DictionaryForumContacts

   English
Terms for subject Microsoft containing policies | all forms | exact matches only
EnglishFrench
acceptable use policyrègles de bon usage (A statement issued by an Internet service provider or an online information service that indicates what activities users may or may not engage in while logged into the service. For example, some providers prohibit users from engaging in commercial activity on the network)
access policystratégie d'accès (A policy which defines the permissions and duration of access to an asset)
account policystratégie de compte (On local area networks and multiuser operating systems, a set of rules governing whether a new user is allowed access to the system and whether an existing user's rights are expanded to include additional system resources. An account policy also generally states the rules with which the user must comply while using the system in order to maintain access privileges)
accounting policystratégie comptable (A policy that prescribes the general principles and procedures that an organization follows to prepare statements that report on its performance)
Advanced Group Policy ManagementGestion avancée des stratégies de groupe (An extension to the Group Policy Management Console (GPMC) that provides change control and enhanced management for Group Policy objects (GPOs))
agent participation policystratégie de participation des agents (The administrator-defined policy which defines whether an agent needs to sign-in and out of response group groups in order to receive calls from the response group service)
anti-bullying supervision policystratégie de prévention de l'intimidation (" E-mail policy settings that administrators use to prevent a bully from sending e-mail messages to specific people by adding the bully's e-mail address as an entry on the "victim's" supervision list. This functionality supports anti-harassment policies in schools and other organizations.")
audit policystratégie d'audit (A policy that determines the security events to be reported to the network administrator)
Authorization Policies WizardAssistant Stratégies d'autorisation (A wizard that is available through Remote Desktop Gateway Manager that enables you to quickly configure a Remote Desktop connection authorization policy (RD CAP), a Remote Desktop resource authorization policy (RD RAP), and a computer group that is associated with an RD RAP)
bad word supervision policystratégie de prévention des mots impropres (" E-mail policy settings that prevent sending and receiving e-mail that has specifically banned content. Administrators can use this policy to reject e-mail that contains profanity or other objectionable words, also known as "bad words".")
binding policystratégie de liaison (A policy that establishes which version of an assembly is loaded by the common language runtime)
CAS policystratégie CAS (A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions)
certificate enrollment policystratégie d'inscription de certificats (A set of rules governing certificate enrollment)
Certificate Enrollment Policy Web Serviceservice Web Stratégie d'inscription de certificats (A role service within the AD CS server role that enables users and computers to obtain certificate enrollment policy information even when the computer is not a member of a domain or if a domain-joined computer is temporarily outside the security boundary of the corporate network)
certificate issuance policystratégie d'émission de certificats (A set of rules that defines all the security-relevant requirements (such as key management and authentication levels) that must be met when certificates are issued to users)
check-in policystratégie d'archivage (A policy that provides the ability to validate compliance with organizational rules for a team project)
client version policystratégie de la version client (A set of client version rules that defines the actions to be taken when users try to log on with specific clients and client versions)
closed campus supervision policystratégie de surveillance de campus fermé (E-mail policy settings that apply inbound and outbound e-mail restrictions so students can send e-mail to or receive e-mail from addresses inside the organization only. Administrators can set up organization-wide exceptions so e-mail can be sent to or from specific domains and public groups. Administrators can also configure per-user exceptions so students can send e-mail to and receive e-mail from specific addresses outside the organization)
code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissionsstratégie de sécurité d'accès du code (CAS)
Configuration Manager client policystratégie de configuration du client Gestionnaire de configuration (Configuration details for the Configuration Manager Client that are provided after client installation)
confirmation of receipt policystratégie de confirmation de réception (A policy that prescribes the functional location where the physical acceptance of items takes place)
DAC placement policystratégie de positionnement DAC (A PBM policy that comprises a set of conditions, which serve as prerequisites on the target instance of SQL Server where the DAC can be deployed)
data policystratégie de données (A policy that determines which XML elements in a document are valid for a particular action associated with an endpoint)
