. . . . "O Network Access Protection (NAP - Prote\u00E7\u00E3o de Acesso \u00E0 Rede) \u00E9 uma nova tecnologia de seguran\u00E7a do NPS (Servi\u00E7o de Prote\u00E7\u00E3o \u00E0 Rede) lan\u00E7ada no Windows Vista e Windows Server 2008. Essa tecnologia inclui componentes que permitem criar e impor diretivas de requisito de integridade que definem as configura\u00E7\u00F5es necess\u00E1rias tanto de software como de sistema para os computadores que se conectam a rede. Com o Network Access Protection, os administradores de rede podem definir pol\u00EDticas para os requisitos de integridade do sistema e assim verificar o estado de sa\u00FAde das m\u00E1quinas que tentam se conectar ao servidor. Certificar se o computador possui o sistema operacional atualizado, ou as defini\u00E7\u00F5es de v\u00EDrus do software antiv\u00EDrus atualizadas s\u00E3o alguns dos exemplos de requisitos de integridade do sistema. Caso um computador cliente n\u00E3o esteja em conformidade com a pol\u00EDtica de requisitos, o NAP restringe o seu acesso \u00E0 rede, por\u00E9m oferece mecanismos para que o cliente se torne compat\u00EDvel com os requisitos, e tenha o acesso normal \u00E0 rede."@pt . . . "Prote\u00E7\u00E3o de Acesso \u00E0 Rede"@pt . . . . . "Network Access Protection"@nl . . . . . "\uB124\uD2B8\uC6CC\uD06C \uC811\uC18D \uBCF4\uD638(Network Access Protection, NAP)\uB294 \uD638\uC2A4\uD2B8 \uCEF4\uD4E8\uD130\uC758 \uB124\uD2B8\uC6CC\uD06C \uC811\uC18D\uC744 \uC81C\uC5B4\uD558\uB294 \uB9C8\uC774\uD06C\uB85C\uC18C\uD504\uD2B8\uC758 \uAE30\uC220\uB85C, \uC708\uB3C4\uC6B0 \uC11C\uBC84 2008\uC5D0 \uCC98\uC74C \uB3C4\uC785\uB418\uC5C8\uB2E4. \uB124\uD2B8\uC6CC\uD06C \uC811\uC18D \uBCF4\uD638\uB97C \uC0AC\uC6A9\uD558\uBA74 \uC5B4\uB290 \uC870\uC9C1\uC758 \uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD06C\uB97C \uAD00\uB9AC\uD558\uB294 \uC2DC\uC2A4\uD15C \uAD00\uB9AC\uC790\uB294 \uC2DC\uC2A4\uD15C \uC720\uC9C0 \uC694\uAD6C \uC0AC\uD56D\uC5D0 \uB300\uD55C \uC815\uCC45\uC744 \uC815\uC758\uD560 \uC218 \uC788\uB2E4. \uC2DC\uC2A4\uD15C \uC720\uC9C0 \uC694\uAD6C \uC0AC\uD56D\uC740 \uC774\uB97C\uD14C\uBA74 \uC124\uCE58\uB41C \uCEF4\uD4E8\uD130\uC5D0 \uCD5C\uC2E0 \uC6B4\uC601 \uCCB4\uC81C \uC5C5\uB370\uC774\uD2B8\uAC00 \uC124\uCE58\uB418\uC5B4 \uC788\uB294\uC9C0, \uCEF4\uD4E8\uD130\uAC00 \uCD5C\uC2E0 \uBC84\uC804\uC758 \uBC14\uC774\uB7EC\uC2A4 \uAC80\uC0AC \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uC11C\uBA85\uC744 \uC18C\uC720\uD558\uACE0 \uC788\uB294\uC9C0, \uCEF4\uD4E8\uD130\uAC00 \uD638\uC2A4\uD2B8 \uAE30\uBC18 \uBC29\uD654\uBCBD\uC774 \uC124\uCE58\uB418\uC5B4 \uC0AC\uC6A9 \uC911\uC778\uC9C0\uB97C \uAC80\uC0AC\uD558\uB294 \uAC83\uC744 \uB4E4 \uC218 \uC788\uB2E4."@ko . . . . "Protection d\u2019acc\u00E8s r\u00E9seau"@fr . . . . . "\uB124\uD2B8\uC6CC\uD06C \uC811\uC18D \uBCF4\uD638(Network Access Protection, NAP)\uB294 \uD638\uC2A4\uD2B8 \uCEF4\uD4E8\uD130\uC758 \uB124\uD2B8\uC6CC\uD06C \uC811\uC18D\uC744 \uC81C\uC5B4\uD558\uB294 \uB9C8\uC774\uD06C\uB85C\uC18C\uD504\uD2B8\uC758 \uAE30\uC220\uB85C, \uC708\uB3C4\uC6B0 \uC11C\uBC84 2008\uC5D0 \uCC98\uC74C \uB3C4\uC785\uB418\uC5C8\uB2E4. \uB124\uD2B8\uC6CC\uD06C \uC811\uC18D \uBCF4\uD638\uB97C \uC0AC\uC6A9\uD558\uBA74 \uC5B4\uB290 \uC870\uC9C1\uC758 \uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD06C\uB97C \uAD00\uB9AC\uD558\uB294 \uC2DC\uC2A4\uD15C \uAD00\uB9AC\uC790\uB294 \uC2DC\uC2A4\uD15C \uC720\uC9C0 \uC694\uAD6C \uC0AC\uD56D\uC5D0 \uB300\uD55C \uC815\uCC45\uC744 \uC815\uC758\uD560 \uC218 \uC788\uB2E4. \uC2DC\uC2A4\uD15C \uC720\uC9C0 \uC694\uAD6C \uC0AC\uD56D\uC740 \uC774\uB97C\uD14C\uBA74 \uC124\uCE58\uB41C \uCEF4\uD4E8\uD130\uC5D0 \uCD5C\uC2E0 \uC6B4\uC601 \uCCB4\uC81C \uC5C5\uB370\uC774\uD2B8\uAC00 \uC124\uCE58\uB418\uC5B4 \uC788\uB294\uC9C0, \uCEF4\uD4E8\uD130\uAC00 \uCD5C\uC2E0 \uBC84\uC804\uC758 \uBC14\uC774\uB7EC\uC2A4 \uAC80\uC0AC \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uC11C\uBA85\uC744 \uC18C\uC720\uD558\uACE0 \uC788\uB294\uC9C0, \uCEF4\uD4E8\uD130\uAC00 \uD638\uC2A4\uD2B8 \uAE30\uBC18 \uBC29\uD654\uBCBD\uC774 \uC124\uCE58\uB418\uC5B4 \uC0AC\uC6A9 \uC911\uC778\uC9C0\uB97C \uAC80\uC0AC\uD558\uB294 \uAC83\uC744 \uB4E4 \uC218 \uC788\uB2E4."@ko . "\uB124\uD2B8\uC6CC\uD06C \uC811\uC18D \uBCF4\uD638"@ko . . "Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health. With NAP, system administrators of an organization can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled. Computers with a NAP client will have their health status evaluated upon establishing a network connection. NAP can restrict or deny network access to the computers that are not in compliance with the defined health requirements."@en . "Network Access Protection (NAP) is een Microsoft-technologie die aan de hand van de \"gezondheid\" van een computer bepaalt of deze computer toegang krijgt tot het netwerk. NAP werkt enkel op computers voorzien van Windows Server 2008, Windows Vista en Windows XP met Service Pack 3. NAP kan de gezondheid van een computersysteem testen aan de hand van de volgende gegevens: 1. \n* Is het besturingssysteem voorzien van de laatste updates? 2. \n* Is er een firewall actief? 3. \n* Is er antivirus-software actief? 4. \n* Is de antivirus-software voorzien van de laatste updates? 5. \n* Is er -software actief? 6. \n* Is de antispyware-software voorzien van de laatste updates? 7. \n* Eventuele toevoegingen van een derde partij Een computer kan zich op verschillende manieren aan een netwerk koppelen. NAP kan computers testen die op de volgende manieren toegang \"vragen\" tot een netwerk: 1. \n* IPSec (Dit is de meest veilige vorm) 2. \n* VPN 3. \n* (Authenticated switches en draadloze access points) 4. \n* (Niet mogelijk met Windows XP) 5. \n* DHCP (Dit is de minst veilige vorm) Voor al deze toegangsmogelijkheden geldt dat de service met NAP moet kunnen communiceren. Bijvoorbeeld: Als een computer toegang \"vraagt\" tot een netwerk via VPN dan moet de VPN Server de \"gezondheidsstatus\" vragen aan de client. De VPN Server speelt deze status weer door naar de NAP Server die vervolgens weer aan de VPN Server vertelt of de client tot het netwerk mag worden toegelaten. Een computersysteem dat geen toegang krijgt tot het netwerk kan, afhankelijk van de implementatie, wel toegang krijgen tot een kleiner netwerk alwaar het de mogelijkheid krijgt om \"gezond\" te worden. Dit netwerk wordt een remediation-netwerk genoemd."