From cf84c6543c0403ae89f587c9e31d5399a69fa3d5 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 11 Mar 2025 19:10:40 -0400 Subject: [PATCH] updates --- .../personal-data-encryption/known-folders.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md b/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md index 907e1e6e50..50c03cb25b 100644 --- a/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md +++ b/windows/security/operating-system-security/data-protection/personal-data-encryption/known-folders.md @@ -28,16 +28,15 @@ The following table lists the settings to configuire Personal Data Encryption fo |--|--|--| | | | | -[!INCLUDE [intune-settings-catalog-2](../../../../includes/configure/intune-settings-catalog-2.md)] +[!INCLUDE [intune-settings-catalog-2](../../../../../includes/configure/intune-settings-catalog-2.md)] Alternatively, you can configure devices using a [custom policy][INT-1] with the [DeviceGuard Policy CSP][CSP-1]. | Setting | -|--------| +|-| | **Setting name**:
**OMA-URI**: ``
**Data type**: int
**Value**: `1`| | **Setting name**:
**OMA-URI**: ``
**Data type**: int
**Value**:
 **Enabled with UEFI lock**: `1`
 **Enabled without lock**: `2`| - If you use Microsoft Intune to manage your devices, you can configure Personal Data Encryption using a disk encryption policy, a settings catalog policy, or a custom profile. ### Disk encryption policy