@@ -136,7 +136,8 @@ and still maintain confidentiality of passwords.
136136
137137You may optionally select an encryption method. By default, BitLocker uses AES-128 but you can opt
138138AES-256 for stronger security. (Diffuser is not supported.) You may request hardware encryption but
139- we strongly advise against it. For further guidance, see the [ ADV180028 Security Advisory] [ 1 ] .
139+ we strongly advise against it. For further guidance, see the
140+ [ ADV180028 Security Advisory] ( https://msrc.microsoft.com/update-guide/vulnerability/ADV180028 ) .
140141
141142This cmdlet returns a BitLocker volume object. If you choose recovery password as your key protector
142143but do not specify a 48-digit recovery password, this cmdlet generates a random one for you, and
@@ -159,7 +160,8 @@ It is common practice to add a recovery password for an operating system volume
159160** Backup-BitLockerKeyProtector** cmdlet, and then enable BitLocker on that volume. This procedure
160161ensures that you have a recovery option.
161162
162- For an overview of BitLocker, see the [ BitLocker Drive Encryption Overview] [ 2 ] .
163+ For an overview of BitLocker, see the
164+ [ BitLocker Drive Encryption Overview] ( /previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11) ) .
163165
164166## EXAMPLES
165167
@@ -257,12 +259,12 @@ Accept wildcard characters: False
257259Specifies an encryption method for the encrypted drive. The accepted values are "Aes128", "Aes256",
258260and "Hardware". The latter has been deprecated and doesn't appear in the next versions of Windows.
259261We strongly advise not enabling hardware encryption. For further guidance, see the
260- [ADV180028 Security Advisory][1] .
262+ [ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028) .
261263
262264` ` ` yaml
263265Type : BitLockerVolumeEncryptionMethodOnEnable
264266Parameter Sets : (All)
265- Aliases :
267+ Aliases :
266268Accepted values : Aes128, Aes256, Hardware
267269
268270Required : False
@@ -275,12 +277,13 @@ Accept wildcard characters: False
275277### -HardwareEncryption
276278
277279Indicates that the volume uses hardware encryption. We strongly advise against hardware encryption.
278- For further guidance, see the [ADV180028 Security Advisory][1].
280+ For further guidance, see the
281+ [ADV180028 Security Advisory](https://msrc.microsoft.com/update-guide/vulnerability/ADV180028).
279282
280283` ` ` yaml
281284Type : SwitchParameter
282285Parameter Sets : (All)
283- Aliases :
286+ Aliases :
284287
285288Required : False
286289Position : Named
@@ -298,7 +301,7 @@ To obtain a BitLocker volume object, use the **Get-BitLockerVolume** cmdlet.
298301` ` ` yaml
299302Type : String[]
300303Parameter Sets : (All)
301- Aliases :
304+ Aliases :
302305
303306Required : True
304307Position : 0
@@ -434,7 +437,7 @@ Indicates that the system account for this computer unlocks the encrypted volume
434437` ` ` yaml
435438Type : SwitchParameter
436439Parameter Sets : AdAccountOrGroupProtector
437- Aliases :
440+ Aliases :
438441
439442Required : False
440443Position : Named
@@ -617,7 +620,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
617620[Suspend-BitLocker](./Suspend-BitLocker.md)
618621
619622[Unlock-BitLocker](./Unlock-BitLocker.md)
620-
621- <!-- link references -->
622- [1]: https://msrc.microsoft.com/update-guide/vulnerability/ADV180028
623- [2]: https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732774(v=ws.11)
0 commit comments