DictionaryForumContacts

   English
Terms for subject Microsoft containing security | all forms | exact matches only
EnglishSpanish
absolute security descriptordescriptor de seguridad absoluto (A security descriptor structure that contains pointers to the security information associated with an object)
Active Directory Security Group Discovery methodmétodo de detección de grupos de seguridad de Active Directory (A Configuration Manager discovery method that searches for security group resources by polling Active Directory Domain Services)
callback securityseguridad de devolución de llamada (A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated)
code access securityseguridad de acceso del código (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissionsdirectiva de seguridad de acceso al código (CAS)
declarative security checkcomprobación de seguridad declarativa (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on)
Device Security ManagerAdministrador de seguridad de dispositivos (A feature in Visual Studio that allows you to configure device security and manage certificates on Windows Mobile-based devices)
enhanced securityseguridad mejorada (The security type that is used to describe the encrypted protocol used by Application Virtualization to provide secure communications on the various virtual application streaming deliveries leveraging Real Time Streaming Protocol Secure (RTSPS))
Generic Security Services Application Programming InterfaceAPI de servicios de seguridad genéricos (A generic API for performing client-server authentication that can be implemented over any authentication system. GSS-API makes it possible for applications to use the same API with different authentication mechanisms)
Group Policy Security Settingsconfiguración de seguridad de directiva de grupo (The subtrees of the Group Policy Object Editor that allow a security administrator to manually configure security levels assigned to a Group Policy object (GPO) or local computer policy)
hardware security modulemódulo de seguridad de hardware (A secure device that provides cryptographic capabilities, typically by providing private keys used in Public-key cryptography)
IEEE 802.1X security standardestándar IEEE 802.1X (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks)
imperative security checkcomprobación de seguridad imperativa (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method)
Internet Protocol securityprotocolo de seguridad de Internet (A set of industry-standard, cryptography-based services and protocols that help to protect data over a network)
Local Security Authority Subsystem Service An interface for managing local security, domain authentication, and Active Directory processes. It handles authentication for the client and for the server. It also contains features that are used to support Active Directory utilitiesLSASS, Servicio de subsistema de autoridad de seguridad local (LSASS)
login security modemodo de seguridad de inicio de sesión (A security mode that determines the manner in which an instance of SQL Server validates a login request)
mail-enabled universal security groupgrupo de seguridad universal habilitado para correo electrónico (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message)
Message Layer SecurityCapa de seguridad de mensajes (A cryptographic protocol that provides domain-to-domain secure transmission of SMTP messages on the Internet by using cryptography. The protocol enables SMTP servers to communicate directly or by using an SMTP relay over the Internet in a manner designed to prevent eavesdropping, tampering, and message forgery)
Microsoft Safety and Security CenterCentro de seguridad y protección de Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
Microsoft Safety & Security CenterCentro de seguridad y protección de Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety)
network security keyclave de seguridad de red (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
network security scandetección de seguridad de la red (An examination of servers for viruses, spyware, and malware)
role-based securityseguridad basada en roles (A method of limiting access to the Service Manager console)
Security AdministratorAdministrador de seguridad (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments)
Security AdministratorAdministrador de seguridad (A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments)
security advisoryaviso de seguridad (A notification addressing a security change that may affect the security of customers' computers)
Security APIAPI para seguridad (An API for asset protection, usage control, privacy, and policy application)
security associationasociación de seguridad (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver)
security auditauditoría de seguridad (The process that tracks the activities of users and records selected types of events in the security log)
security blanketconfiguración de seguridad de proxy (A group of values that describe the security settings that apply to all proxies in a process or to just a particular interface proxy)
security breachinfracción de seguridad (An event that compromises the security of a computer, application, network or other resource)
Security CenterCentro de seguridad (Windows launch point to manage security settings for automatic updates, internet options, or Windows Firewall)
security certificatecertificado de seguridad (A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service)
Security Configuration WizardAsistente para configuración de seguridad (A tool that automates security best practices to reduce the attack surface for a server. The SCW was introduced with Windows Server 2003 Service Pack 1)
security contextcontexto de seguridad (The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object)
security-criticalcrítico para la seguridad (Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the .NET Framework)
security descriptordescriptor de seguridad (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited)
security-edge gatewaypuerta de enlace de perímetro de seguridad (A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules)
security-enabled workgroupgrupo de trabajo con seguridad habilitada (An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups)
security extensionextensión de seguridad (A component in Reporting Services that authenticates a user or group to a report server)
