diff --git a/windows/security/book/chip-to-cloud.svg b/windows/security/book/chip-to-cloud.svg new file mode 100644 index 0000000000..3adbf52ee4 --- /dev/null +++ b/windows/security/book/chip-to-cloud.svg @@ -0,0 +1,114 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/book/hardware-security.md b/windows/security/book/hardware-security.md index 80c4c2b491..601f3bcf5e 100644 --- a/windows/security/book/hardware-security.md +++ b/windows/security/book/hardware-security.md @@ -95,3 +95,5 @@ Learn more: Dynamic Root of Trust measure and SMM isolation In enterprise organizations, IT administrators enforce policies on their corporate devices to protect the OS and keep devices in a compliant state by preventing users from changing configurations and creating configuration drift. Configuration drift occurs when users with local admin rights change settings and put the device out of sync with security policies. Devices in a non-compliant state can be vulnerable until the next sync, when configuration is reset with the modern device management (MDM) solution. Secured-core configuration lock (config lock) is a Secured-core PC feature that prevents users from making unwanted changes to security settings. With config lock, the OS monitors the registry keys that are supported and reverts to the IT-desired SCPC state in seconds after detecting a drift. Learn more: Windows 11 with config lock + +:::image type="content" source="hardware.svg" alt-text="aas" lightbox="hardware.svg"::: diff --git a/windows/security/book/hardware.svg b/windows/security/book/hardware.svg new file mode 100644 index 0000000000..c0a92d1ded --- /dev/null +++ b/windows/security/book/hardware.svg @@ -0,0 +1,19 @@ + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/book/index.md b/windows/security/book/index.md index 04671bca54..70bf5c47a0 100644 --- a/windows/security/book/index.md +++ b/windows/security/book/index.md @@ -38,7 +38,8 @@ Increase protection and efficiency with Windows 11 and chip-to-cloud security. M In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features. - :::image type="content" source="image1.png" alt-text="aas" lightbox="image1.png" border="false"::: -Learn more: Windows security features licensing and edition requirements \ No newline at end of file +Learn more: Windows security features licensing and edition requirements + +:::image type="content" source="chip-to-cloud.svg" alt-text="aas" lightbox="chip-to-cloud.svg":::