English | Dutch |
Access Control Entry Management View | weergave Access Control Entry-beheer (A feature that allows the user to set access levels for a group of contacts) |
Access Levels Management | Toegangsniveaubeheer (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
ACE Management View | weergave ACE-beheer (A feature that allows the user to set access levels for a group of contacts) |
Active Directory Management Agent | Active Directory-beheeragent (The Identity Lifecycle Manager management agent provided by Microsoft to connect to Active Directory Domain Services (AD DS) or Active Directory directory service) |
Advanced Power Management | Geavanceerd energiebeheer, Advanced Power Management (An older power management technology used in mobile PCs before the implementation of Advanced Configuration and Power Interface (ACPI). Advanced Power Management is a software interface that functions between the BIOS power-management software that is specific to the hardware and a power-management policy driver that is run by the operating system) |
assigned management point | toegewezen beheerpunt (The default management point at the assigned primary site for the Configuration Manager client) |
Audit and Control Management Server | Controle- en beheerserver (A Microsoft Office product that provides non-intrusive auditing of changes made to Excel spreadsheets and Access databases, and supports alerts, notifications and automatic workflows based on user activities such as macro or formula changes) |
change management | wijzigingsbeheer (The practice of administering changes with the help of tested methods and techniques in order to avoid new errors and minimize the impact of changes) |
contact management | contactpersonenbeheer (The process of managing business and/or social contacts in order to follow up, track conversations, etc) |
Custom Spam Filter Management option | optie Aangepast spamfilterbeheer (" An area on the Spam Filter page that gives IT administrators the ability to select various content attributes of a message that either increase the potential for the message to be quarantined as spam (the "spam score") or absolutely quarantine messages that contain specific attributes.") |
customer relations management | beheer van klantrelaties (The business area related to managing a company's interactions with its customers, including sales, service, and delivery of product. Software solutions are designed and implemented specifically to manage this business area) |
customer relationship management | Customer Relationship Management (The process of building profitable customer relationships through the delivery of highly targeted interactions at all customer touch points by aligning marketing, sales and service functions and systems) |
Demand Management | Vraagbeheer (A feature that captures and manages work proposals in a single location. Proposals move through a customizable, multi-stage governance process that may include review, selection of proposals for approval, and tracking the execution of approved proposals through to completion) |
dependent change management activity | afhankelijke wijzigingsbeheeractiviteit (A change management activity that is used to link change requests to a release record) |
device management | apparaatbeheer (The exchange of requests and responses that control and configure the operational state of a device. Device management requires the use of a Communication Class interface) |
device management point | apparaatbeheerpunt (A Configuration Manager site system that communicates with mobile device clients and that must be hosted on a Configuration Manager management point) |
digital rights management | Digital Rights Management, digital rights management (Any technology used to protect the interests of owners of digital content and services (such as copyright owners). Typically, authorized recipients or users must acquire a license in order to use the content) |
digital rights management component | DRM-onderdeel (The component of a player that handles all functions of digital rights management, such as decrypting packaged files or initiating license acquisition) |
Directory Management Service | Directory Management-service (A service used to manage distribution lists) |
Discovery Management | Discovery-beheer (The role group that gives users the permissions needed to use Multi-Mailbox Search) |
document management | documentbeheer (The capability to view and manage SharePoint documents from Microsoft Dynamics CRM) |
document management system | documentbeheersysteem (An application service for storing and handling an organization's documents) |
Emergency Management Services | Noodsituatiebeheerservices (Services that enable the administrator to interact with a system that might not be available through the usual network mechanisms) |
enterprise resource management | resourcebeheer voor ondernemingen (The business area related to managing the financial, human, and physical assets and resources of a company. Software solutions are designed and implemented specifically to manage these assets and resources) |
Exchange Management Shell | Exchange-beheershell (A command-line interface and associated command-line plug-ins for Exchange Server that enable automation of administrative tasks. The Exchange Management Shell is built on Windows PowerShell technology, formerly codenamed Monad) |
