English | German |
Active Messaging Protection | aktiver Nachrichtenschutz (A process by which antivirus and anti-spam agents and filters are applied to e-mail messages for the purpose of stopping unsolicited or malicious e-mails from entering the organization) |
analogue copy protection | AOD (A form of rights management based on technology developed by Macrovision, which prevents analogue output to be played back from VHS tape) |
auto-protection | automatischer Schutz (In DPM, a feature that automatically identifies and adds new data sources for protection) |
copy protection | Kopierschutz (A software lock placed on a computer program by its developer to prevent the product from being copied and distributed without approval or authorization) |
copy-on-write page protection | Schutz durch Kopie bei Schreibvorgang (A concept that allows multiple applications to map their virtual address spaces to share the same physical pages, until an application needs to modify the page and have its own instance copy) |
cyclic protection | zyklischer Schutz (A type of protection between two DPM servers where each server protects the data on the other) |
data protection | Schutz von Daten (The process of protecting data from loss or corruption by centrally creating and maintaining replicas and shadow copies of the data. DPM is designed to provide short-term disk-based backup, to support rapid and reliable recovery of data) |
Data Protection API | Datenschutz-API (A set of routines, protocols, and tools that provides information confidentiality to user and system processes by applying password-based cryptographic protection at the local operating system level) |
DPM protection agent | DPM-Schutz-Agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process) |
DPM protection agent service | DPM-Schutz-Agent-Dienst (The component of DPM that synchronizes replicas of protected data with the data sources. The DPM protection agent service receives changes to protected data from the servers and applies the changes to the replicas on the DPM server) |
driver protection list | Treiberschutzliste (A list of drivers known to cause instabilities when installed under Microsoft Windows XP and later versions. The list is checked at the following times: during installation of Windows; each time the system is rebooted; each time a device or application is installed) |
Endpoint Protection Manager | Endpoint Protection-Manager (A security role that grants permissions to administrative users so that they can define and monitor security policies) |
Endpoint Protection point | Endpoint Protection-Punkt (A site system role that Configuration Manager uses to accept the Endpoint Protection license terms and to configure the default membership for Microsoft Active Protection Service) |
Extended Protection for Authentication | Erweiterter Schutz für die Authentifizierung (A security feature that helps protect against man-in-the-middle (MITM) attacks) |
file protection | Dateischutz (A process or device by which the existence and integrity of a file are maintained. Methods of file protection range from allowing read-only access and assigning passwords to covering the write-protect notch on a disk and locking away floppy disks holding sensitive files) |
general protection fault | allgemeine Schutzverletzung (The error condition that occurs in an 80386 or higher processor running in protected mode (such as Windows 3.1) when an application attempts to access memory outside of its authorized memory space or when an invalid instruction is issued) |
IPsec Denial of Service Protection | Schutz vor IPSec-Denial-of-Service-Angriffen (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
junk e-mail protection | Junk-E-Mail-Schutz, Schutz vor Junk-E-Mail (A feature that provides options for automatically identifying and filtering out junk e-mail messages) |
Microsoft Malware Protection Center | Microsoft Center zum Schutz vor Malware (A web portal that supplies the core malicious software (malware)-fighting technology, including the scanning engine and malware definition updates, for Microsoft Forefront Client Security, Forefront Server Security Management Console, Windows Live OneCare, Windows Defender, and other Microsoft security solutions and technologies) |
Microsoft System Center Data Protection Manager 2006 Administrator Console | Microsoft System Center Data Protection Manager 2006-Verwaltungskonsole (A Microsoft Management Console (MMC) snap-in that provides access to the administrative functions of DPM. DPM Administrator Console allows administrators to configure data protection, perform data recovery operations, and monitor and report on these activities) |
Network Access Protection | Netzwerkzugriffsschutz (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
New Protection Group Wizard | Assistent für neue Schutzgruppen (A wizard that is used to create a new protection group which will protect data on a user's file servers) |
object protection level | Objektschutzebene (The integrity level of an object, stored in a token or an object's system access control list (SACL). The access check algorithm uses the object protection level to perform Mandatory Integrity Control (MIC)) |
on-access protection | zugriffsbasierter Schutz (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand) |
primary protection | primärer Schutz (A type of protection in which data on the protected server is directly protected by a primary DPM Server) |
protection agent | Schutz-Agent (Software, installed on a server, that tracks changes to protected data and transfers the changes to the DPM server. The protection agent also identifies data on a server that can be protected and is involved in the recovery process) |
protection configuration | Konfiguration für den Schutz (The collection of settings that are common to a protection group; specifically, the protection group name, disk allocations, replica creation method, network bandwidth throttling, and on-the-wire compression) |
protection group | Schutzgruppe (A collection of data sources that share the same protection configuration and schedule) |
protection group member | Schutzgruppenmitglied (A data source within a protection group) |
protection level | Schutzebene (The Microsoft implementation of an integrity level. In particular, a protection level, refers to an integrity label that contains only level information, without the additonal information traditionally contained within integrity level) |
protection plan | Schutzplan (The collection of recurring job definitions and schedules associated with a protection group) |
protection point | Schutzpunkt (A record of the computer's system settings and files at a specific moment in time) |
protection policy | Schutzrichtlinie (The collection of recurring job definitions and schedules associated with a protection group) |
protection schedule | Schutzzeitplan (A schedule that specifies whether the replica is synchronized with live data on the on an hourly or daily basis as well as the time when shadow copies of the replica are created) |
protection warning | Schutzwarnung (A status that indicates an Endpoint Protection issue that has occurred on a computer that is managed by Windows Intune) |
Real-time protection | Echtzeitschutz (An option in Windows AntiSpyware that, when selected, provides spyware protection in real time) |
secondary protection | sekundärer Schutz (A type of protection in which data on the protected server is protected by a primary DPM server and the replica on the primary DPM server is protected by a secondary DPM server) |
software protection | Softwareschutz (The process of protecting data from loss or corruption by preventing installation of driver software from untrusted sources) |
SQL Server instance auto-protection | automatischer Schutz für SQL Server-Instanzen (A type of protection that enables DPM to automatically identify and protect databases that are added to instances of SQL Server that are configured for auto-protection) |
System Protection | Computerschutz (A Windows technology that protects OS resources (files, folders registry keys) and prevents applications and administrators from making changes to a computer's resources in an arbitrary way) |
Tracking Protection | Tracking-Schutz (The feature that blocks third-party web content that could potentially track someone's web activity) |
virus protection | Virenschutz (A series of measures to protect a machine from being infected by a virus) |
Windows Client Protection | Windows-Clientschutz (A strategy including components and features of Windows Vista that allows system administrators to manage the system from one place by combining antivirus and anti-spyware software) |
Windows File Protection | Windows-Dateischutz (A feature that runs in the background and protects your system files from being overwritten. When a file in a protected folder is modified, WFP determines whether the new file is the correct Microsoft version or whether the file is digitally signed. If not, the modified file is replaced with a valid version) |
Windows Resource Protection | Windows-Ressourcenschutz (A feature in Windows that attempts to block the replacement of necessary system files to improve reliability and security) |