security filearchivo de seguridad (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk)
security groupgrupo de seguridad (A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group)
security holevulnerabilidad de seguridad (An unintentionally unprotected entry point into an otherwise secure computer, component, application, or other online resource)
security hosthost de seguridad (An authentication device, supplemental to standard Windows and remote access server security, that verifies whether a caller from a remote client is authorized to connect to the remote access server)
security IDId. de seguridad (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
security identifieridentificador de seguridad (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created)
security logregistro de seguridad (An event log containing information on security events that are specified in the audit policy)
security modelmodelo de seguridad (A model that defines how access to data is controlled)
security packmódulo de administración de seguridad (A kind of management pack that contains the logic to monitor the security events for a specified application)
security packagepaquete de seguridad (The software implementation of a security protocol. Security packages are contained in security support provider dynamic-link libraries (DLLs) or in security support provider/authentication package DLLs)
security policydirectiva de seguridad (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run)
security principalentidad de seguridad (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources)
security principal namenombre de entidad de seguridad (A name that uniquely identifies a user, group, or computer within a single domain. This name is not guaranteed to be unique across domains)
security protocolprotocolo de seguridad (A specification that defines security-related data objects and rules about how the objects are used to maintain security on a computer system)
security rolerol de seguridad (A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system)
security-safe-criticalcrítico para la seguridad y disponible desde código transparente (Pertaining to a type or member that accesses secure resources and can be safely used by partially trusted code in the .NET Framework)
Security Serverservidor de seguridad (Centro server that hosts primary security roles and workloads)
security settingsconfiguración de seguridad (Settings used to specify privacy, security, and logon configurations for Windows)
security support provider A dynamic-link library (DLL) that implements the Security Support Provider Interface (SSPI) by making one or more security packages available to applications. Each security package provides mappings between an application' SSPI function calls and an actual security model' functions. Security packages support security protocols such as Kerberos and NTLMSSP, proveedor de compatibilidad para seguridad (SSP)
Security Support Provider Interfaceinterfaz del proveedor de compatibilidad para seguridad SSPI, SSPI (A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details)
security testprueba de seguridad (A test that looks for attack paths that might be used to gain access to assets)
security tokentoken de seguridad (A cryptographically signed data unit that transfers authentication and authorization information, based on a credential)
security token serviceservicio de token de seguridad (A Web service that issues security tokens. A security token service makes assertions based on evidence that it trusts to whoever trusts it. To communicate trust, this service requires proof, such as a security token or set of security tokens, and it issues a security token with its own trust statement. (Note that for some security token formats, this can simply be a reissuance or cosignature) In Active Directory Federation Services (ADFS), the Federation Service is a security token service)
security-transparenttransparente en seguridad (Pertaining to a type or member that is partially trusted and that cannot expose access to any protected resources or functionality)
security trimmingrecorte de seguridad (The process of limiting search results based on the identity of the user who submitted the query)
security updateactualización de seguridad (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
security update packagepaquete de actualización de seguridad (" A broadly released fix for a product-specific security-related vulnerability. Security vulnerabilities are rated based on their severity which is indicated in the Microsoft's security bulletin as "critical," "important," "moderate, or "low.")
SIM securityseguridad de SIM (A toggle switch that you tap to enter a SIM PIN)
SIM securitySeguridad de SIM (A toggle switch that you tap to enter a SIM PIN)
Simple Authentication and Security LayerNivel de seguridad y autenticación simples, SASL (An open framework, described in Request for Comments (RFC) 2222, for adding authentication support to connection-based protocols)
social security numbernúmero de la seguridad social (In the United States, a Taxpayer Identification Number assigned to citizens and some noncitizens. The number is required for anyone to obtain work or to receive governmental benefits, such as social security payments after retirement)
Transport Layer SecuritySeguridad de la capa de transporte (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol)
Transport Layer Security encryptioncifrado Seguridad de la capa de transporte (A generic security protocol similar to Secure Sockets Layer (SSL), used with Simple Mail Transfer Protocol (SMTP))
Web Services SecuritySeguridad de Servicios web (A series of specifications that describe how to attach signature and encryption headers to Simple Object Access Protocol (SOAP) messages. In addition, WS-Security describes how to attach security tokens, including binary security tokens such as X.509 certificates and Kerberos tickets, to messages. In Active Directory Federation Services (ADFS), WS-Security is used when Kerberos signs security tokens)
Windows Firewall with Advanced SecurityFirewall de Windows con seguridad avanzada (A snap-in which allows users to configure policies that provide enhanced network security for Windows computers)
Windows NT Integrated Securityseguridad integrada de Windows NT (A security mode that leverages the Windows NT authentication process)