Skip to content

Commit 8e5c38d

Browse files
authored
Merge pull request MicrosoftDocs#3057 from sdwheeler/sdw-fix-rl2
Remove link refs to fix build
2 parents fc045ba + c50b221 commit 8e5c38d

File tree

5 files changed

+43
-45
lines changed

5 files changed

+43
-45
lines changed

docset/winserver2012-ps/bitlocker/Enable-BitLocker.md

+11-12
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,8 @@ and still maintain confidentiality of passwords.
136136

137137
You may optionally select an encryption method. By default, BitLocker uses AES-128 but you can opt
138138
AES-256 for stronger security. (Diffuser is not supported.) You may request hardware encryption but
139-
we strongly advise against it. For further guidance, see the [ADV180028 Security Advisory][1].
139+
we strongly advise against it. For further guidance, see the
140+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
140141

141142
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
142143
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -159,7 +160,8 @@ It is common practice to add a recovery password for an operating system volume
159160
**Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
160161
ensures that you have a recovery option.
161162

162-
For an overview of BitLocker, see the [BitLocker Drive Encryption Overview][2].
163+
For an overview of BitLocker, see the
164+
[BitLocker Drive Encryption Overview](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)).
163165

164166
## EXAMPLES
165167

@@ -257,12 +259,12 @@ Accept wildcard characters: False
257259
Specifies an encryption method for the encrypted drive. The accepted values are "Aes128", "Aes256",
258260
and "Hardware". The latter has been deprecated and doesn't appear in the next versions of Windows.
259261
We strongly advise not enabling hardware encryption. For further guidance, see the
260-
[ADV180028 Security Advisory][1].
262+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
261263
262264
```yaml
263265
Type: BitLockerVolumeEncryptionMethodOnEnable
264266
Parameter Sets: (All)
265-
Aliases:
267+
Aliases:
266268
Accepted values: Aes128, Aes256, Hardware
267269

268270
Required: False
@@ -275,12 +277,13 @@ Accept wildcard characters: False
275277
### -HardwareEncryption
276278
277279
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
278-
For further guidance, see the [ADV180028 Security Advisory][1].
280+
For further guidance, see the
281+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
279282
280283
```yaml
281284
Type: SwitchParameter
282285
Parameter Sets: (All)
283-
Aliases:
286+
Aliases:
284287

285288
Required: False
286289
Position: Named
@@ -298,7 +301,7 @@ To obtain a BitLocker volume object, use the **Get-BitLockerVolume** cmdlet.
298301
```yaml
299302
Type: String[]
300303
Parameter Sets: (All)
301-
Aliases:
304+
Aliases:
302305

303306
Required: True
304307
Position: 0
@@ -434,7 +437,7 @@ Indicates that the system account for this computer unlocks the encrypted volume
434437
```yaml
435438
Type: SwitchParameter
436439
Parameter Sets: AdAccountOrGroupProtector
437-
Aliases:
440+
Aliases:
438441

439442
Required: False
440443
Position: Named
@@ -617,7 +620,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
617620
[Suspend-BitLocker](./Suspend-BitLocker.md)
618621
619622
[Unlock-BitLocker](./Unlock-BitLocker.md)
620-
621-
<!-- link references -->
622-
[1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
623-
[2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)

docset/winserver2012r2-ps/bitlocker/Enable-BitLocker.md

+7-8
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,8 @@ and still maintain confidentiality of passwords.
136136

137137
You may optionally select an encryption method. By default, BitLocker uses AES-128 but you can opt
138138
AES-256 for stronger security. You may request hardware encryption but we strongly advise
139-
against it. For further guidance, see the [ADV180028 Security Advisory][1].
139+
against it. For further guidance, see the
140+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
140141

141142
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
142143
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -159,7 +160,8 @@ It is common practice to add a recovery password for an operating system volume
159160
**Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
160161
ensures that you have a recovery option.
161162

162-
For an overview of BitLocker, see the [BitLocker Drive Encryption Overview][2].
163+
For an overview of BitLocker, see the
164+
[BitLocker Drive Encryption Overview](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)).
163165

164166
## EXAMPLES
165167

@@ -257,7 +259,7 @@ Accept wildcard characters: False
257259
Specifies an encryption method for the encrypted drive. The accepted values are "Aes128", "Aes256",
258260
and "Hardware". The latter has been deprecated and doesn't appear in the next versions of Windows.
259261
We strongly advise not enabling hardware encryption. For further guidance, see the
260-
[ADV180028 Security Advisory][1].
262+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
261263
262264
```yaml
263265
Type: BitLockerVolumeEncryptionMethodOnEnable
@@ -275,7 +277,8 @@ Accept wildcard characters: False
275277
### -HardwareEncryption
276278
277279
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
278-
For further guidance, see the [ADV180028 Security Advisory][1].
280+
For further guidance, see the
281+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
279282
280283
```yaml
281284
Type: SwitchParameter
@@ -617,7 +620,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
617620
[Suspend-BitLocker](./Suspend-BitLocker.md)
618621
619622
[Unlock-BitLocker](./Unlock-BitLocker.md)
620-
621-
<!-- link references -->
622-
[1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
623-
[2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)

docset/winserver2016-ps/bitlocker/Enable-BitLocker.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,8 @@ We strongly recommend specifying the encryption method. By default, BitLocker us
138138
can opt XTS-AES-256 for stronger security. However, if you are encrypting a removable media and
139139
intend to use it on Windows 8.1 or Windows Server 2012 R2, you must opt either AES-128 or AES-256
140140
for backward compatibility. You may request hardware encryption but we strongly advise
141-
against it. For further guidance, see the [ADV180028 Security Advisory][1].
141+
against it. For further guidance, see the
142+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
142143

