![]() ![]() However, this implementation requires the user to insert a USB startup key to start the computer or resume from hibernation. On computers that don't have a TPM version 1.2 or higher, BitLocker can still be used to encrypt the Windows operating system volume. They also make sure that the computer won't start or resume from hibernation until the correct PIN or startup key is presented. These extra security measures provide multifactor authentication. And, help make sure a computer hasn't been tampered with while the system was offline.Īlso, BitLocker can lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable USB device that contains a startup key. It works with BitLocker to help protect user data. The trusted platform module (TPM) is a hardware component installed in many newer computers by the computer manufacturers. Encrypting the entire Windows operating system volume on the hard disk. ![]() What policies exist to control computer decommissioning or retirement?īitLocker helps prevent unauthorized access to data on lost or stolen computers by: What policies exist to control who in the organization has access to recovery data? What are the policies for validating the identity of users who need to perform BitLocker recovery? What policies exist to control recovery password and recovery key storage? To help document the organization's current disk encryption security policies, answer the following questions:Īre there policies to determine which computers will use BitLocker and which computers won't use BitLocker? If disk encryption software is being used, then the organization's policies might need to be changed to use the BitLocker features. If the organization isn't using disk encryption software, then none of these policies will exist. Review the existing disk encryption software corporate security policies. Perform an informal audit to define the current policies, procedures, and hardware environment. To plan a BitLocker deployment, understand the current environment. Use this information to help with the decision-making process about deploying and managing BitLocker systems. The following sections will help with collecting information. When BitLocker deployment strategy is defined, define the appropriate policies and configuration requirements based on the business requirements of the organization. This article for the IT professional explains how to plan BitLocker deployment. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |