mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
search/replace for renamed files
This commit is contained in:
parent
3e200656d7
commit
dbacb6502b
@ -5441,7 +5441,7 @@
|
|||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/device-security/bitlocker/bitlocker-overview.md",
|
"source_path": "windows/device-security/bitlocker/index.md",
|
||||||
"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview",
|
"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
@ -9836,7 +9836,7 @@
|
|||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/keep-secure/bitlocker-overview.md",
|
"source_path": "windows/keep-secure/index.md",
|
||||||
"redirect_url": "/windows/device-security/bitlocker/bitlocker-overview",
|
"redirect_url": "/windows/device-security/bitlocker/bitlocker-overview",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
|
@ -452,4 +452,4 @@ Disable-BitLocker -MountPoint E:,F:,G:
|
|||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
- [BitLocker recovery guide](bitlocker-recovery-guide-plan.md)
|
- [BitLocker recovery guide](bitlocker-recovery-guide-plan.md)
|
||||||
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
|
@ -10,7 +10,7 @@ ms.date: 11/08/2022
|
|||||||
|
|
||||||
# Overview of BitLocker device encryption
|
# Overview of BitLocker device encryption
|
||||||
|
|
||||||
This article explains how BitLocker Device Encryption can help protect data on devices running Windows. See [BitLocker](bitlocker-overview.md) for a general overview and list of articles.
|
This article explains how BitLocker Device Encryption can help protect data on devices running Windows. See [BitLocker](index.md) for a general overview and list of articles.
|
||||||
|
|
||||||
When users travel, their organization's confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access. Windows has a long history of providing at-rest data-protection solutions that guard against nefarious attackers, beginning with the Encrypting File System in the Windows 2000 operating system. More recently, BitLocker has provided encryption for full drives and portable drives. Windows consistently improves data protection by improving existing options and providing new strategies.
|
When users travel, their organization's confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access. Windows has a long history of providing at-rest data-protection solutions that guard against nefarious attackers, beginning with the Encrypting File System in the Windows 2000 operating system. More recently, BitLocker has provided encryption for full drives and portable drives. Windows consistently improves data protection by improving existing options and providing new strategies.
|
||||||
|
|
||||||
|
@ -1330,5 +1330,5 @@ PCR 7 measurements are a mandatory logo requirement for systems that support Mod
|
|||||||
- [Trusted Platform Module](/windows/device-security/tpm/trusted-platform-module-overview)
|
- [Trusted Platform Module](/windows/device-security/tpm/trusted-platform-module-overview)
|
||||||
- [TPM Group Policy settings](/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings)
|
- [TPM Group Policy settings](/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
|
@ -113,7 +113,7 @@ Enable-WindowsOptionalFeature -Online -FeatureName BitLocker, BitLocker-Utilitie
|
|||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
||||||
|
@ -454,6 +454,6 @@ Follow these steps to configure Network Unlock on these older systems.
|
|||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
|
@ -9,7 +9,7 @@ ms.date: 11/08/2022
|
|||||||
|
|
||||||
The ideal solution for BitLocker management is to eliminate the need for IT administrators to set management policies using tools or other mechanisms by having Windows perform tasks that are more practical to automate. This vision leverages modern hardware developments. The growth of TPM 2.0, secure boot, and other hardware improvements, for example, have helped to alleviate the support burden on help desks and a decrease in support-call volumes, yielding improved user satisfaction. Windows continues to be the focus for new features and improvements for built-in encryption management, such as automatically enabling encryption on devices that support Modern Standby beginning with Windows 8.1.
|
The ideal solution for BitLocker management is to eliminate the need for IT administrators to set management policies using tools or other mechanisms by having Windows perform tasks that are more practical to automate. This vision leverages modern hardware developments. The growth of TPM 2.0, secure boot, and other hardware improvements, for example, have helped to alleviate the support burden on help desks and a decrease in support-call volumes, yielding improved user satisfaction. Windows continues to be the focus for new features and improvements for built-in encryption management, such as automatically enabling encryption on devices that support Modern Standby beginning with Windows 8.1.
|
||||||
|
|
||||||
Though much Windows [BitLocker documentation](bitlocker-overview.md) has been published, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently asked questions, and also provides BitLocker recommendations for different types of computers.
|
Though much Windows [BitLocker documentation](index.md) has been published, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently asked questions, and also provides BitLocker recommendations for different types of computers.
|
||||||
|
|
||||||
[!INCLUDE [bitlocker](../../../../../includes/licensing/bitlocker-management.md)]
|
[!INCLUDE [bitlocker](../../../../../includes/licensing/bitlocker-management.md)]
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ sections:
|
|||||||
|
|
||||||
- question: What are the BitLocker hardware and software requirements?
|
- question: What are the BitLocker hardware and software requirements?
|
||||||
answer: |
|
answer: |
|
||||||
For requirements, see [System requirements](bitlocker-overview.md#system-requirements).
|
For requirements, see [System requirements](index.md#system-requirements).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Dynamic disks aren't supported by BitLocker. Dynamic data volumes won't be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it's a Dynamic disk, if it's a dynamic disk it can't be protected by BitLocker.
|
> Dynamic disks aren't supported by BitLocker. Dynamic data volumes won't be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it's a Dynamic disk, if it's a dynamic disk it can't be protected by BitLocker.
|
||||||
|
@ -976,4 +976,4 @@ End Function
|
|||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
|
@ -232,7 +232,7 @@ Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup S-1-5-
|
|||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](index.md)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
||||||
|
@ -58,7 +58,7 @@ By completing the procedures in this scenario, the recovery passwords for a comp
|
|||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [BitLocker Overview](bitlocker-overview.md)
|
- [BitLocker Overview](index.md)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
- [BitLocker: How to deploy on Windows Server 2012](bitlocker-how-to-deploy-on-windows-server.md)
|
- [BitLocker: How to deploy on Windows Server 2012](bitlocker-how-to-deploy-on-windows-server.md)
|
||||||
|
@ -188,6 +188,6 @@ On Windows Server 2012 R2 and Windows 8.1 and older, recovery passwords generate
|
|||||||
- [Trusted Platform Module](../tpm/trusted-platform-module-top-node.md)
|
- [Trusted Platform Module](../tpm/trusted-platform-module-top-node.md)
|
||||||
- [TPM Group Policy settings](../tpm/trusted-platform-module-services-group-policy-settings.md)
|
- [TPM Group Policy settings](../tpm/trusted-platform-module-services-group-policy-settings.md)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.yml)
|
||||||
- [BitLocker](bitlocker-overview.md)
|
- [BitLocker](index.md)
|
||||||
- [BitLocker Group Policy settings](bitlocker-group-policy-settings.md)
|
- [BitLocker Group Policy settings](bitlocker-group-policy-settings.md)
|
||||||
- [BitLocker basic deployment](bitlocker-basic-deployment.md)
|
- [BitLocker basic deployment](bitlocker-basic-deployment.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
items:
|
items:
|
||||||
- name: Overview
|
- name: Overview
|
||||||
href: bitlocker-overview.md
|
href: index.md
|
||||||
- name: BitLocker device encryption
|
- name: BitLocker device encryption
|
||||||
href: bitlocker-device-encryption-overview-windows-10.md
|
href: bitlocker-device-encryption-overview-windows-10.md
|
||||||
- name: BitLocker frequently asked questions (FAQ)
|
- name: BitLocker frequently asked questions (FAQ)
|
||||||
|
@ -45,5 +45,5 @@ Windows consistently improves data protection by improving existing options and
|
|||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [Encrypted Hard Drive](encrypted-hard-drive.md)
|
- [Encrypted Hard Drive](encrypted-hard-drive.md)
|
||||||
- [BitLocker](bitlocker/bitlocker-overview.md)
|
- [BitLocker](bitlocker/index.md)
|
||||||
- [Personal Data Encryption (PDE)](personal-data-encryption/index.md)
|
- [Personal Data Encryption (PDE)](personal-data-encryption/index.md)
|
||||||
|
@ -69,7 +69,7 @@ ms.date: 03/13/2023
|
|||||||
|
|
||||||
### Highly recommended
|
### Highly recommended
|
||||||
|
|
||||||
- [BitLocker Drive Encryption](bitlocker/bitlocker-overview.md) enabled
|
- [BitLocker Drive Encryption](../bitlocker/index.md) enabled
|
||||||
|
|
||||||
Although PDE will work without BitLocker, it's recommended to also enable BitLocker. PDE is meant to work alongside BitLocker for increased security. PDE isn't a replacement for BitLocker.
|
Although PDE will work without BitLocker, it's recommended to also enable BitLocker. PDE is meant to work alongside BitLocker for increased security. PDE isn't a replacement for BitLocker.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ Use the links in the following table to learn more about the operating system se
|
|||||||
Cryptography and certificate management|Cryptography uses code to convert data so that only a specific recipient can read it by using a key. Cryptography enforces privacy to prevent anyone except the intended recipient from reading data, integrity to ensure data is free of tampering, and authentication that verifies identity to ensure that communication is secure. <br><br/> Learn more about [Cryptography and certificate management](cryptography-certificate-mgmt.md). <br/><br/>|
|
Cryptography and certificate management|Cryptography uses code to convert data so that only a specific recipient can read it by using a key. Cryptography enforces privacy to prevent anyone except the intended recipient from reading data, integrity to ensure data is free of tampering, and authentication that verifies identity to ensure that communication is secure. <br><br/> Learn more about [Cryptography and certificate management](cryptography-certificate-mgmt.md). <br/><br/>|
|
||||||
Windows Security app | The Windows built-in security application found in settings provides an at-a-glance view of the security status and health of your device. These insights help you identify issues and take action to make sure you're protected. You can quickly see the status of your virus and threat protection, firewall and network security, device security controls, and more. <br><br/> Learn more about the [Windows Security app](threat-protection/windows-defender-security-center/windows-defender-security-center.md).|
|
Windows Security app | The Windows built-in security application found in settings provides an at-a-glance view of the security status and health of your device. These insights help you identify issues and take action to make sure you're protected. You can quickly see the status of your virus and threat protection, firewall and network security, device security controls, and more. <br><br/> Learn more about the [Windows Security app](threat-protection/windows-defender-security-center/windows-defender-security-center.md).|
|
||||||
| Encryption and data protection | Wherever confidential data is stored, it must be protected against unauthorized access, whether through physical device theft or from malicious applications. Windows provides strong at-rest data-protection solutions that guard against nefarious attackers. <br/><br/> Learn more about [Encryption](encryption-data-protection.md).
|
| Encryption and data protection | Wherever confidential data is stored, it must be protected against unauthorized access, whether through physical device theft or from malicious applications. Windows provides strong at-rest data-protection solutions that guard against nefarious attackers. <br/><br/> Learn more about [Encryption](encryption-data-protection.md).
|
||||||
| BitLocker | BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. <br/> <br/> Learn more about [BitLocker](information-protection/bitlocker/bitlocker-overview.md). |
|
| BitLocker | BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. <br/> <br/> Learn more about [BitLocker](information-protection/bitlocker/index.md). |
|
||||||
| Encrypted Hard Drive | Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. <br> By offloading the cryptographic operations to hardware, Encrypted Hard Drives increase BitLocker performance and reduce CPU usage and power consumption. Because Encrypted Hard Drives encrypt data quickly, enterprise devices can expand BitLocker deployment with minimal impact on productivity. <br/><br/> Learn more about [Encrypted Hard Drives](information-protection/encrypted-hard-drive.md).|
|
| Encrypted Hard Drive | Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. <br> By offloading the cryptographic operations to hardware, Encrypted Hard Drives increase BitLocker performance and reduce CPU usage and power consumption. Because Encrypted Hard Drives encrypt data quickly, enterprise devices can expand BitLocker deployment with minimal impact on productivity. <br/><br/> Learn more about [Encrypted Hard Drives](information-protection/encrypted-hard-drive.md).|
|
||||||
| S/MIME | S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. <br/><br/> Learn more about [S/MIME for Windows](operating-system-security/data-protection/configure-s-mime.md).|
|
| S/MIME | S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. <br/><br/> Learn more about [S/MIME for Windows](operating-system-security/data-protection/configure-s-mime.md).|
|
||||||
| Security baselines | A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. <br/><br/>Security baselines are included in the [Security Compliance Toolkit](threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md) that you can download from the Microsoft Download Center.<br/><br/>Learn more about [security baselines](threat-protection/windows-security-configuration-framework/windows-security-baselines.md). |
|
| Security baselines | A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers. <br/><br/>Security baselines are included in the [Security Compliance Toolkit](threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md) that you can download from the Microsoft Download Center.<br/><br/>Learn more about [security baselines](threat-protection/windows-security-configuration-framework/windows-security-baselines.md). |
|
||||||
|
Loading…
x
Reference in New Issue
Block a user