3.2 More Information

For more detailed information about the capabilities and employment of the Disk Encryption and Microsoft Data Encryption policies, reference the following documents: