mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 04:13:41 +00:00
Various corrections for Acrolinx: Correctness
I made additional Acrolinx-guided corrections in operations-guide.md because there were so many issues reported by Acrolinx: Correctness that it seemed quicker to run Acrolinx in VS Code and click through the suggestions (rather than hunt for each issue and fix it).
This commit is contained in:
@ -12,8 +12,8 @@ With this policy you can configure a numeric recovery password rotation upon use
|
||||
Possible values are:
|
||||
|
||||
- `0`: numeric recovery password rotation is turned off
|
||||
- `1`: numeric recovery password rotation upon use is *on* for Microsoft Entra joined devices joined devices. This is also the default value
|
||||
- `2`: numeric recovery password rotation upon use is *on* for both Microsoft Entra joined devices and Microsoft Entra hybrid joined devices
|
||||
- `1`: numeric recovery password rotation upon use is *on* for Microsoft Entra–joined devices. This is also the default value
|
||||
- `2`: numeric recovery password rotation upon use is *on* for both Microsoft Entra–joined devices and Microsoft Entra hybrid joined devices
|
||||
|
||||
> [!NOTE]
|
||||
> The Policy is effective only when Micropsoft Entra ID or Active Directory backup for recovery password is configured to *required*
|
||||
|
@ -9,7 +9,7 @@ ms.topic: include
|
||||
|
||||
This policy setting determines what values the TPM measures when it validates early boot components before it unlocks an operating system drive on a computer with a BIOS configuration or with UEFI firmware that has the Compatibility Support Module (CSM) enabled.
|
||||
|
||||
- When enabled , the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive can be configured. If any of these components change while BitLocker protection is in effect, then the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.
|
||||
- When enabled, the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive can be configured. If any of these components change while BitLocker protection is in effect, then the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.
|
||||
- When disabled or not configured, the TPM uses the default platform validation profile or the platform validation profile that is specified by the setup script.
|
||||
|
||||
This policy setting doesn't apply if the computer doesn't have a compatible TPM or if BitLocker has already been turned on with TPM protection.
|
||||
|
Reference in New Issue
Block a user