This commit is contained in:
Paolo Matarazzo
2023-10-06 10:53:13 -04:00
parent 1be226ace2
commit 0e370a4c05
4 changed files with 4 additions and 4 deletions

View File

@ -7477,7 +7477,7 @@
},
{
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker#device-encryption",
"redirect_url": "/windows/security/operating-system-security/data-protection/device-encryption",
"redirect_document_id": false
}
]

View File

@ -118,7 +118,7 @@ sections:
- question: What is *Used Disk Space Only* encryption?
answer: |
BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](plan.md#used-disk-space-only-encryption).
BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](planning-guide.md#used-disk-space-only-encryption).
- question: What system changes would cause the integrity check on the OS drive to fail?
answer: |

View File

@ -57,7 +57,7 @@ BitLocker has the following requirements:
*Device Encryption* is a security feature that provides a simple way for some devices to enable BitLocker encryption automatically. Device Encryption requires a device to meet either [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or HSTI security requirements, and have no externally accessible ports that allow DMA access.
To learn more about Device Encryption, see the [BitLocker Planning Guide](planning-guide.md#device-encryption).
To learn more about Device Encryption, see the [BitLocker Planning Guide](device-encryption.md).
[!INCLUDE [bitlocker](../../../../../includes/licensing/bitlocker-enablement.md)]

View File

@ -160,7 +160,7 @@ For more information about encrypted hard drives, see [Encrypted hard drive](../
## Microsoft Entra ID and Active Directory Domain Services considerations
BitLocker integrates with Microsoft Entra ID and Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Microsoft Entra ID or AD DS. Administrators can configure [policy setting](../policy-settings.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) for each drive type to enable backup of BitLocker recovery information.
BitLocker integrates with Microsoft Entra ID and Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Microsoft Entra ID or AD DS. Administrators can configure [policy setting](policy-settings.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) for each drive type to enable backup of BitLocker recovery information.
The following recovery data is saved for each computer object: