From 6adf269a9d9593cab5cc63c0964e299587b1bac1 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Mon, 6 Nov 2023 08:28:43 -0800 Subject: [PATCH] =?UTF-8?q?Remove=20endash=20from=20"Entra=E2=80=93joined"?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This seems like a departure from guidance that we had for Active Directory and Azure AD, but Paolo says it's not approved terminology. --- .../includes/configure-recovery-password-rotation.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-recovery-password-rotation.md b/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-recovery-password-rotation.md index 6b2a94a216..d2d790df4b 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-recovery-password-rotation.md +++ b/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-recovery-password-rotation.md @@ -12,8 +12,8 @@ With this policy you can configure a numeric recovery password rotation upon use Possible values are: - `0`: numeric recovery password rotation is turned off -- `1`: numeric recovery password rotation upon use is *on* for Microsoft Entra–joined devices. This is also the default value -- `2`: numeric recovery password rotation upon use is *on* for both Microsoft Entra–joined devices and Microsoft Entra hybrid joined devices +- `1`: numeric recovery password rotation upon use is *on* for Microsoft Entra joined devices. This is also the default value +- `2`: numeric recovery password rotation upon use is *on* for both Microsoft Entra joined devices and Microsoft Entra hybrid joined devices > [!NOTE] > The Policy is effective only when Micropsoft Entra ID or Active Directory backup for recovery password is configured to *required*