German | English |
automatischer Schutz | auto-protection (In DPM, a feature that automatically identifies and adds new data sources for protection) |
automatischer Schutz für SQL Server-Instanzen | SQL Server instance auto-protection (A type of protection that enables DPM to automatically identify and protect databases that are added to instances of SQL Server that are configured for auto-protection) |
DPM-Schutz-Agent | DPM protection agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process) |
DPM-Schutz-Agent-Dienst | DPM protection agent service (The component of DPM that synchronizes replicas of protected data with the data sources. The DPM protection agent service receives changes to protected data from the servers and applies the changes to the replicas on the DPM server) |
Erweiterter Schutz für die Authentifizierung | Extended Protection for Authentication (A security feature that helps protect against man-in-the-middle (MITM) attacks) |
Junk-E-Mail-Schutz, Schutz vor Junk-E-Mail | junk e-mail protection (A feature that provides options for automatically identifying and filtering out junk e-mail messages) |
Konfiguration für den Schutz | protection configuration (The collection of settings that are common to a protection group; specifically, the protection group name, disk allocations, replica creation method, network bandwidth throttling, and on-the-wire compression) |
Microsoft Center zum Schutz vor Malware | Microsoft Malware Protection Center (A web portal that supplies the core malicious software (malware)-fighting technology, including the scanning engine and malware definition updates, for Microsoft Forefront Client Security, Forefront Server Security Management Console, Windows Live OneCare, Windows Defender, and other Microsoft security solutions and technologies) |
primärer Schutz | primary protection (A type of protection in which data on the protected server is directly protected by a primary DPM Server) |
Schutz-Agent | protection agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process) |
Schutz aufheben | unprotect (To remove access restrictions or permissions for a file or specific elements within a file) |
Schutz durch Kopie bei Schreibvorgang | copy-on-write page protection (A concept that allows multiple applications to map their virtual address spaces to share the same physical pages, until an application needs to modify the page and have its own instance copy) |
Schutz-MBR | Protective MBR (The first sector of a GUID partition table (GPT) disk that is structured like the first sector of a master boot record (MBR) disk to prevent x86-based disk utilities from destroying GPT partitions. The Protective MBR contains one partition that reserves the entire space used on the disk by GPT partitions) |
Schutz von Daten | data protection (The process of protecting data from loss or corruption by centrally creating and maintaining replicas and shadow copies of the data. DPM is designed to provide short-term disk-based backup, to support rapid and reliable recovery of data) |
Schutz vor IPSec-Denial-of-Service-Angriffen | IPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
sekundärer Schutz | secondary protection (A type of protection in which data on the protected server is protected by a primary DPM server and the replica on the primary DPM server is protected by a secondary DPM server) |
Tracking-Schutz | Tracking Protection (The feature that blocks third-party web content that could potentially track someone's web activity) |
zugriffsbasierter Schutz | on-access protection (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand) |
zyklischer Schutz | cyclic protection (A type of protection between two DPM servers where each server protects the data on the other) |