programming4us
programming4us
SECURITY

Windows 8 : Managing BitLocker and other policy-based mobility tools (part 3) - Managing BitLocker at the command line

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
6/21/2014 9:36:46 PM

Using BitLocker on computers without TPM

Although the Trusted Platform Module (TPM) is present on an increasing number of devices to aid with security, there are still devices in use today that do not use TPM technology. Because Windows 8 can operate on hardware that might have been provisioned for earlier versions of Windows, organizations might not purchase new laptops or, if they do purchase new laptops, they might be smaller, more portable units that do not support TPM.

In these cases, it is still possible to use BitLocker encryption to keep the information stored on mobile devices secure. The encryption key information for a BitLocker-encrypted drive will be stored on startup key storage.

Startup key storage is a storage device, usually a USB flash device, that stores the encryption key for the BitLocker configuration on a device. When the computer starts, the process asks for the USB key containing the BitLocker encryption key. After the key is provided, the computer continues to start.

To enable BitLocker on a computer without TPM, complete the following steps:

  1. Launch the Local Group Policy Editor by searching for gpedit.msc on the Start screen or typing gpedit.msc in the Run dialog box (Windows logo key+R).

  2. Expand the Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption path.

  3. Select Operating System Drives.

  4. Press and hold or right-click Require Additional Authentication At Startup.

  5. Select Enabled.

  6. Select Allow BitLocker Without A Compatible TPM.

  7. Tap or click OK to save the changes.

Important

DOCUMENT THE CHANGES

When modifying policies such as BitLocker, it is helpful to add a comment about what has been done and the reason for the change. Since the release of Windows 7, comments have been visible when searching for policy objects. A short description can be helpful when looking for objects that have been modified.

After the settings in local Group Policy have been adjusted to allow the use of a startup key, computers without the option of TPM will be able to encrypt drives. When the policy is configured, the default options for the Group Policy Object (GPO) also enable the use of TPM, as shown in Figure 2. The settings do not disable it; they just allow the encryption key to be stored elsewhere.

Configuring BitLocker to run on a device without TPM

Figure 2. Configuring BitLocker to run on a device without TPM

Using BitLocker on removable media (BitLocker To Go)

Just as BitLocker for built-in drives enables data to be encrypted, BitLocker To Go focuses on removable media and encrypting data stored there. When BitLocker To Go is enabled, the entire volume is encrypted, and one key is stored on the removable media. The other portion of the pair is a password known to whomever encrypted the drive. When the drive is inserted on a computer that supports BitLocker, a password prompt appears to allow the drive to be unlocked.

Windows 8 includes the following policy settings for BitLocker for removable drives:

  • Control Use Of BitLocker On Removable Drives

  • Configure Use Of Smart Cards On Removable Data Drives

  • Deny Write Access To Removable Drives Not Protected By BitLocker

  • Configure Use Of Hardware-Based Encryption For Removable Media

  • Enforce Drive Encryption Type On Removable Data Drives

  • Allow Access To BitLocker-Protected Removable Data Drives From Earlier Versions Of Windows

  • Configure Use Of Passwords For Removable Data Drives

  • Choose How BitLocker-Protected Removable Drives Can Be Recovered

To configure the policy objects for BitLocker on removable media, complete the following steps:

  1. Launch the Local Group Policy Editor by searching for gpedit.msc on the Start screen or typing gpedit.msc in the Run dialog box (Windows logo key+R).

  2. Expand the Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives path.

  3. Double-tap or double-click the policy object you want to work with.

  4. Select Enabled.

  5. Configure other options, if available, as needed for your organization.

  6. Document the changes within the object’s comments dialog box.

  7. Tap or click OK to save the changes.

Important

DO NOT ENCRYPT STARTUP KEY DEVICES BY USING BITLOCKER

Using BitLocker to encrypt a removable drive used as a startup key for a computer that does not support TPM is not supported. Because the computer requires the key from the USB drive to start Windows, but the USB drive is encrypted by BitLocker, which requires Windows to be accessed, the device will be unable to start a computer.

Other  
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us