mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Fixing initial build errors.
This commit is contained in:
parent
0729e3e233
commit
74c3f62d51
@ -15,7 +15,7 @@ The Federal Information Processing Standard (FIPS) Publication 140 is a U.S. gov
|
||||
|
||||
The Windows cryptographic modules are used across different Microsoft products, including Windows client operating systems, Windows Server, and Azure cloud services. For a current listing of FIPS 140 validated cryptographic modules, select a product from the drop-down menus below.
|
||||
|
||||
[!INCLUDE [validation-selector](../includes/validation-selector.md)]
|
||||
[!INCLUDE [validation-selector](./includes/validation-selector.md)]
|
||||
|
||||
## Understand the Windows FIPS 140 validation process
|
||||
|
||||
|
@ -18,7 +18,7 @@ ms.collection: tier3
|
||||
|
||||
Administrators must ensure that all cryptographic modules installed in the operational environment are FIPS 140 validated. To identify which modules have been validated for a particular Microsoft product, select a product from the drop-down menus below.
|
||||
|
||||
[!INCLUDE [validation-selector](../includes/validation-selector.md)]
|
||||
[!INCLUDE [validation-selector](./includes/validation-selector.md)]
|
||||
|
||||
### Step 2: Ensure all security policies for all cryptographic modules are followed
|
||||
|
||||
@ -37,7 +37,7 @@ If you turn on FIPS mode, the Cryptographic Primitives Library `bcryptprimitives
|
||||
|
||||
This FIPS security policy may be enabled by following the instructions in the Security Policy document for the Cryptographic Primitives Library or Kernel Mode Cryptographic Primitives Library.
|
||||
|
||||
For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
|
||||
For more information on the FIPS mode security policy setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
|
||||
|
||||
### Step 4: Ensure that only FIPS validated cryptographic algorithms are used
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user