Diagnostic Policy Serviceservice de stratégie de diagnostic (A service in Windows that improve reliability by detecting impending failures and taking action to handle them by either initiating automatic corrective action or logging the appropriate diagnostic information for later root cause analysis, and/or notifying the user of an impending failure)
dynamic policy updatemise à jour de stratégie dynamique (The run-time retrieval of policies using the Rules Engine Update service)
effective policystratégie actuelle (The set of enabled policies for a target)
endpoint action data policystratégie de données d'action du point de terminaison (A policy that determines which XML elements in a document are valid for a particular action associated with an endpoint)
endpoint action policystratégie d'action du point de terminaison (A policy that determines which actions are valid for a particular endpoint)
failback policystratégie de restauration automatique (A set of parameters that an administrator can set for a failover cluster or server cluster that affect failback operations)
global policystratégie globale (An Office Communications Server policy that applies to all SIP users in an Active Directory forest)
Granular Audit PolicyStratégie d'audit granulaire (A Windows feature that helps administrators tune their audit policies at a more detailed level by using numerous subcategories, and better control what events are recorded in the event log)
group naming policystratégie de noms de groupes (A template applied to the distribution group names in your Microsoft Exchange organization. Specifically, you can specify that a prefix, a suffix, or both be applied to all distribution group names. You can also block certain words from being used in the names)
Group Policystratégie de groupe (A feature introduced with Windows 2000 that allows administrators to enforce computer-specific and user-specific settings to domain-based computers)
Group Policy ClientClient de stratégie de groupe (A local service that queries Active Directory at policy application time (at boot/logon or scheduled intervals) for the policy objects which pertain to it and applies them)
group policy enginemoteur de stratégie de groupe (The framework that handles common functionalities across client-side extensions including scheduling of Group Policy application, obtaining GPOs from relevant configuration locations, and filtering and ordering of GPOs)
Group Policy ManagementGestion des stratégies de groupe (An administrative tool designed to manage Group Policy across an enterprise. This includes day-to-day tasks, such as creating, deleting, linking, and copying Group Policy objects (GPOs), as well as setting security on GPOs. The Group Policy Management snap-in also provides reporting of GPO policy settings, as well as extended lifecycle functions such as backup and restore of GPOs)
Group Policy Management ConsoleConsole de gestion des stratégies de groupe (An administrative tool used to manage and edit domain-based Group Policy objects)
Group Policy ModelingModélisation de stratégie de groupe (A tool in Group Policy Management console that simulates what Group Policy settings are applied, given a specific set of criteria, including location of user or computer object in the directory, security group membership, and status of Windows Management Instrumentation (WMI) filters. You can use Group Policy Modeling to test new policy deployments before you deploy them. Also known as Resultant Set of Policy-Planning Mode)
Group Policy Object EditorÉditeur d'objets de stratégie de groupe (The Microsoft Management Console snap-in used to edit Group Policy objects)
Group Policy object linkliaison d'objet de stratégie de groupe (A method of applying settings in a Group Policy object (GPO) to an Active Directory container (site, domain, or organizational unit). Linking a GPO applies the settings of that GPO to the users and computers in a site, domain, or organizational unit and, by default, to the users and computers in all child containers)
Group Policy ResultsRésultats de stratégie de groupe (A tool in Group Policy Management console that gathers information about which Group Policy settings have actually been applied to a specific computer, user, or both. You can use this tool to troubleshoot the application of Group Policy settings. Also known as Resultant Set of Policy -- Logging Mode)
Group Policy Security Settingsparamètres de stratégie de sécurité de groupe (The subtrees of the Group Policy Object Editor that allow a security administrator to manually configure security levels assigned to a Group Policy object (GPO) or local computer policy)
Group Policy Software InstallationInstallation des logiciels de la stratégie de groupe (An extension to the editor that accompanies the Group Policy Management Console (GPMC). The extension is used to deploy software packages by using a domain-based Group Policy object)
health policystratégie de contrôle d'intégrité (A collection of software requirements, security update requirements, and required configuration settings for NAP client computers)
health policy validationvalidation de stratégie de contrôle d'intégrité (The process of verifying that a NAP client computer meets your defined health requirements)