Failover Cluster Management snap-in | invoegtoepassing Failover Cluster Management (A Microsoft Management Console (MMC) snap-in that is used to validate failover cluster configurations, create and manage failover clusters, and migrate certain settings to a cluster running the Windows Server 2008 operating system) |
Group Policy Management Console | console Groepsbeleidbeheer (An administrative tool used to manage and edit domain-based Group Policy objects) |
Group Policy Management Editor | Groepsbeleidsbeheer-editor (The editor window used to edit domain-based Group Policy in the Group Policy Management Console) |
hosted management agent | gehoste beheeragent (An Identity Lifecycle Management (ILM) component that consists of properties, rules, and rule extensions that determine how an object is processed and that provides services to client computers or organizations that connect from remote locations) |
human capital management cycle | cyclus van Human Capital-beheer (A recurring set of recruitment, hiring, training, compensation, and performance evaluation activities performed by parties that compensate employees and contractors in exchange for services) |
Identity Management for UNIX | Identiteitsbeheer voor UNIX (A feature of Windows that integrates computers running Windows into an existing UNIX enterprise) |
Information Rights Management Services | Information Rights Management-services (An information protection technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use) |
Intel Active Management Technology An Intel networking management technology that is supported by Configuration Manager out of band management, which enables a Configuration Manager administrator to manage desktop computers independently from the Configuration Manager client or the computer operating system | Intel AMT (Active Management Technology) |
Internet-based client management | clientbeheer via internet (A feature in Configuration Manager that allows you to manage computers that have the Configuration Manager client agent but do not connect into the network through a VPN or dial-up connection) |
inventory management | voorraadbeheer (The branch of management that plans and controls the holding of inventory. Inventory management does not manage the inventory itself, but rather plans for such things as levels to maintain) |
inventory management | voorraadbeheer (The branch of management that plans and controls the holding of inventory. Inventory management does not manage the inventory itself, but rather plans for such things as levels to maintain) |
IP Address Management | IP-adresbeheer (A built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS)) |
Key Management Server | Sleutelbeheerserver (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
Key Management Service | service voor sleutelbeheer (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
Leave Management | Verlofbeheer (The Duet end-user application that allows users to self-manage their absence or availability for payroll purposes. Users can create and manage leave requests in Microsoft Office Outlook in the form of Calendar items, which are integrated with approval guidelines and business-defined processes defined in SAP systems) |
management agent | beheeragent (A component that consists of properties, rules, and rules extensions that determine how an object is processed in the metadirectory. A single management agent can have one or more run profiles that determine the management agent's behavior, such as how or when the management agent runs) |
Management API | Beheer API (An API that contains controls and features for deploying, administering, and managing apps) |
management application | beheertoepassing (An application or Windows 2000/Windows NT service that uses information originating from one or more managed objects in a managed environment. Management applications retrieve this information through calls to the CIM Object Manager API from the CIM Object Manager and from providers) |
management console | beheerconsole (A network-enabled host running Simple Network Management Protocol (SNMP) management software. This software requests information from SNMP agents) |
management group | beheergroep (The basic functional unit of an Operations Manager 2007 implementation that can perform monitoring. It must contain a SQL Server 2005 database server, a Root Management Server, one or more Operations Consoles and one or more agents. In addition it can also contain a Reporting Server, gateway server, Audit Collection Services server, and additional collector management servers) |
Management Information Format file | Management Information Format-bestand (A file that can be used to modify the SMS/Configuration Manager database by creating architectures, object classes, and attributes) |
management pack file | management pack-bestand (A file that is associated with an Operations Manager management pack and that incorporates overrides, custom monitors, and custom rules) |
management point | beheerpunt (The Configuration Manager site system role that serves as the primary point of contact between Advanced Clients and the Configuration Manager site server) |
management policy | informatiebeheerbeleid (A definition of the workflows used for managing certificates within a Certificate Lifecyle Manager (CLM) profile template. A management policy defines who performs specific management tasks within the workflows, and provides management details for the entire lifecycle of the certificates within the profile template) |
