Examples of using Policy-based in English and their translations into Dutch
{-}
-
Official
-
Colloquial
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
In Windows Server® 2008 R2 and Windows 7®, policy-based QoS combines the functionality of QoS standards with the manageability of Group Policy.
that is in no small part due to our policy-based financial assistance and budgetary support.
centralized Group Policy-based configuration of IPsec, IPv6, and other settings.
infrastructure, policy-based, and soft measures to improve performance
Reviewing- and amending where necessary- the technical, policy-based, legal, financial,
We recommend that you only select Policy-based mode if you are an administrator who intends to control network communication
The Throttle Rate in policy-based QoS settings enables you to manage the sending rate for outbound network traffic,
allows user monitoring in a detailed, policy-based way.
This setting specifies that policy-based folder redirection was removed for that GPO
including ceilings, for policy-based guarantees, ensuring in particular that their use does not lead to excessive levels of debt of public bodies.
for defining the specific rules and conditions of policy-based guarantees.
The revised instrument is an integral part of the overall architecture of external action financial instruments which will be organised around four main chapters: a policy-based chapter aiming primarily at cooperation with partner countries within
Both policy-based and technological developments ask for continuous innovation,
Lessons from these reports informed the Commission‘s efforts to move pre-accession assistance increasingly from a predominantly project-based to a more comprehensive, policy-based approach in order to increase its overall impact.
Role-based and policy-based access control.
Manage your devices with policy-based settings.
It operates as a policy-based automatic IP blocking by enabling the network access protection command.
Secure data with AES-256 volume-based encryption, access encryption, policy-based automatic IP blocking, and more.
It operates as a policy-based automatic IP blocking by enabling the network access protection command.
TrustSec helps secure networks with policy-based access control while MACsec provides hardware encryption for a higher level of security.