inventory registration policystratégie d'enregistrement de stock (A policy that controls when stock that is stored in a supermarket is registered as inventory)
Local Group Policy EditorÉditeur d'objets de stratégie de groupe (The Microsoft Management Console snap-in used to edit Group Policy objects)
managed folder mailbox policystratégie de regroupement de dossiers gérés (A logical grouping of managed folders. When a managed folder mailbox policy is applied to a user's mailbox, all the managed folders that are linked to the policy are deployed in a single operation, thereby making the deployment of messaging records management (MRM) easier)
managed folder mailbox policyStratégie de boîte aux lettres de dossier géré (A logical grouping of managed folders. When a managed folder mailbox policy is applied to a user's mailbox, all the managed folders that are linked to the policy are deployed in a single operation, thereby making the deployment of messaging records management (MRM) easier)
management policystratégie de gestion (A definition of the workflows used for managing certificates within a Certificate Lifecyle Manager (CLM) profile template. A management policy defines who performs specific management tasks within the workflows, and provides management details for the entire lifecycle of the certificates within the profile template)
Management Policy RuleRègle de stratégie de gestion (A rule in ILM that defines a condition and the subsequent action to take when that condition is met. Management policy rules are used to model the business processing rules for incoming requests to ILM)
matching policystratégie de rapprochement (A policy that controls the purchase order, product receipt, and vendor invoice matching requirements in the accounts payable process. The policy can mandate no matching requirement or a combination of unit price matching, extended price matching, quantity matching, line matching, or total matching requirements)
Message Policyrègles de gestion des messages (A set of rules that are applied to e-mail messages. These rules govern how messages are processed and stored, based on a set of requirements. The requirements are typically based on regulatory requirements for an industry or geographic region)
Microsoft Online Management Policy AgentAgent de stratégies de Microsoft Online Management (An agent that lets administrators configure settings and collect the software and hardware inventory on the managed computer)
network inter-site policystratégie réseau intersite (Defines bandwidth limitations between sites that are directly linked within a call admission control (CAC) configuration)
Network Policy Server The Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server and proxy. In the NAP architecture, the NPS server includes the NAP administration server and the system health validator (SHV) componentsserveur NPS (Network Policy Server)
password policystratégie de mot de passe (A collection of policy settings that define the password requirements for a Group Policy object (GPO))
Password Policy optionoption Stratégie de mot de passe (The option on the Organizations page that sets parameters for passwords)
Password Replication PolicyStratégie de réplication de mot de passe (A set of access control lists (ACLs) that determine what credentials can or cannot be replicated on a read-only domain controller (RODC). Each RODC has a unique Password Replication Policy (PRP) that is enforced by the writable domain controller that is its replication partner)
permission policystratégie d'autorisation (An approach to restricting permission for a given document, workbook, presentation, or message. The policy defines which Office features are available, which information can be accessed, and what level of editing is allowed)
policy bar codestratégie de code-barres (An image that encodes a unique identifier for a Windows SharePoint Services object, where the value of the unique identifier can also be represented textually)
policy-based managementgestion basée sur des stratégies (A set of built-in functions that return server state information about values, objects, and settings in SQL Server. Policy Based Management allows a database administrator to declare the desired state of the system and checks the system for compliance with that state)
Policy Filter pagepage Filtre de stratégie (The page where administrators build customized rules for e-mail addresses and domains in the customer's organization)
policy modulemodule de stratégie (A Certificate Services component that determines whether a certificate request should be automatically approved, denied, or marked as pending)
policy processing sequenceséquence de traitement des stratégies (The order in which conflicts between policy rules are resolved. Policy rules defined at a lower level of the sequence always override conflicting policy rules at higher levels of the sequence)
policy rulerègle de stratégie (A rule in a policy that controls the actions that can or must be taken when the requirements of the condition are met)
Policy TipConseil de stratégie (Like a MailTip, a Policy Tip notifies Outlook users that they might be violating a data loss prevention (DLP) policy)
policy update flagindicateur de mise à jour de stratégie (A flag that is used to indicate that a workflow should be re-run as an effect of a change to the sets or Management Policy Rules referring to it)
