mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
updates
This commit is contained in:
@ -7477,7 +7477,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/operating-system-security/data-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/bitlocker#device-encryption",
|
||||
"redirect_url": "/windows/security/operating-system-security/data-protection/device-encryption",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
|
@ -118,7 +118,7 @@ sections:
|
||||
|
||||
- question: What is *Used Disk Space Only* encryption?
|
||||
answer: |
|
||||
BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](plan.md#used-disk-space-only-encryption).
|
||||
BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](planning-guide.md#used-disk-space-only-encryption).
|
||||
|
||||
- question: What system changes would cause the integrity check on the OS drive to fail?
|
||||
answer: |
|
||||
|
@ -57,7 +57,7 @@ BitLocker has the following requirements:
|
||||
|
||||
*Device Encryption* is a security feature that provides a simple way for some devices to enable BitLocker encryption automatically. Device Encryption requires a device to meet either [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or HSTI security requirements, and have no externally accessible ports that allow DMA access.
|
||||
|
||||
To learn more about Device Encryption, see the [BitLocker Planning Guide](planning-guide.md#device-encryption).
|
||||
To learn more about Device Encryption, see the [BitLocker Planning Guide](device-encryption.md).
|
||||
|
||||
[!INCLUDE [bitlocker](../../../../../includes/licensing/bitlocker-enablement.md)]
|
||||
|
||||
|
@ -160,7 +160,7 @@ For more information about encrypted hard drives, see [Encrypted hard drive](../
|
||||
|
||||
## Microsoft Entra ID and Active Directory Domain Services considerations
|
||||
|
||||
BitLocker integrates with Microsoft Entra ID and Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Microsoft Entra ID or AD DS. Administrators can configure [policy setting](../policy-settings.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) for each drive type to enable backup of BitLocker recovery information.
|
||||
BitLocker integrates with Microsoft Entra ID and Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Microsoft Entra ID or AD DS. Administrators can configure [policy setting](policy-settings.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) for each drive type to enable backup of BitLocker recovery information.
|
||||
|
||||
The following recovery data is saved for each computer object:
|
||||
|
||||
|
Reference in New Issue
Block a user