@@ -136,7 +136,8 @@ and still maintain confidentiality of passwords.
136
136
137
137
You may optionally select an encryption method. By default, BitLocker uses AES-128 but you can opt
138
138
AES-256 for stronger security. (Diffuser is not supported.) You may request hardware encryption but
139
- we strongly advise against it. For further guidance, see the [ ADV180028 Security Advisory] [ 1 ] .
139
+ we strongly advise against it. For further guidance, see the
140
+ [ ADV180028 Security Advisory] ( https://msrc.microsoft.com/update-guide/vulnerability/ADV180028 ) .
140
141
141
142
This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
142
143
but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -159,7 +160,8 @@ It is common practice to add a recovery password for an operating system volume
159
160
** Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
160
161
ensures that you have a recovery option.
161
162
162
- For an overview of BitLocker, see the [ BitLocker Drive Encryption Overview] [ 2 ] .
163
+ For an overview of BitLocker, see the
164
+ [ BitLocker Drive Encryption Overview] ( /previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11) ) .
163
165
164
166
## EXAMPLES
165
167
@@ -257,12 +259,12 @@ Accept wildcard characters: False
257
259
Specifies an encryption method for the encrypted drive. The accepted values are "Aes128", "Aes256",
258
260
and "Hardware". The latter has been deprecated and doesn't appear in the next versions of Windows.
259
261
We strongly advise not enabling hardware encryption. For further guidance, see the
260
- [ADV180028 Security Advisory][1] .
262
+ [ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028) .
261
263
262
264
` ` ` yaml
263
265
Type : BitLockerVolumeEncryptionMethodOnEnable
264
266
Parameter Sets : (All)
265
- Aliases :
267
+ Aliases :
266
268
Accepted values : Aes128, Aes256, Hardware
267
269
268
270
Required : False
@@ -275,12 +277,13 @@ Accept wildcard characters: False
275
277
### -HardwareEncryption
276
278
277
279
Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
278
- For further guidance, see the [ADV180028 Security Advisory][1].
280
+ For further guidance, see the
281
+ [ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
279
282
280
283
` ` ` yaml
281
284
Type : SwitchParameter
282
285
Parameter Sets : (All)
283
- Aliases :
286
+ Aliases :
284
287
285
288
Required : False
286
289
Position : Named
@@ -298,7 +301,7 @@ To obtain a BitLocker volume object, use the **Get-BitLockerVolume** cmdlet.
298
301
` ` ` yaml
299
302
Type : String[]
300
303
Parameter Sets : (All)
301
- Aliases :
304
+ Aliases :
302
305
303
306
Required : True
304
307
Position : 0
@@ -434,7 +437,7 @@ Indicates that the system account for this computer unlocks the encrypted volume
434
437
` ` ` yaml
435
438
Type : SwitchParameter
436
439
Parameter Sets : AdAccountOrGroupProtector
437
- Aliases :
440
+ Aliases :
438
441
439
442
Required : False
440
443
Position : Named
@@ -617,7 +620,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
617
620
[Suspend-BitLocker](./Suspend-BitLocker.md)
618
621
619
622
[Unlock-BitLocker](./Unlock-BitLocker.md)
620
-
621
- <!-- link references -->
622
- [1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
623
- [2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)
0 commit comments