Management Policy Rule | Beheerbeleidsregel (A rule in ILM that defines a condition and the subsequent action to take when that condition is met. Management policy rules are used to model the business processing rules for incoming requests to ILM) |
management server | beheerserver (The component of an Operations Manager management group that is responsible for communication with agents, databases, and the root management server) |
management server | managementserver (The communication layer between the Runbook Designer and the deployment manager to the database) |
management system | beheersysteem (A network-enabled host running Simple Network Management Protocol (SNMP) management software. This software requests information from SNMP agents) |
messaging records management | Messaging Records Management (Records management technology in Exchange 2007 that helps organizations to reduce the risks that are associated with e-mail and other communications. MRM makes it easier to keep messages that are needed to comply with company policy, government regulations, or legal needs, and to remove content that has no legal or business value) |
Microsoft Rights Management sharing application | Microsoft Rights Management-toepassing voor delen (The application that permits consumption and creation of RMS-protected content on PCs or mobile devices) |
Multi-Factor Authentication Management Portal | Multi-Factor Authentication-beheerportal (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports) |
Multilanguage MUI Resource Management A centralized mechanism for managing language resources, helping developers create contextually tailored and consistent experiences by reducing code complexity and fragility | MUI-bronbeheer (Multilanguage) |
out of band management | buiten-bandbeheer (A feature in Configuration Manager that allows computers to be managed outside standard management channels by connecting to a supported management controller. This management channel is independent from the Configuration Manager client and the operating system) |
pain management | pijnbeheer (A variety of techniques including pharmacological and nonpharmacological methods to prevent, alleviate, or stop pain) |
performance management | prestatiebeheer (The modification of a process or task to improve performance to meet an established standard) |
potency management | potentiebeheer (A method of classifying and managing active ingredients and items that contain a particular concentration of an active ingredient) |
power management | energiebeheer (Mechanisms in software and hardware to minimize system power consumption, manage system thermal limits, and maximize system battery life. Power management involves trade-offs among system speed, noise, battery life, processing speed, and power consumption) |
power management | energiebeheer (Mechanisms in software and hardware to minimize system power consumption, manage system thermal limits, and maximize system battery life. Power management involves trade-offs among system speed, noise, battery life, processing speed, and power consumption) |
problem management | probleembeheer (The process by which the root cause of one or more incidents is identified and by which a workaround or a permanent fix is found) |
quarantine management | quarantainebeheer (The process and procedures for handling items that move to and from quarantine) |
quotation management | offertebeheer (The process of creating, adjusting, issuing, processing, and tracking a quotation from beginning, when customer information is collected, to ending, when the quotation is lost, canceled, or accepted) |
RD Management Console | Implementatie van Extern bureaublad-services op basis van sessies (A Server Manager component for Remote Desktop Services used to deploy, configure and manage RDS deployments) |
relational database management system | Relational Database Management Systeem (A database system that organizes data into related rows and columns as specified by a relational model) |
remote management | extern beheer (For an administrator, the process of managing Windows SteadyState Windows Disk Protection from a remote computer through Active Directory Group Policy) |
RemoteApp and Desktop Connection Management | RemoteApp- en Extern bureaublad-verbindingsbeheer (A Windows Server role service for Remote Desktop Services (i.e. a RD subrole) that houses the assignment, connection handling, and execution designation policy, thus defining the contents and availability of a remote workspace) |
Request Management | Aanvraagbeheer (A SharePoint feature that helps make smart routing decisions, based on routing rules that relate the nature of requests to the dynamic topology of its farm) |
request management | aanvraagbeheer (The ability for a user to interact with and manage submitted requests and associated workflows) |
Resource Management System | resourcebeheersysteem (A technology that enables developers to localize their apps based on each user's preferred language and current resolution) |
rights management | beheer van rechten (A technology that provides persistent protection to digital data using encryption, certificates, and authentication. Authorized recipients or users must acquire a license in order to consume the protected files, according to the rights, or business rules, set by the content owner) |
