From 49fc40e36d0d0014d469a5e71d27d4a7afda3f78 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Thu, 2 Aug 2018 15:30:36 -0700 Subject: [PATCH] validated the image path --- browsers/edge/new-policies.md | 10 ++++------ ...w-hardware-based-containers-help-protect-windows.md | 2 +- 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/browsers/edge/new-policies.md b/browsers/edge/new-policies.md index 454c708ad2..079ff84ec6 100644 --- a/browsers/edge/new-policies.md +++ b/browsers/edge/new-policies.md @@ -1,15 +1,14 @@ --- description: Microsoft Edge now has new Group Policies and MDM Settings for IT administrators to configure Microsoft Edge. The new policies allow you to enable/disabled full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure New tab page, Home button and startup options, as well as manage extensions. ms.assetid: -author: shortpatti -ms.author: pashort ms.prod: edge ms.mktglfcycl: explore ms.sitesec: library title: New Microsoft Edge Group Policies and MDM settings -ms.localizationpriority: -ms.date: 07/25/2018 ms.localizationpriority: medium +author: shortpatti +ms.author: pashort +ms.date: 07/25/2018 --- # New Microsoft Edge Group Policies and MDM settings (Preview) @@ -27,7 +26,7 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis >> >>      **_Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\_**

- + | **Group Policy** | **New/update?** | **MDM Setting** | **New/update?** | @@ -76,7 +75,6 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis ## Allow sideloading of Extensions [!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)] - ## Configure collection of browsing data for Microsoft 365 Analytics [!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)] diff --git a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md index 3460a7bc30..04430822f3 100644 --- a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md +++ b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md @@ -48,5 +48,5 @@ While Windows Defender System Guard provides advanced protection that will help As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or System Center Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources. -![Windows Defender System Guard](images/windows-defender-system-guard-validate-system-integrity.png) +![Windows Defender System Guard](images/windows-defender-system-guard-validate-system-integrity.png) \ No newline at end of file