From cf84c6543c0403ae89f587c9e31d5399a69fa3d5 Mon Sep 17 00:00:00 2001
From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com>
Date: Tue, 11 Mar 2025 19:10:40 -0400
Subject: [PATCH] updates
---
.../personal-data-encryption/known-folders.md | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md b/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md
index 907e1e6e50..50c03cb25b 100644
--- a/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md
+++ b/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md
@@ -28,16 +28,15 @@ The following table lists the settings to configuire Personal Data Encryption fo
|--|--|--|
| | | |
-[!INCLUDE [intune-settings-catalog-2](../../../../includes/configure/intune-settings-catalog-2.md)]
+[!INCLUDE [intune-settings-catalog-2](../../../../../includes/configure/intune-settings-catalog-2.md)]
Alternatively, you can configure devices using a [custom policy][INT-1] with the [DeviceGuard Policy CSP][CSP-1].
| Setting |
-|--------|
+|-|
| **Setting name**:
**OMA-URI**: ``
**Data type**: int
**Value**: `1`|
| **Setting name**:
**OMA-URI**: ``
**Data type**: int
**Value**:
**Enabled with UEFI lock**: `1`
**Enabled without lock**: `2`|
-
If you use Microsoft Intune to manage your devices, you can configure Personal Data Encryption using a disk encryption policy, a settings catalog policy, or a custom profile.
### Disk encryption policy