From 6c4e4a14a558067dc459f5ddc4474552ff012b5e Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 26 Apr 2018 09:34:31 -0700 Subject: [PATCH] added link to KB and blog --- .../bitlocker/bitlocker-group-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md index 41f2b07751..ad44659819 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md @@ -393,7 +393,7 @@ This policy setting allows you to block direct memory access (DMA) for all hot p **Reference** -This policy setting is only enforced when BitLocker or device encyption is enabled. +This policy setting is only enforced when BitLocker or device encyption is enabled. As explained in the [Microoft Security Guidance blog](https://blogs.technet.microsoft.com/secguide/2018/01/18/issue-with-bitlockerdma-setting-in-windows-10-fall-creators-update-v1709/), in some cases when this setting is enabled, internal, PCI-based peripherals can fail, including wireless network drivers and input and audio peripherals. This problem is fixed in the [April 2018 quality update](https://support.microsoft.com/help/4093105/windows-10-update-kb4093105). ### Disallow standard users from changing the PIN or password