BitLocker Group Policy settings (Windows 10) – Windows security | Microsoft Docs.
Also, the feature allows protecting the data on the installation drive, secondary storage, and removable media with “BitLocker To Go.” In this. In this article. Can BitLocker deployment be automated in an enterprise environment? Can BitLocker encrypt more than just the operating system drive? Is there a. This article provides an overview of how BitLocker Device Encryption can help Deploy hard drive encryption; BitLocker device encryption.
– Windows 10 bitlocker enterprise deployment free
Review your existing disk encryption software corporate security policies. If your organization isn’t using disk encryption software, then none of these policies will exist. If you use disk encryption software, then you might need to change your organization’s policies to use the BitLocker features. To help you document your organization’s current disk encryption security policies, answer the following questions:.
The trusted platform module TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data. And, help make sure a computer hasn’t been tampered with while the system was offline. Also, BitLocker can lock the normal startup process until the user supplies a personal identification number PIN or inserts a removable USB device, such as a flash drive, that contains a startup key.
These extra security measures provide multifactor authentication. They also make sure that the computer won’t start or resume from hibernation until the correct PIN or startup key is presented. On computers that don’t have a TPM version 1. However, this implementation requires the user to insert a USB startup key to start the computer or resume from hibernation.
It doesn’t provide the pre-startup system integrity verification offered by BitLocker working with a TPM. Determine if you’re support computers that don’t have a TPM version 1.
If you support BitLocker on this type of computer, a user must use a USB startup key to boot the system. This startup key requires extra support processes similar to multifactor authentication.
The TPM-only authentication method will provide the most transparent user experience for organizations that need a baseline level of data protection to meet security policies. It has the lowest total cost of ownership. TPM-only might also be more appropriate for computers that are unattended or that must reboot unattended.
However, TPM-only authentication method offers the lowest level of data protection. This authentication method protects against attacks that modify early boot components. But, the level of protection can be affected by potential weaknesses in hardware or in the early boot components.
If there are user computers with highly sensitive data, then deploy BitLocker with multifactor authentication on those systems. Requiring the user to input a PIN significantly increases the level of protection for the system. You can also use BitLocker Network Unlock to allow these computers to automatically unlock when connected to a trusted wired network that can provide the Network Unlock key.
The protection differences provided by multifactor authentication methods can’t be easily quantified. Consider each authentication method’s impact on Helpdesk support, user education, user productivity, and any automated systems management processes. In your deployment plan, identify what TPM-based hardware platforms will be supported.
Document the hardware models from an OEM of your choice, so that their configurations can be tested and supported. TPM hardware requires special consideration during all aspects of planning and deployment.
For TPM 1. Windows automatically initializes the TPM, which brings it to an enabled, activated, and owned state. Devices that don’t include a TPM can still be protected by drive encryption. Use the following questions to identify issues that might affect your deployment in a non-TPM configuration:. Test your individual hardware platforms with the BitLocker system check option while you’re enabling BitLocker.
The system check makes sure that BitLocker can read the recovery information from a USB device and encryption keys correctly before it encrypts the volume. To function correctly, BitLocker requires a specific disk configuration.
BitLocker requires two partitions that meet the following requirements:. Windows setup will automatically configure the disk drives of your computer to support BitLocker encryption.
When the computer fails to start, Windows automatically transitions into this environment, and the Startup Repair tool in Windows RE automates the diagnosis and repair of an unbootable Windows installation. Windows RE also contains the drivers and tools that are needed to unlock a volume protected by BitLocker by providing a recovery key or recovery password. Windows RE can also be used from boot media other than the local hard disk. If you don’t install Windows RE on the local hard disk of BitLocker-enabled computers, then you can use different boot methods.
In Windows Vista and Windows 7, BitLocker was provisioned after the installation for system and data volumes. It used the manage-bde command line interface or the Control Panel user interface. With newer operating systems, BitLocker can be provisioned before the operating system is installed.
Preprovisioning requires the computer have a TPM. To check the BitLocker status of a particular volume, administrators can look at the drive status in the BitLocker control panel applet or Windows Explorer. The “Waiting For Activation” status with a yellow exclamation icon means that the drive was preprovisioned for BitLocker.
