usageDelegated
Application
Permission scenariosThis section shows some common scenarios that target user and group resources in an organization. The tables show the permissions that an app needs to be able to perform specific operations required by the scenario. Note that in some cases the ability of the app to perform specific operations will depend on whether a permission is an application or delegated permission. In the case of delegated permissions, the app's effective permissions will also depend on the privileges of the signed-in user within the organization. For more information, see Delegated permissions, Application permissions, and effective permissions. Access scenarios on the User resource
Access scenarios on the Group resource
All permissions and IDs
FeedbackSubmit and view feedback for What is a program that restricts access to certain material on the Web?A Web filter, which is commonly referred to as "content control software", is a piece of software designed to restrict what websites a user can visit on his or her computer.
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
What is the most common form of software theft?Softlifting. The most common type of piracy, softlifting, (also called softloading), means sharing a program with someone who is not authorized by the license agreement to use it.
Which of the following kinds of certificate is a notice that guarantees a user or Web site is legitimate?
|