Update hardware-security.md: Replace image with updated architecture diagram

This commit is contained in:
Paolo Matarazzo
2024-04-08 17:23:01 -04:00
parent 838feeffc4
commit 7b660c383c
4 changed files with 138 additions and 2 deletions

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 1.8 MiB

View File

@ -95,3 +95,5 @@ Learn more: Dynamic Root of Trust measure and SMM isolation
In enterprise organizations, IT administrators enforce policies on their corporate devices to protect the OS and keep devices in a compliant state by preventing users from changing configurations and creating configuration drift. Configuration drift occurs when users with local admin rights change settings and put the device out of sync with security policies. Devices in a non-compliant state can be vulnerable until the next sync, when configuration is reset with the modern device management (MDM) solution. Secured-core configuration lock (config lock) is a Secured-core PC feature that prevents users from making unwanted changes to security settings. With config lock, the OS monitors the registry keys that are supported and reverts to the IT-desired SCPC state in seconds after detecting a drift. In enterprise organizations, IT administrators enforce policies on their corporate devices to protect the OS and keep devices in a compliant state by preventing users from changing configurations and creating configuration drift. Configuration drift occurs when users with local admin rights change settings and put the device out of sync with security policies. Devices in a non-compliant state can be vulnerable until the next sync, when configuration is reset with the modern device management (MDM) solution. Secured-core configuration lock (config lock) is a Secured-core PC feature that prevents users from making unwanted changes to security settings. With config lock, the OS monitors the registry keys that are supported and reverts to the IT-desired SCPC state in seconds after detecting a drift.
Learn more: Windows 11 with config lock Learn more: Windows 11 with config lock
:::image type="content" source="hardware.svg" alt-text="aas" lightbox="hardware.svg":::

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 10 KiB

View File

@ -38,7 +38,8 @@ Increase protection and efficiency with Windows 11 and chip-to-cloud security. M
In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features. In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features.
:::image type="content" source="image1.png" alt-text="aas" lightbox="image1.png" border="false"::: :::image type="content" source="image1.png" alt-text="aas" lightbox="image1.png" border="false":::
Learn more: Windows security features licensing and edition requirements Learn more: Windows security features licensing and edition requirements
:::image type="content" source="chip-to-cloud.svg" alt-text="aas" lightbox="chip-to-cloud.svg":::