risk management plan | risicobeheerplan (A document defining how risk will be managed throughout the project. It can include identified risks, probabilities, contingency plans and methods for implementing them, and a strategy for allocating resources if a risk event occurs) |
Rule Management area | gebied Regelbeheer (The area of the Policy Filter page where administrators add and manage rules (such as Reject, Redirect, Deliver with Bcc) that define actions to take when conducting spam and virus filtering) |
Scan Management | Scanbeheer (A MMC snap-in tool under Print and Document Services that is used for managing network scanners, and configuring your Distributed Scan Server and how scans should be processed) |
Service Manager data warehouse management server | beheerserver van Service Manager-datawarehouse (The Service Manager management server that performs the management functions for the data warehouse) |
Service Manager management server | beheerserver van Service Manager (The server that hosts the System Center Data Access Service service and Microsoft Office SharePoint sites) |
software asset management | Software Asset Management (A best practice incorporating a set of proven processes and procedures for managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. SAM practice helps to manage risk from counterfeit as well as improperly licensed software) |
supply chain management | toeleveringsbeheer (The management of a network of interconnected businesses involved in the ultimate provision of product and service packages required by end customers) |
System Center Management APM service | System Center Management APM-service (A service that processes events collected from the monitored systems) |
System Center Management Health service | System Center Management Health-service (The Windows-based service responsible for executing management packs as part of the Operations Manager agent and server components) |
Team Management | Teambeheer (The Duet end-user application that enables users to view up-to-date information about other users, open positions across divisions, and organizational structures in Microsoft Office Outlook. Users can view these in Outlook in the form of Outlook Contact items or Office documents that are integrated with and retrieved from SAP systems) |
Time Management | Tijdbeheer (The Duet end-user application that enables users to view, create, and maintain their data for time recording activities in Microsoft Office Outlook. Users can add time-reporting data in Outlook in the form of Calendar items, which are integrated with time-reporting-compliance guidelines defined in SAP systems) |
Total Quality Management diagram | Total Quality Management-diagram (A flowchart used to compare current and ideal processes, and to understand how the steps in a process work together) |
Transporter Management Console | Transporter-beheerconsole (The snap-in for Microsoft Management Console that installs with the Microsoft Transporter Suite) |
UM Management | UM-beheer (The role group that gives users the permissions to manage Unified Messaging (UM) server configurations, UM properties on mailboxes, UM prompts, and UM auto attendant configuration) |
Virtual Machine Management service | Virtual Machine Management-service (The Hyper-V service that provides management access to virtual machines) |
Volume Activation Management Tool | Hulpprogramma voor volumeactivering (An MMC snap-in that enables IT professionals to automate and centrally manage the Windows and Microsoft Office volume and retail activation process. VAMT can manage volume activation by using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS)) |
Web Server Management Enumerator module | Web Server Management Enumerator-module (A probe action module type that performs a WS-Management Enumerate operation) |
Windows Azure Multi-Factor Authentication Management Portal | Windows Azure Multi-Factor Authentication-beheerportal (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports) |
Windows Management Instrumentation filter | Windows Management Instrumentation-filter (A query that is based on Windows Management Instrumentation (WMI) and used to filter the effect of a Group Policy object (GPO). WMI filters are written in WMI Query Language (WQL) and are evaluated on the target computer or user. If the filter evaluates to true, then the GPO is applied. Otherwise, the GPO is not applied. WMI filters are useful for exception management) |
Work Management Service | Werkbeheerservice (A SharePoint shared service that aggregates tasks that systems such as SharePoint, Project Server, and Exchange assign to users) |
Work Management Task Sync | Taken synchroniseren via Werkbeheer (A component of the Work Management Service that synchronizes tasks with systems outside of SharePoint, such as an Exchange mailbox, to enable task management in Outlook) |
workflow management | werkstroombeheer (A feature area of ILM 2 that deals with designing workflows, executing them and managing them. Workflow management consists of the Workflow Designer, request management and the workflow host) |
Workflow Management service | Werkstroombeheerservice (A Windows service that manages the execution of instance control commands, the recovery of workflow service hosts, and the resumption of instances in the event of expired timers) |