This status means that there was only a clear protector used when encrypting the volume. In this case, the volume isn’t protected, and needs to have a secure key added to the volume before the drive is considered fully protected.
The volume status will be updated. When using the control panel options, administrators can choose to Turn on BitLocker and follow the steps in the wizard to add a protector, such as a PIN for an operating system volume or a password if no TPM exists , or a password or smart card protector to a data volume.
Then the drive security window is presented before changing the volume status. If the drive was prepared as a single contiguous space, BitLocker requires a new volume to hold the boot files. For more info about using this tool, see Bdehdcfg in the Command-Line Reference.
The BitLocker control panel supports encrypting operating system, fixed data, and removable data volumes. The BitLocker control panel will organize available drives in the appropriate category based on how the device reports itself to Windows.
Only formatted volumes with assigned drive letters will appear properly in the BitLocker control panel applet. BitLocker Drive Encryption Wizard options vary based on volume type operating system volume or data volume. When the BitLocker Drive Encryption Wizard launches, it verifies the computer meets the BitLocker system requirements for encrypting an operating system volume.
By default, the system requirements are:. A TPM isn’t required for BitLocker; however, only a computer with a TPM can provide the additional security of pre-startup system integrity verification and multifactor authentication.
The firmware must be able to read from a USB flash drive during startup. For either firmware, the system drive partition must be at least megabytes MB and set as the active partition. Hardware encrypted drive prerequisites optional To use a hardware encrypted drive as the boot drive, the drive must be in the uninitialized state and in the security inactive state.
In addition, the system must always boot with native UEFI version 2. Upon passing the initial configuration, users are required to enter a password for the volume. If the volume doesn’t pass the initial configuration for BitLocker, the user is presented with an error dialog describing the appropriate actions to be taken. Once a strong password has been created for the volume, a recovery key will be generated.
A BitLocker recovery key is a special key that you can create when you turn on BitLocker Drive Encryption for the first time on each drive that you encrypt. You can use the recovery key to gain access to your computer if the drive that Windows is installed on the operating system drive is encrypted using BitLocker Drive Encryption and BitLocker detects a condition that prevents it from unlocking the drive when the computer is starting up. A recovery key can also be used to gain access to your files and folders on a removable data drive such as an external hard drive or USB flash drive that is encrypted using BitLocker To Go, if for some reason you forget the password or your computer can’t access the drive.
You should store the recovery key by printing it, saving it on removable media, or saving it as a file in a network folder or on your OneDrive, or on another drive of your computer that you aren’t encrypting.
You can’t save the recovery key to the root directory of a non-removable drive and can’t be stored on the encrypted volume.
You can’t save the recovery key for a removable data drive such as a USB flash drive on removable media. Ideally, you should store the recovery key separate from your computer. After you create a recovery key, you can use the BitLocker control panel to make additional copies. It’s recommended that drives with little to no data use the used disk space only encryption option and that drives with data or an operating system use the encrypt entire drive option.
Deleted files appear as free space to the file system, which isn’t encrypted by used disk space only. Until they are wiped or overwritten, deleted files hold information that could be recovered with common data forensic tools. Selecting an encryption type and choosing Next will give the user the option of running a BitLocker system check selected by default which will ensure that BitLocker can properly access the recovery and encryption keys before the volume encryption begins.
We recommend running this system check before starting the encryption process. If the system check isn’t run and a problem is encountered when the operating system attempts to start, the user will need to provide the recovery key to start Windows. After completing the system check if selected , the BitLocker Drive Encryption Wizard restarts the computer to begin encryption. Upon reboot, users are required to enter the password chosen to boot into the operating system volume.
Users can check encryption status by checking the system notification area or the BitLocker control panel. Until encryption is completed, the only available options for managing BitLocker involve manipulation of the password protecting the operating system volume, backing up the recovery key, and turning off BitLocker. Encrypting data volumes using the BitLocker control panel interface works in a similar fashion to encryption of the operating system volumes.
Unlike for operating system volumes, data volumes aren’t required to pass any configuration tests for the wizard to proceed. Upon launching the wizard, a choice of authentication methods to unlock the drive appears.
