From 74c3f62d515b15fcadd8a05230b1a9bed73bbe59 Mon Sep 17 00:00:00 2001 From: MSRobertD <43757104+MSRobertD@users.noreply.github.com> Date: Wed, 3 Jan 2024 16:23:24 -0800 Subject: [PATCH] Fixing initial build errors. --- .../security-foundations/certification/fips-140-validation.md | 2 +- .../certification/use-windows-in-fips-approved-mode.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/security-foundations/certification/fips-140-validation.md b/windows/security/security-foundations/certification/fips-140-validation.md index ec550d6f5e..dfc4e22cf5 100644 --- a/windows/security/security-foundations/certification/fips-140-validation.md +++ b/windows/security/security-foundations/certification/fips-140-validation.md @@ -15,7 +15,7 @@ The Federal Information Processing Standard (FIPS) Publication 140 is a U.S. gov The Windows cryptographic modules are used across different Microsoft products, including Windows client operating systems, Windows Server, and Azure cloud services. For a current listing of FIPS 140 validated cryptographic modules, select a product from the drop-down menus below. -[!INCLUDE [validation-selector](../includes/validation-selector.md)] +[!INCLUDE [validation-selector](./includes/validation-selector.md)] ## Understand the Windows FIPS 140 validation process diff --git a/windows/security/security-foundations/certification/use-windows-in-fips-approved-mode.md b/windows/security/security-foundations/certification/use-windows-in-fips-approved-mode.md index 0c485316cf..ac48b8d36e 100644 --- a/windows/security/security-foundations/certification/use-windows-in-fips-approved-mode.md +++ b/windows/security/security-foundations/certification/use-windows-in-fips-approved-mode.md @@ -18,7 +18,7 @@ ms.collection: tier3 Administrators must ensure that all cryptographic modules installed in the operational environment are FIPS 140 validated. To identify which modules have been validated for a particular Microsoft product, select a product from the drop-down menus below. -[!INCLUDE [validation-selector](../includes/validation-selector.md)] +[!INCLUDE [validation-selector](./includes/validation-selector.md)] ### Step 2: Ensure all security policies for all cryptographic modules are followed @@ -37,7 +37,7 @@ If you turn on FIPS mode, the Cryptographic Primitives Library `bcryptprimitives This FIPS security policy may be enabled by following the instructions in the Security Policy document for the Cryptographic Primitives Library or Kernel Mode Cryptographic Primitives Library. -For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md). +For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md). ### Step 4: Ensure that only FIPS validated cryptographic algorithms are used