Fixing initial build errors.

This commit is contained in:
MSRobertD 2024-01-03 16:23:24 -08:00
parent 0729e3e233
commit 74c3f62d51
2 changed files with 3 additions and 3 deletions

View File

@ -15,7 +15,7 @@ The Federal Information Processing Standard (FIPS) Publication 140 is a U.S. gov
The Windows cryptographic modules are used across different Microsoft products, including Windows client operating systems, Windows Server, and Azure cloud services. For a current listing of FIPS 140 validated cryptographic modules, select a product from the drop-down menus below.
[!INCLUDE [validation-selector](../includes/validation-selector.md)]
[!INCLUDE [validation-selector](./includes/validation-selector.md)]
## Understand the Windows FIPS 140 validation process

View File

@ -18,7 +18,7 @@ ms.collection: tier3
Administrators must ensure that all cryptographic modules installed in the operational environment are FIPS 140 validated. To identify which modules have been validated for a particular Microsoft product, select a product from the drop-down menus below.
[!INCLUDE [validation-selector](../includes/validation-selector.md)]
[!INCLUDE [validation-selector](./includes/validation-selector.md)]
### Step 2: Ensure all security policies for all cryptographic modules are followed
@ -37,7 +37,7 @@ If you turn on FIPS mode, the Cryptographic Primitives Library `bcryptprimitives
This FIPS security policy may be enabled by following the instructions in the Security Policy document for the Cryptographic Primitives Library or Kernel Mode Cryptographic Primitives Library.
For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
### Step 4: Ensure that only FIPS validated cryptographic algorithms are used