Merge pull request #3871 from MicrosoftDocs/martyav-broken-mva-links-in-security-articles

addressing broken links in credential-guard-considerations.md
This commit is contained in:
Dani Halfin
2019-05-31 20:17:25 -07:00
committed by GitHub

View File

@ -22,9 +22,6 @@ ms.reviewer:
- Windows 10 - Windows 10
- Windows Server 2016 - Windows Server 2016
Prefer video? See [Credentials Protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474)
in the **Deep Dive into Windows Defender Credential Guard** video series.
Passwords are still weak. We recommend that in addition to deploying Windows Defender Credential Guard, organizations move away from passwords to other authentication methods, such as physical smart cards, virtual smart cards, or Windows Hello for Business. Passwords are still weak. We recommend that in addition to deploying Windows Defender Credential Guard, organizations move away from passwords to other authentication methods, such as physical smart cards, virtual smart cards, or Windows Hello for Business.
Windows Defender Credential Guard uses hardware security, so some features such as Windows To Go, are not supported. Windows Defender Credential Guard uses hardware security, so some features such as Windows To Go, are not supported.
@ -99,6 +96,6 @@ When data protected with user DPAPI is unusable, then the user loses access to a
## See also ## See also
**Deep Dive into Windows Defender Credential Guard: Related videos** **Related videos**
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474) [What is virtualization-based security?](https://www.linkedin.com/learning/microsoft-cybersecurity-stack-advanced-identity-and-endpoint-protection/what-is-virtualization-based-security)