Skip to content
This repository has been archived by the owner on Jun 3, 2021. It is now read-only.

Commit

Permalink
fix csv by removing scratch info
Browse files Browse the repository at this point in the history
  • Loading branch information
iadgovuser1 committed Jul 24, 2019
1 parent 07c311a commit b675abf
Showing 1 changed file with 1 addition and 4 deletions.
5 changes: 1 addition & 4 deletions BitLockerPolicies.csv
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,4 @@ Computer Configuration > Administrative Templates > Windows Components > BitLock
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption,"Choose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507]) > Select encryption method",Enabled,AES 256-bit,HKLM\Software\Policies\Microsoft\FVE,EncryptionMethodNoDiffuser,4,Windows 8 - Windows 10 1507,Windows Server 2012 - Windows Server 2012 R2,Yes
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption,"Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2) > Select encryption method",Enabled,AES 256-bit,HKLM\Software\Policies\Microsoft\FVE,EncryptionMethod,2,Windows Vista - Windows 7,Windows Server 2008 - Windows Server 2008 R2,Yes
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption,Disable new DMA devices when this computer is locked,Enabled, ,HKLM\Software\Policies\Microsoft\FVE,DisableExternalDMAUnderLock,1,Windows 10 1703+,N/A,Yes
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives,Allow Secure Boot for integrity validation,Enabled *or* Not Configured, ,HKLM\Software\Policies\Microsoft\FVE,OSAllowSecureBootForIntegrity *or* not exist,1 *or* not exist,Windows 8+,Windows Server 2012+,No

Choose how BitLocker-protected operating system drives can be recovered
Save BitLocker recovery information to AD DS for operating system drives
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives,Allow Secure Boot for integrity validation,Enabled *or* Not Configured, ,HKLM\Software\Policies\Microsoft\FVE,OSAllowSecureBootForIntegrity *or* not exist,1 *or* not exist,Windows 8+,Windows Server 2012+,No

0 comments on commit b675abf

Please sign in to comment.