From 7b660c383c1fe43e1b3ede09c6c94fd534bbc9c1 Mon Sep 17 00:00:00 2001
From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com>
Date: Mon, 8 Apr 2024 17:23:01 -0400
Subject: [PATCH] Update hardware-security.md: Replace image with updated
architecture diagram
---
windows/security/book/chip-to-cloud.svg | 114 +++++++++++++++++++++
windows/security/book/hardware-security.md | 2 +
windows/security/book/hardware.svg | 19 ++++
windows/security/book/index.md | 5 +-
4 files changed, 138 insertions(+), 2 deletions(-)
create mode 100644 windows/security/book/chip-to-cloud.svg
create mode 100644 windows/security/book/hardware.svg
diff --git a/windows/security/book/chip-to-cloud.svg b/windows/security/book/chip-to-cloud.svg
new file mode 100644
index 0000000000..3adbf52ee4
--- /dev/null
+++ b/windows/security/book/chip-to-cloud.svg
@@ -0,0 +1,114 @@
+
diff --git a/windows/security/book/hardware-security.md b/windows/security/book/hardware-security.md
index 80c4c2b491..601f3bcf5e 100644
--- a/windows/security/book/hardware-security.md
+++ b/windows/security/book/hardware-security.md
@@ -95,3 +95,5 @@ Learn more: Dynamic Root of Trust measure and SMM isolation
In enterprise organizations, IT administrators enforce policies on their corporate devices to protect the OS and keep devices in a compliant state by preventing users from changing configurations and creating configuration drift. Configuration drift occurs when users with local admin rights change settings and put the device out of sync with security policies. Devices in a non-compliant state can be vulnerable until the next sync, when configuration is reset with the modern device management (MDM) solution. Secured-core configuration lock (config lock) is a Secured-core PC feature that prevents users from making unwanted changes to security settings. With config lock, the OS monitors the registry keys that are supported and reverts to the IT-desired SCPC state in seconds after detecting a drift.
Learn more: Windows 11 with config lock
+
+:::image type="content" source="hardware.svg" alt-text="aas" lightbox="hardware.svg":::
diff --git a/windows/security/book/hardware.svg b/windows/security/book/hardware.svg
new file mode 100644
index 0000000000..c0a92d1ded
--- /dev/null
+++ b/windows/security/book/hardware.svg
@@ -0,0 +1,19 @@
+
diff --git a/windows/security/book/index.md b/windows/security/book/index.md
index 04671bca54..70bf5c47a0 100644
--- a/windows/security/book/index.md
+++ b/windows/security/book/index.md
@@ -38,7 +38,8 @@ Increase protection and efficiency with Windows 11 and chip-to-cloud security. M
In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features.
-
:::image type="content" source="image1.png" alt-text="aas" lightbox="image1.png" border="false":::
-Learn more: Windows security features licensing and edition requirements
\ No newline at end of file
+Learn more: Windows security features licensing and edition requirements
+
+:::image type="content" source="chip-to-cloud.svg" alt-text="aas" lightbox="chip-to-cloud.svg":::