DictionaryForumContacts

   English
Terms for subject Microsoft containing protection | all forms | exact matches only
EnglishGerman
Active Messaging Protectionaktiver Nachrichtenschutz (A process by which antivirus and anti-spam agents and filters are applied to e-mail messages for the purpose of stopping unsolicited or malicious e-mails from entering the organization)
analogue copy protectionAOD (A form of rights management based on technology developed by Macrovision, which prevents analogue output to be played back from VHS tape)
auto-protectionautomatischer Schutz (In DPM, a feature that automatically identifies and adds new data sources for protection)
copy protectionKopierschutz (A software lock placed on a computer program by its developer to prevent the product from being copied and distributed without approval or authorization)
copy-on-write page protectionSchutz durch Kopie bei Schreibvorgang (A concept that allows multiple applications to map their virtual address spaces to share the same physical pages, until an application needs to modify the page and have its own instance copy)
cyclic protectionzyklischer Schutz (A type of protection between two DPM servers where each server protects the data on the other)
data protectionSchutz von Daten (The process of protecting data from loss or corruption by centrally creating and maintaining replicas and shadow copies of the data. DPM is designed to provide short-term disk-based backup, to support rapid and reliable recovery of data)
Data Protection APIDatenschutz-API (A set of routines, protocols, and tools that provides information confidentiality to user and system processes by applying password-based cryptographic protection at the local operating system level)
DPM protection agentDPM-Schutz-Agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process)
DPM protection agent serviceDPM-Schutz-Agent-Dienst (The component of DPM that synchronizes replicas of protected data with the data sources. The DPM protection agent service receives changes to protected data from the servers and applies the changes to the replicas on the DPM server)
driver protection listTreiberschutzliste (A list of drivers known to cause instabilities when installed under Microsoft Windows XP and later versions. The list is checked at the following times: during installation of Windows; each time the system is rebooted; each time a device or application is installed)
Endpoint Protection ManagerEndpoint Protection-Manager (A security role that grants permissions to administrative users so that they can define and monitor security policies)
Endpoint Protection pointEndpoint Protection-Punkt (A site system role that Configuration Manager uses to accept the Endpoint Protection license terms and to configure the default membership for Microsoft Active Protection Service)
Extended Protection for AuthenticationErweiterter Schutz für die Authentifizierung (A security feature that helps protect against man-in-the-middle (MITM) attacks)
file protectionDateischutz (A process or device by which the existence and integrity of a file are maintained. Methods of file protection range from allowing read-only access and assigning passwords to covering the write-protect notch on a disk and locking away floppy disks holding sensitive files)
general protection faultallgemeine Schutzverletzung (The error condition that occurs in an 80386 or higher processor running in protected mode (such as Windows 3.1) when an application attempts to access memory outside of its authorized memory space or when an invalid instruction is issued)
IPsec Denial of Service ProtectionSchutz vor IPSec-Denial-of-Service-Angriffen (A feature that helps client machines to provide basic protection against denial-of-service attacks)
junk e-mail protectionJunk-E-Mail-Schutz, Schutz vor Junk-E-Mail (A feature that provides options for automatically identifying and filtering out junk e-mail messages)
Microsoft Malware Protection CenterMicrosoft Center zum Schutz vor Malware (A web portal that supplies the core malicious software (malware)-fighting technology, including the scanning engine and malware definition updates, for Microsoft Forefront Client Security, Forefront Server Security Management Console, Windows Live OneCare, Windows Defender, and other Microsoft security solutions and technologies)
Microsoft System Center Data Protection Manager 2006 Administrator ConsoleMicrosoft System Center Data Protection Manager 2006-Verwaltungskonsole (A Microsoft Management Console (MMC) snap-in that provides access to the administrative functions of DPM. DPM Administrator Console allows administrators to configure data protection, perform data recovery operations, and monitor and report on these activities)
Network Access ProtectionNetzwerkzugriffsschutz (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network)
New Protection Group WizardAssistent für neue Schutzgruppen (A wizard that is used to create a new protection group which will protect data on a user's file servers)
object protection levelObjektschutzebene (The integrity level of an object, stored in a token or an object's system access control list (SACL). The access check algorithm uses the object protection level to perform Mandatory Integrity Control (MIC))
on-access protectionzugriffsbasierter Schutz (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand)
primary protectionprimärer Schutz (A type of protection in which data on the protected server is directly protected by a primary DPM Server)
protection agentSchutz-Agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process)
protection configurationKonfiguration für den Schutz (The collection of settings that are common to a protection group; specifically, the protection group name, disk allocations, replica creation method, network bandwidth throttling, and on-the-wire compression)
protection groupSchutzgruppe (A collection of data sources that share the same protection configuration and schedule)
protection group memberSchutzgruppenmitglied (A data source within a protection group)
protection levelSchutzebene (The Microsoft implementation of an integrity level. In particular, a protection level, refers to an integrity label that contains only level information, without the additonal information traditionally contained within integrity level)
protection planSchutzplan (The collection of recurring job definitions and schedules associated with a protection group)
protection pointSchutzpunkt (A record of the computer's system settings and files at a specific moment in time)
protection policySchutzrichtlinie (The collection of recurring job definitions and schedules associated with a protection group)
protection scheduleSchutzzeitplan (A schedule that specifies whether the replica is synchronized with live data on the on an hourly or daily basis as well as the time when shadow copies of the replica are created)
protection warningSchutzwarnung (A status that indicates an Endpoint Protection issue that has occurred on a computer that is managed by Windows Intune)
Real-time protectionEchtzeitschutz (An option in Windows AntiSpyware that, when selected, provides spyware protection in real time)
secondary protectionsekundärer Schutz (A type of protection in which data on the protected server is protected by a primary DPM server and the replica on the primary DPM server is protected by a secondary DPM server)
software protectionSoftwareschutz (The process of protecting data from loss or corruption by preventing installation of driver software from untrusted sources)
SQL Server instance auto-protectionautomatischer Schutz für SQL Server-Instanzen (A type of protection that enables DPM to automatically identify and protect databases that are added to instances of SQL Server that are configured for auto-protection)
System ProtectionComputerschutz (A Windows technology that protects OS resources (files, folders registry keys) and prevents applications and administrators from making changes to a computer's resources in an arbitrary way)
Tracking ProtectionTracking-Schutz (The feature that blocks third-party web content that could potentially track someone's web activity)
virus protectionVirenschutz (A series of measures to protect a machine from being infected by a virus)
Windows Client ProtectionWindows-Clientschutz (A strategy including components and features of Windows Vista that allows system administrators to manage the system from one place by combining antivirus and anti-spyware software)
Windows File ProtectionWindows-Dateischutz (A feature that runs in the background and protects your system files from being overwritten. When a file in a protected folder is modified, WFP determines whether the new file is the correct Microsoft version or whether the file is digitally signed. If not, the modified file is replaced with a valid version)
Windows Resource ProtectionWindows-Ressourcenschutz (A feature in Windows that attempts to block the replacement of necessary system files to improve reliability and security)