From 0c1200032a1b478e4cdd09188591fb83dfea8c63 Mon Sep 17 00:00:00 2001 From: Stephanie Savell <101299710+v-stsavell@users.noreply.github.com> Date: Wed, 7 Jun 2023 15:28:47 -0500 Subject: [PATCH] Apply suggestions from code review Alt text edit. --- .../system-security/secure-the-windows-10-boot-process.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process.md b/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process.md index 3b84d75971..1383de920b 100644 --- a/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process.md +++ b/windows/security/operating-system-security/system-security/secure-the-windows-10-boot-process.md @@ -42,7 +42,7 @@ Windows supports four features to help prevent rootkits and bootkits from loadin Figure 1 shows the Windows startup process. -![Windows startup process.](./images/boot_process.png) +![Screenshot that shows the Windows startup process.](./images/boot_process.png) *Figure 1. Secure Boot, Trusted Boot, and Measured Boot block malware at every stage*: @@ -117,7 +117,7 @@ Depending on the implementation and configuration, the server can now determine Figure 2 illustrates the Measured Boot and remote attestation process. -![Measured Boot and remote attestation process.](./images/measured_boot.png) +![Screenshot that shows the Measured Boot and remote attestation process.](./images/measured_boot.png) *Figure 2. Measured Boot proves the PC's health to a remote server*: