mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Update config-lock.md
Removed unwanted para
This commit is contained in:
parent
3956c25ebc
commit
dbe0a69c2c
@ -31,9 +31,7 @@ To summarize, Config Lock:
|
|||||||
|
|
||||||
## Configuration Flow
|
## Configuration Flow
|
||||||
|
|
||||||
After a Secured-Core PC reaches the desktop, Config lock will prevent configuration drift as follows:
|
After a Secured-Core PC reaches the desktop, Config Lock will prevent configuration drift by detecting if the device is a Secured-Core PC or not. When the device is not a Secured-Core PC, the lock will not apply. If the device is a Secured-Core PC, config lock will lock the policies listed here.
|
||||||
|
|
||||||
Config Lock will prevent configuration drift by detecting if the device is a Secured-Core PC or not. When the device is not a Secured-Core PC, the lock will not apply. If the device is a Secured-Core PC, config lock will lock the policies listed here.
|
|
||||||
|
|
||||||
**List of locked policies**
|
**List of locked policies**
|
||||||
|
|
||||||
@ -88,19 +86,12 @@ Config Lock will prevent configuration drift by detecting if the device is a Sec
|
|||||||
|[SmartScreen/EnableSmartScreenInShell](policy-csp-smartscreen.md) |
|
|[SmartScreen/EnableSmartScreenInShell](policy-csp-smartscreen.md) |
|
||||||
|[SmartScreen/PreventOverrideForFilesInShell](policy-csp-smartscreen.md) |
|
|[SmartScreen/PreventOverrideForFilesInShell](policy-csp-smartscreen.md) |
|
||||||
|
|
||||||
- If so, prevent the following Secured-Core PC features from being disabled without IT Admin permission:
|
|
||||||
- Memory Access Protection (kDMA)
|
|
||||||
- Memory Integrity (HVCI)
|
|
||||||
- System Guard
|
|
||||||
- DRTM
|
|
||||||
- SMM
|
|
||||||
|
|
||||||
:::image type="content" source="images/flow_configlock.png" alt-text="config lock flow.":::
|
:::image type="content" source="images/flow_configlock.png" alt-text="config lock flow.":::
|
||||||
|
|
||||||
IT Admin scenario:
|
IT Admin scenario:
|
||||||
|
|
||||||
1. IT Admin use MDM to enable Config Lock
|
1. IT Admins use MDM to enable Config Lock
|
||||||
1. IT Admin use MDM service to set policies
|
1. IT Admins use MDM service to set policies
|
||||||
1. Policies are targeted to user/device
|
1. Policies are targeted to user/device
|
||||||
1. Policies come down to device and get set
|
1. Policies come down to device and get set
|
||||||
1. Configurations are locked
|
1. Configurations are locked
|
||||||
|
Loading…
x
Reference in New Issue
Block a user