protection policystratégie de protection (The collection of recurring job definitions and schedules associated with a protection group)
purchase agreement policystratégie des contrats d'achat (A policy that authorizes parties to modify purchase agreement terms)
purchase order policystratégie de commande fournisseur (A policy that authorizes parties to modify purchase order terms and to control order processing)
recovery policystratégie de récupération (A type of public key Group Policy object () used by Encrypting File System () that provides for one or more user accounts to be designated as recovery agents)
Remote Desktop connection authorization policystratégie d'autorisation des connexions aux services Bureau à distance (A policy that allows the administrator to specify who can connect to an RD Gateway server. Administrators can also specify requirements that users must meet to connect to an RD Gateway server. Administrators can configure RD CAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation)
Remote Desktop resource authorization policystratégie d'autorisation d'accès aux ressources via les services Bureau à distance (A policy that allows an administrator to specify the network resources that users can connect to through an RD Gateway server. Administrators can configure RD RAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation)
replication policystratégie de réplication (Rules that define how and when replication is performed)
Retention PolicyStratégie de rétention (A feature that allows the application of tags to individual Outlook items to specify retention policy for that message, conversation or other item)
retention policystratégie de rétention (A policy that specifies the length of time during which data, documents, and other records must be available for recovery)
role assignment policystratégie d'attribution de rôle (A collection of one or more end-user management roles that enable users to manage the settings of their Outlook Live account and public groups)
rounding policyrègle d'arrondi (A drop-down list on the price list item form from which a user can select how to round the price (up, down, or not at all))
sales agreement policystratégie des contrats de vente (A policy that authorizes parties to modify sales agreement terms)
sales order policystratégie de commande client (A policy that authorizes parties to modify sales order terms and to control order processing and payment processes)
security policystratégie de sécurité (The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run)
self-service policystratégie libre-service (A collection of configuration settings that determine the conditions under which a user or group can manage their own virtual machines through virtual machine self-service. The self-service policy assigns virtual machine permissions and templates. Self-service policies are configured for a host group)
sender policy frameworkSender Policy Framework (An extension of the SMTP protocol that prevents spammers from forging the From: fields in e-mail messages by verifying that the IP address in the SMTP Received: header is authorized to send e-mail for the sender's domain)
SMS Client policystratégie de configuration du client SMS (Configuration details for the SMS Client that are provided after client installation)
supervision policystratégie de surveillance (A set of e-mail policy settings that can help primary and secondary school administrators comply with some requirements of the Children's Internet Protection Act (CIPA). Using these policy settings, administrators can control who can send e-mail to and receive e-mail from the users in their organization, and filter and reject e-mail that contains objectionable words)
three-way matching policystratégie de rapprochement à trois facteurs (A matching policy that requires one or more vendor invoice prices to match with one or more purchase order prices and that requires one or more vendor invoice quantities to match with one or more product receipt quantities)
tiering policy enginemoteur de stratégie de hiérarchisation (A service that tracks regions of storage and may move data between them based on an input/output policy or other administrator-specified rules)
two-way matching policystratégie de rapprochement à deux facteurs (A matching policy that requires one or more vendor invoice prices to match with one or more purchase order prices)
user-based policiesstratégies utilisateur (Policies that are detailed enough to be applied to distribution groups, security groups, and individual users)
version policystratégie de version (The rules that specify which version of dependent assemblies to bind to. Version polices are expressed using configuration files)
voice policiesstratégies de voix (Define the following for each user, site, or organization that is assigned the policy: A set of calling features that can be enabled or disabled to determine the Enterprise Voice functionality that is available to users. Also, a set of PSTN usage records that define what types of calls are authorized)
Wired Group Policy ClientClient de stratégie de groupe câblé (A Group Policy Client in a wired environment)
Wireless Group Policy ClientClient de stratégie de groupe sans fil (A Group Policy Client in a wireless environment)
workflow policystratégie de workflow (A group of rules for a workflow)