mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
fixing broken links for art and bookmarks
This commit is contained in:
@ -19,9 +19,9 @@ manager: dansimp
|
||||
## Cryptography policies
|
||||
|
||||
|
||||
* [Cryptography/AllowFipsAlgorithmPolicy](#CryptographyAllowFipsAlgorithmPolicy)
|
||||
* [Cryptography/TLSCipherSuites](#CryptographyTLSCipherSuites)
|
||||
* [Cryptography/Microsoft Surface Hub](#Cryptography-policies-supported-by-Microsoft-Surface-Hub)
|
||||
* [Cryptography/AllowFipsAlgorithmPolicy](#cryptographyallowfipsalgorithmpolicy)
|
||||
* [Cryptography/TLSCipherSuites](#cryptographytlsciphersuites)
|
||||
* [Cryptography/Microsoft Surface Hub](#cryptography-policies-supported-by-microsoft-surface-hub)
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
|
@ -36,7 +36,7 @@ On Windows 10 Mobile, the customized Start works by:
|
||||
|
||||
The following diagrams show the default Windows 10, version 1607 Start layouts for single SIM and dual SIM devices with Cortana support, and single SIM and dual SIM devices with no Cortana support.
|
||||
|
||||

|
||||

|
||||
|
||||
The diagrams show:
|
||||
|
||||
|
@ -39,7 +39,7 @@ Windows 10, version 1709 is available starting on 10/17/2017 in all relevant dis
|
||||
|
||||
For ISOs that you download from the VLSC or Visual Studio Subscriptions, you can still search for the individual Windows editions. However, each of these editions (Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education) will point to the same ISO file, so you only need to download the ISO once. A single Windows image (WIM) file is included in the ISO that contains all the volume licensing images:
|
||||
|
||||

|
||||

|
||||
|
||||
When using the contents of these ISOs with tools such as the Microsoft Deployment Toolkit or System Center Configuration Manager, make sure you select the appropriate image index in any task sequences that you create or update.
|
||||
|
||||
@ -66,7 +66,7 @@ This Semi-Annual Channel release of Windows 10 continues the Windows as a servic
|
||||
|
||||
See the following example for Windows 10, version 1709:
|
||||
|
||||

|
||||

|
||||
|
||||
### Features on demand
|
||||
|
||||
|
@ -31,7 +31,7 @@ This guide explains how credential theft attacks occur and the strategies and co
|
||||
- Respond to suspicious activity
|
||||
- Recover from a breach
|
||||
|
||||

|
||||

|
||||
|
||||
## Attacks that steal credentials
|
||||
|
||||
|
@ -83,9 +83,9 @@ Configuration of Encrypted Hard Drives as startup drives is done using the same
|
||||
|
||||
There are three related Group Policy settings that help you manage how BitLocker uses hardware-based envryption and which encryption algorithms to use. If these settings are not configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:
|
||||
|
||||
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#a-href-idbkmk-hdefxdaconfigure-use-of-hardware-based-encryption-for-fixed-data-drives)
|
||||
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#a-href-idbkmk-hderddaconfigure-use-of-hardware-based-encryption-for-removable-data-drives)
|
||||
- [Configure use of hardware-based encryption for operating system drives](bitlocker/bitlocker-group-policy-settings.md#a-href-idbkmk-hdeosdaconfigure-use-of-hardware-based-encryption-for-operating-system-drives)
|
||||
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#bkmk-hdefxd)
|
||||
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-removable-data-drives)
|
||||
- [Configure use of hardware-based encryption for operating system drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-operating-system-drives)
|
||||
|
||||
## Encrypted Hard Drive Architecture
|
||||
|
||||
|
@ -90,7 +90,7 @@ It's possible that you might revoke data from an unenrolled device only to later
|
||||
|
||||
To start Robocopy in S mode, open Task Manager. Click **File** > **Run new task**, type the command, and click **Create this task with administrative privileges**.
|
||||
|
||||

|
||||

|
||||
|
||||
If the employee performed a clean installation and there is no user profile, you need to recover the keys from the System Volume folder in each drive. Type:
|
||||
|
||||
|
@ -97,7 +97,7 @@ Select **Store apps**, type the app product name and publisher, and click **OK**
|
||||
- **Publisher**: `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`
|
||||
- **Product Name**: `Microsoft.MicrosoftPowerBIForWindows`
|
||||
|
||||

|
||||

|
||||
|
||||
To add multiple Store apps, click the ellipsis **…**.
|
||||
|
||||
|
Reference in New Issue
Block a user