143144
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
144145
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -161,7 +162,8 @@ It is common practice to add a recovery password for an operating system volume
161162
**Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
162163
ensures that you have a recovery option.
163164

164-
For an overview of BitLocker, see the [BitLocker Drive Encryption Overview][2].
165+
For an overview of BitLocker, see the
166+
[BitLocker Drive Encryption Overview](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)).
165167

166168
## EXAMPLES
167169

@@ -256,7 +258,8 @@ Accept wildcard characters: False
256258
257259
### -EncryptionMethod
258260
259-
Specifies an encryption method for the encrypted drive.
261+
Specifies an encryption method for the encrypted drive. For further guidance, see the
262+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
260263
261264
```yaml
262265
Type: BitLockerVolumeEncryptionMethodOnEnable
@@ -274,7 +277,8 @@ Accept wildcard characters: False
274277
### -HardwareEncryption
275278
276279
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
277-
For further guidance, see the [ADV180028 Security Advisory][1].
280+
For further guidance, see the
281+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
278282
279283
```yaml
280284
Type: SwitchParameter
@@ -614,7 +618,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
614618
[Suspend-BitLocker](./Suspend-BitLocker.md)
615619
616620
[Unlock-BitLocker](./Unlock-BitLocker.md)
617-
618-
<!-- link references -->
619-
[1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
620-
[2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)

docset/winserver2019-ps/bitlocker/Enable-BitLocker.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,8 @@ We strongly recommend specifying the encryption method. By default, BitLocker us
138138
can opt XTS-AES-256 for stronger security. However, if you are encrypting a removable media and
139139
intend to use it on Windows 8.1 or Windows Server 2012 R2, you must opt either AES-128 or AES-256
140140
for backward compatibility. You may request hardware encryption but we strongly advise
141-
against it. For further guidance, see the [ADV180028 Security Advisory][1].
141+
against it. For further guidance, see the
142+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
142143

143144
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
144145
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -161,7 +162,8 @@ It is common practice to add a recovery password for an operating system volume
161162
**Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
162163
ensures that you have a recovery option.
163164

164-
For an overview of BitLocker, see the [BitLocker Drive Encryption Overview][2].
165+
For an overview of BitLocker, see the
166+
[BitLocker Drive Encryption Overview](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)).
165167

166168
## EXAMPLES
167169

@@ -256,8 +258,8 @@ Accept wildcard characters: False
256258
257259
### -EncryptionMethod
258260
259-
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
260-
For further guidance, see the [ADV180028 Security Advisory][1].
261+
Specifies an encryption method for the encrypted drive. For further guidance, see the
262+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
261263
262264
```yaml
263265
Type: BitLockerVolumeEncryptionMethodOnEnable
@@ -274,7 +276,9 @@ Accept wildcard characters: False
274276
275277
### -HardwareEncryption
276278
277-
Indicates that the volume uses hardware encryption.
279+
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
280+
For further guidance, see the
281+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
278282
279283
```yaml
280284
Type: SwitchParameter
@@ -614,7 +618,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
614618
[Suspend-BitLocker](./Suspend-BitLocker.md)
615619
616620
[Unlock-BitLocker](./Unlock-BitLocker.md)
617-
618-
<!-- link references -->
619-
[1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
620-
[2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)

docset/winserver2022-ps/bitlocker/Enable-BitLocker.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,8 @@ We strongly recommend specifying the encryption method. By default, BitLocker us
138138
can opt XTS-AES-256 for stronger security. However, if you are encrypting a removable media and
139139
intend to use it on Windows 8.1 or Windows Server 2012 R2, you must opt either AES-128 or AES-256
140140
for backward compatibility. You may request hardware encryption but we strongly advise
141-
against it. For further guidance, see the [ADV180028 Security Advisory][1].
141+
against it. For further guidance, see the
142+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
142143

143144
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
144145
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -161,7 +162,8 @@ It is common practice to add a recovery password for an operating system volume
161162
**Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
162163
ensures that you have a recovery option.
163164

164-
For an overview of BitLocker, see the [BitLocker Drive Encryption Overview][2].
165+
For an overview of BitLocker, see the
166+
[BitLocker Drive Encryption Overview](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)).
165167

166168
## EXAMPLES
167169

@@ -256,7 +258,8 @@ Accept wildcard characters: False
256258
257259
### -EncryptionMethod
258260
259-
Specifies an encryption method for the encrypted drive.
261+
Specifies an encryption method for the encrypted drive. For further guidance, see the
262+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
260263
261264
```yaml
262265
Type: BitLockerVolumeEncryptionMethodOnEnable
@@ -274,7 +277,8 @@ Accept wildcard characters: False
274277
### -HardwareEncryption
275278
276279
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
277-
For further guidance, see the [ADV180028 Security Advisory][1].
280+
For further guidance, see the
281+
[ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
278282
279283
```yaml
280284
Type: SwitchParameter
@@ -614,7 +618,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
614618
[Suspend-BitLocker](./Suspend-BitLocker.md)
615619
616620
[Unlock-BitLocker](./Unlock-BitLocker.md)
617-
618-
<!-- link references -->
619-
[1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
620-
[2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)

0 commit comments

Comments
 (0)