The available options are password and smart card and automatically unlock this drive on this computer. Disabled by default, the latter option will unlock the data volume without user input when the operating system volume is unlocked. After selecting the desired authentication method and choosing Next , the wizard presents options for storage of the recovery key. These options are the same as for operating system volumes. With the recovery key saved, selecting Next in the wizard will show available options for encryption.
These options are the same as for operating system volumes; used disk space only and full drive encryption. If the volume being encrypted is new or empty, it’s recommended that used space only encryption is selected. With an encryption method chosen, a final confirmation screen is displayed before the encryption process begins.
Selecting Start encrypting begins encryption. There’s a new option for storing the BitLocker recovery key using the OneDrive. This option requires that computers aren’t members of a domain and that the user is using a Microsoft Account.
Local accounts don’t give the option to use OneDrive. Using the OneDrive option is the default, recommended recovery key storage method for computers that aren’t joined to a domain. Users can verify whether the recovery key was saved properly by checking their OneDrive for the BitLocker folder which is created automatically during the save process.
The folder will contain two files, a readme. For users storing more than one recovery password on their OneDrive, they can identify the required recovery key by looking at the file name. The recovery key ID is appended to the end of the file name. This option is available on client computers by default.
On servers, you must first install the BitLocker and Desktop-Experience features for this option to be available. After selecting Turn on BitLocker , the wizard works exactly as it does when launched using the BitLocker control panel. The following table shows the compatibility matrix for systems that have been BitLocker-enabled and then presented to a different version of Windows. Table 1: Cross compatibility for Windows 11, Windows 10, Windows 8.
Manage-bde is a command-line utility that can be used for scripting BitLocker operations. Manage-bde offers additional options not displayed in the BitLocker control panel. For a complete list of the options, see Manage-bde. Manage-bde offers a multitude of wider options for configuring BitLocker. So using the command syntax may require care and possibly later customization by the user. For example, using just the manage-bde -on command on a data volume will fully encrypt the volume without any authenticating protectors.
A volume encrypted in this manner still requires user interaction to turn on BitLocker protection, even though the command successfully completed because an authentication method needs to be added to the volume for it to be fully protected. Command-line users need to determine the appropriate syntax for a given situation.
The following section covers general encryption for operating system volumes and data volumes. Listed below are examples of basic valid commands for operating system volumes. However, many environments require more secure protectors such as passwords or PIN and expect to be able to recover information with a recovery key.
A good practice when using manage-bde is to determine the volume status on the target system. Use the following command to determine volume status:. This command returns the volumes on the target, current encryption status, and volume type operating system or data for each volume.
Using this information, users can determine the best encryption method for their environment. To properly enable BitLocker for the operating system volume, you’ll need to use a USB flash drive as a startup key to boot in this example, the drive letter E. You would first create the startup key needed for BitLocker using the —protectors option and save it to the USB drive on E: and then begin the encryption process.
You’ll need to reboot the computer when prompted to complete the encryption process. It’s possible to encrypt the operating system volume without any defined protectors by using manage-bde. Use this command:. This will encrypt the drive using the TPM as the protector. If users are unsure of the protector for a volume, they can use the -protectors option in manage-bde to list this information by executing the following command:. Another example is a user on a non-TPM hardware who wishes to add a password and SID-based protector to the operating system volume.
In this instance, the user adds the protectors first. This is done with the command:. This command requires the user to enter and then confirm the password protectors before adding them to the volume.
With the protectors enabled on the volume, the user just needs to turn BitLocker on. Data volumes use the same syntax for encryption as operating system volumes but they don’t require protectors for the operation to complete.
We recommend that you add at least one primary protector and a recovery protector to a data volume. A common protector for a data volume is the password protector. In the example below, we add a password protector to the volume and turn on BitLocker.
Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Using Windows PowerShell’s scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets. Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they’re encrypting prior to running Windows PowerShell cmdlets.
A good initial step is to determine the current state of the volume s on the computer.
BitLocker How to deploy on Windows Server and later – Windows security | Microsoft Docs – Windows Assessment and Deployment Kit
Managing domain-joined computers and moving to cloud. Companies that image their own computers using Microsoft System Center This article for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.