@nl . . . . . . . . "\u7DB2\u7D61\u5B58\u53D6\u4FDD\u8B77\u6280\u8853\uFF08Network Access Protection\uFF0C\u7E2E\u5BEB\u70BANAP\uFF09\uFF0C\u662F\u4E00\u9805\u7531\u5FAE\u8EDF\u958B\u767C\u7684\u7DB2\u7D61\u4FDD\u8B77\u6280\u8853\uFF0C\u6700\u5148\u4F7F\u7528\u65BCMicrosoft Windows Vista\uFF0C\u53E6\u5916\u5728Windows Server 2008\u4EE5\u53CAWindows XP SP3\u4E5F\u5C07\u6703\u63D0\u4F9B\u3002 \u7CFB\u7D71\u7BA1\u7406\u54E1\u53EF\u4EE5\u4EE5\u4F5C\u696D\u7CFB\u7D71\u66F4\u65B0\u7A0B\u5EA6\u3001\u9632\u6BD2\u8EDF\u4EF6\u75C5\u6BD2\u5EAB\uFF08\u5305\u542B\u75C5\u6BD2\u5B9A\u7FA9\uFF09\u66F4\u65B0\u7A0B\u5EA6\u3001\u4EE5\u53CA\u7CFB\u7D71\u9632\u706B\u7246\u4FDD\u8B77\u7A0B\u5EA6\u7B49\u4F5C\u70BA\u6E96\u5247\uFF0C\u9650\u5236\u96FB\u8166\u3001\u751A\u81F3\u5C40\u90E8\u7DB2\u7D61\u5C0D\u6574\u9AD4\u7DB2\u7D61\u8CC7\u6E90\u5B58\u53D6\u7684\u6B0A\u9650\u3002"@zh . . . . "La protection d'acc\u00E8s r\u00E9seau (NAP pour Network Access Protection en anglais) est une technique de Microsoft en partenariat avec Cisco pour contr\u00F4ler l'acc\u00E8s au r\u00E9seau d'un ordinateur en se basant sur la sant\u00E9 de son syst\u00E8me. Elle est utilis\u00E9e sur les syst\u00E8mes d'exploitation Windows Vista et Windows Server 2008. Elle est incluse dans le Service Pack 3 (SP3) pour Windows XP, disponible depuis d\u00E9but mai 2008. Cependant le NAP est d\u00E9conseill\u00E9 dans Windows Server 2012 R2 et l\u2019interaction avec le serveur DHCP est m\u00EAme abandonn\u00E9e dans Windows Server 2016 ."@fr . "\u0417\u0430\u0449\u0438\u0442\u0430 \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u043A \u0441\u0435\u0442\u0438"@ru . . . . . . . . . . . "\u7DB2\u7D61\u5B58\u53D6\u4FDD\u8B77\u6280\u8853\uFF08Network Access Protection\uFF0C\u7E2E\u5BEB\u70BANAP\uFF09\uFF0C\u662F\u4E00\u9805\u7531\u5FAE\u8EDF\u958B\u767C\u7684\u7DB2\u7D61\u4FDD\u8B77\u6280\u8853\uFF0C\u6700\u5148\u4F7F\u7528\u65BCMicrosoft Windows Vista\uFF0C\u53E6\u5916\u5728Windows Server 2008\u4EE5\u53CAWindows XP SP3\u4E5F\u5C07\u6703\u63D0\u4F9B\u3002 \u7CFB\u7D71\u7BA1\u7406\u54E1\u53EF\u4EE5\u4EE5\u4F5C\u696D\u7CFB\u7D71\u66F4\u65B0\u7A0B\u5EA6\u3001\u9632\u6BD2\u8EDF\u4EF6\u75C5\u6BD2\u5EAB\uFF08\u5305\u542B\u75C5\u6BD2\u5B9A\u7FA9\uFF09\u66F4\u65B0\u7A0B\u5EA6\u3001\u4EE5\u53CA\u7CFB\u7D71\u9632\u706B\u7246\u4FDD\u8B77\u7A0B\u5EA6\u7B49\u4F5C\u70BA\u6E96\u5247\uFF0C\u9650\u5236\u96FB\u8166\u3001\u751A\u81F3\u5C40\u90E8\u7DB2\u7D61\u5C0D\u6574\u9AD4\u7DB2\u7D61\u8CC7\u6E90\u5B58\u53D6\u7684\u6B0A\u9650\u3002"@zh . "Network Access Protection (NAP) is een Microsoft-technologie die aan de hand van de \"gezondheid\" van een computer bepaalt of deze computer toegang krijgt tot het netwerk. NAP werkt enkel op computers voorzien van Windows Server 2008, Windows Vista en Windows XP met Service Pack 3. NAP kan de gezondheid van een computersysteem testen aan de hand van de volgende gegevens: Een computer kan zich op verschillende manieren aan een netwerk koppelen. NAP kan computers testen die op de volgende manieren toegang \"vragen\" tot een netwerk:"@nl . "Network Access Protection (NAP) \u2014 \u0437\u0430\u0449\u0438\u0442\u0430 \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u043A \u0441\u0435\u0442\u0438 \u2014 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u044F \u043A\u043E\u043C\u043F\u0430\u043D\u0438\u0438 Microsoft, \u043F\u0440\u0435\u0434\u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u043D\u0430\u044F \u0434\u043B\u044F \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u043A \u0441\u0435\u0442\u0438 \u043F\u0440\u0435\u0434\u043F\u0440\u0438\u044F\u0442\u0438\u044F, \u0438\u0441\u0445\u043E\u0434\u044F \u0438\u0437 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0430\u044E\u0449\u0435\u0433\u043E\u0441\u044F \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430. \u0412\u043F\u0435\u0440\u0432\u044B\u0435 \u0431\u044B\u043B\u0430 \u0440\u0435\u0430\u043B\u0438\u0437\u043E\u0432\u0430\u043D\u0430 \u0432 Windows XP Service Pack 3, Windows Vista \u0438 Windows Server 2008. \u0421 \u043F\u043E\u043C\u043E\u0449\u044C\u044E NetWork Access Protection \u0430\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u044B \u043A\u043E\u043C\u043F\u0430\u043D\u0438\u0438 \u043C\u043E\u0433\u0443\u0442 \u043F\u043E\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044C \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0435 \u00AB\u0437\u0434\u043E\u0440\u043E\u0432\u044C\u044F\u00BB \u0441\u0435\u0442\u0438. \u041F\u0430\u0440\u0430\u043C\u0435\u0442\u0440\u044B \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u043A\u043B\u0438\u0435\u043D\u0442\u0430 \u043F\u0440\u043E\u0432\u0435\u0440\u044F\u044E\u0442\u0441\u044F \u043D\u0430 \u0441\u043E\u043E\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0435 \u043F\u043E\u043B\u0438\u0442\u0438\u043A\u0435 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438, \u043D\u0430\u043F\u0440\u0438\u043C\u0435\u0440: \u043D\u0430\u043B\u0438\u0447\u0438\u0435 \u0441\u0432\u0435\u0436\u0438\u0445 \u043E\u0431\u043D\u043E\u0432\u043B\u0435\u043D\u0438\u0439 \u043E\u043F\u0435\u0440\u0430\u0446\u0438\u043E\u043D\u043D\u043E\u0439 \u0441\u0438\u0441\u0442\u0435\u043C\u044B, \u043D\u0430\u043B\u0438\u0447\u0438\u0435 \u0430\u043D\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043D\u043E\u0439 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u044B \u0438 \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0435 \u0435\u0451 \u043E\u0431\u043D\u043E\u0432\u043B\u0435\u043D\u0438\u0439, \u0443\u0441\u0442\u0430\u043D\u043E\u0432\u043B\u0435\u043D \u0438 \u0440\u0430\u0431\u043E\u0442\u0430\u0435\u0442 \u043B\u0438 \u043D\u0430 \u043A\u043B\u0438\u0435\u043D\u0442\u0435 \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u044D\u043A\u0440\u0430\u043D. \u041D\u0430 \u043E\u0441\u043D\u043E\u0432\u0435 \u044D\u0442\u0438\u0445 \u043F\u0430\u0440\u0430\u043C\u0435\u0442\u0440\u043E\u0432 \u043A\u0430\u0436\u0434\u044B\u0439 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440 \u043F\u043E\u043B\u0443\u0447\u0430\u0435\u0442 \u0441\u0432\u043E\u044E \u043E\u0446\u0435\u043D\u043A\u0443 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438. \u041A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440, \u0443\u0434\u043E\u0432\u043B\u0435\u0442\u0432\u043E\u0440\u044F\u044E\u0449\u0438\u0439 \u0442\u0440\u0435\u0431\u043E\u0432\u0430\u043D\u0438\u044F\u043C \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044F, \u043F\u043E\u043B\u0443\u0447\u0430\u0435\u0442 \u0434\u043E\u0441\u0442\u0443\u043F \u0432 \u0441\u0435\u0442\u044C \u043F\u0440\u0435\u0434\u043F\u0440\u0438\u044F\u0442\u0438\u044F. \u041A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u044B, \u043D\u0435 \u0443\u0434\u043E\u0432\u043B\u0435\u0442\u0432\u043E\u0440\u044F\u044E\u0449\u0438\u0435 \u0442\u0440\u0435\u0431\u043E\u0432\u0430\u043D\u0438\u044F\u043C \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438, \u043D\u0435 \u0441\u043C\u043E\u0433\u0443\u0442 \u043F\u043E\u043B\u0443\u0447\u0438\u0442\u044C \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u0432 \u0441\u0435\u0442\u044C \u0438\u043B\u0438 \u0441\u043C\u043E\u0433\u0443\u0442 \u043F\u043E\u043B\u0443\u0447\u0438\u0442\u044C \u0434\u043E\u0441\u0442\u0443\u043F \u043B\u0438\u0448\u044C \u0432 \u0438\u0437\u043E\u043B\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u0443\u044E \u0447\u0430\u0441\u0442\u044C \u0441\u0435\u0442\u0438, \u043F\u0440\u0435\u0434\u043E\u0441\u0442\u0430\u0432\u043B\u044F\u044E\u0449\u0443\u044E \u0441\u0435\u0440\u0432\u0438\u0441\u044B \u0434\u043B\u044F \u0434\u043E\u0441\u0442\u0438\u0436\u0435\u043D\u0438\u044F \u043A\u043B\u0438\u0435\u043D\u0442\u043E\u043C \u0442\u0440\u0435\u0431\u0443\u0435\u043C\u043E\u0433\u043E \u0443\u0440\u043E\u0432\u043D\u044F \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0441\u0442\u0438."@ru . . . . . . . . . . . . . . . . "Network Access Protection (NAP) \u2014 \u0437\u0430\u0449\u0438\u0442\u0430 \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u043A \u0441\u0435\u0442\u0438 \u2014 \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u044F \u043A\u043E\u043C\u043F\u0430\u043D\u0438\u0438 Microsoft, \u043F\u0440\u0435\u0434\u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u043D\u0430\u044F \u0434\u043B\u044F \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u0430 \u043A \u0441\u0435\u0442\u0438 \u043F\u0440\u0435\u0434\u043F\u0440\u0438\u044F\u0442\u0438\u044F, \u0438\u0441\u0445\u043E\u0434\u044F \u0438\u0437 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043C\u044B \u043F\u043E\u0434\u043A\u043B\u044E\u0447\u0430\u044E\u0449\u0435\u0433\u043E\u0441\u044F \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430. \u0412\u043F\u0435\u0440\u0432\u044B\u0435 \u0431\u044B\u043B\u0430 \u0440\u0435\u0430\u043B\u0438\u0437\u043E\u0432\u0430\u043D\u0430 \u0432 Windows XP Service Pack 3, Windows Vista \u0438 Windows Server 2008."@ru . "1088922518"^^ . . . . "\u7DB2\u8DEF\u5B58\u53D6\u4FDD\u8B77\u6280\u8853"@zh . . . . . . "7361"^^ . . . . "Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health. With NAP, system administrators of an organization can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled. Computers with a NAP client will have their health status evaluated upon establishing a network connection. NAP can restrict or deny network access to the computers that are not in compliance with the defined health requirements. NAP was deprecated in Windows Server 2012 R2 and removed from Windows Server 2016."@en . . "3172082"^^ . . . "O Network Access Protection (NAP - Prote\u00E7\u00E3o de Acesso \u00E0 Rede) \u00E9 uma nova tecnologia de seguran\u00E7a do NPS (Servi\u00E7o de Prote\u00E7\u00E3o \u00E0 Rede) lan\u00E7ada no Windows Vista e Windows Server 2008. Essa tecnologia inclui componentes que permitem criar e impor diretivas de requisito de integridade que definem as configura\u00E7\u00F5es necess\u00E1rias tanto de software como de sistema para os computadores que se conectam a rede."@pt . . . . "La protection d'acc\u00E8s r\u00E9seau (NAP pour Network Access Protection en anglais) est une technique de Microsoft en partenariat avec Cisco pour contr\u00F4ler l'acc\u00E8s au r\u00E9seau d'un ordinateur en se basant sur la sant\u00E9 de son syst\u00E8me. Elle est utilis\u00E9e sur les syst\u00E8mes d'exploitation Windows Vista et Windows Server 2008. Elle est incluse dans le Service Pack 3 (SP3) pour Windows XP, disponible depuis d\u00E9but mai 2008. Cependant le NAP est d\u00E9conseill\u00E9 dans Windows Server 2012 R2 et l\u2019interaction avec le serveur DHCP est m\u00EAme abandonn\u00E9e dans Windows Server 2016 ."@fr . "Network Access Protection"@en .