Apply suggestions from code review

Apply mostly Acrolinx hyphen fixes 
whats-new...-10-2015.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/40333b15-61cf-454b-bf90-a1c67f6d7d54#CORRECTNESS
successful sign in > successful sign-in
administrative sign in > administrative sign-in

whats-new...-10-2021.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/a6ab218a-059d-4a9b-8a72-3f66086590e9#CORRECTNESS
Enabling passwordless sign in > Enabling passwordless sign-in 
password-less sign in > password-less sign in

whats-new...and-1511.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/7ec86fba-ac0f-4c41-9bcb-1f24710a59c3#CORRECTNESS
successful sign in > successful sign-in
"administrative sign in" > "administrative sign-in" 

whats-new...ion-1703.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/a653d7e8-8ed5-4a8b-9975-9ce13d7ca166#CORRECTNESS
displayed during sign in. > displayed during sign-in.

whats-new...ion-1803.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/46d94f81-3c35-4b8e-ba3f-67d7c2068239#CORRECTNESS
 faster sign in, > faster sign-in,

whats-new...ion-1809.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/181fce21-0f94-4381-9acc-b34a8eb71b7d#CORRECTNESS
Windows sign in > Windows sign-in 

whats-new...ion-1903.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/e4522b50-b9f3-4302-a77e-de0213098209#CORRECTNESS
password-less sign in > password-less sign-in 

whats-new...ion-2004.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/85ad656b-3c21-48a1-9225-90319374d094#CORRECTNESS
passwordless sign in > passwordless sign-in

whats-new...ion-20H2.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/163b5352-672c-4ed0-a93b-fc2e529d65b7#CORRECTNESS

And two British periods to American periods.
This commit is contained in:
Angela Fleischmann
2022-07-22 17:32:20 -06:00
committed by GitHub
parent b8167e7e4a
commit 6907342e03
5 changed files with 8 additions and 10 deletions

View File

@ -44,7 +44,7 @@ Enhancements to AppLocker in Windows 10 include:
- **Encrypt and recover your device with Azure Active Directory**. In addition to using a Microsoft Account, automatic [Device Encryption](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#device-encryption) can now encrypt your devices that are joined to an Azure Active Directory domain. When the device is encrypted, the BitLocker recovery key is automatically escrowed to Azure Active Directory. This escrow will make it easier to recover your BitLocker key online.
- **DMA port protection**. You can use the [DataProtection/AllowDirectMemoryAccess](/windows/client-management/mdm/policy-configuration-service-provider#dataprotection-allowdirectmemoryaccess) MDM policy to block DMA ports when the device is starting up. Also, when a device is locked, all unused DMA ports are turned off, but any devices that are already plugged into a DMA port will continue to work. When the device is unlocked, all DMA ports are turned back on.
- **New Group Policy for configuring pre-boot recovery**. You can now configure the pre-boot recovery message and recover URL that is shown on the pre-boot recovery screen. For more info, see the [Configure pre-boot recovery message and URL](/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-configurepreboot) section in "BitLocker Group Policy settings".
- **New Group Policy for configuring pre-boot recovery**. You can now configure the pre-boot recovery message and recover URL that is shown on the pre-boot recovery screen. For more info, see the [Configure pre-boot recovery message and URL](/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-configurepreboot) section in "BitLocker Group Policy settings."
[Learn how to deploy and manage BitLocker within your organization](/windows/device-security/bitlocker/bitlocker-overview).

View File

@ -143,7 +143,7 @@ Windows Hello enhancements include:
- Windows Hello for Business now has Hybrid Azure Active Directory support and phone number sign-in (Microsoft account). FIDO2 security key support is expanded to Azure Active Directory hybrid environments, enabling enterprises with hybrid environments to take advantage of [passwordless authentication](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises). For more information, see [Expanding Azure Active Directory support for FIDO2 preview to hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/expanding-azure-active-directory-support-for-fido2-preview-to/ba-p/981894).
- With specialized hardware and software components available on devices shipping with Windows 10, version 20H2 configured out of factory, Windows Hello now offers added support for virtualization-based security with supporting fingerprint and face sensors. This feature isolates and secures a user's biometric authentication data.
- Windows Hello multi-camera support is added, allowing users to choose an external camera priority when both external and internal Windows Hello-capable cameras are present.
- [Windows Hello FIDO2 certification](https://fidoalliance.org/microsoft-achieves-fido2-certification-for-windows-hello/): Windows Hello is now a FIDO2 Certified authenticator and enables password-less sign in for websites supporting FIDO2 authentication, such as Microsoft account and Azure AD.
- [Windows Hello FIDO2 certification](https://fidoalliance.org/microsoft-achieves-fido2-certification-for-windows-hello/): Windows Hello is now a FIDO2 Certified authenticator and enables password-less sign-in for websites supporting FIDO2 authentication, such as Microsoft account and Azure AD.
- [Streamlined Windows Hello PIN reset experience](/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience): Microsoft account users have a revamped Windows Hello PIN reset experience with the same look and feel as signing in on the web.
- [Remote Desktop with Biometrics](/windows/security/identity-protection/hello-for-business/hello-feature-remote-desktop#remote-desktop-with-biometrics): Azure Active Directory and Active Directory users using Windows Hello for Business can use biometrics to authenticate to a remote desktop session.
@ -189,7 +189,6 @@ Windows Management Instrumentation (WMI) Group Policy Service (GPSVC) has a perf
#### Key-rolling and Key-rotation
This release also includes two new features called Key-rolling and Key-rotation enables secure rolling of Recovery passwords on MDM-managed Azure Active Directory devices on demand from Microsoft Intune/MDM tools or when a recovery password is used to unlock the BitLocker protected drive. This feature will help prevent accidental recovery password disclosure as part of manual BitLocker drive unlock by users.
s
## Deployment
### SetupDiag