SlideShare a Scribd company logo
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 1 of 1
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
About Windows®
7 BitLocker®
Microsoft BitLocker Drive Encryption technology uses the strongest publicly
available encryption to protect your computer’s data, and prevents others
from accessing your disk drives without authorization.
Additionally, the BitLocker To Go
®
feature prevents unauthorized data
access on your portable storage devices, including Universal Serial Bus
(USB) flash drives, also known as “thumb drives.”
Topics in this guide include:
Prepare to Enable BitLocker
Back Up and Transfer Files
Turn On BitLocker
Suspend BitLocker Protection
Decrypt Your Drive
Encrypt a Portable Drive with BitLocker To Go
Manage BitLocker To Go
Decrypt a Portable Drive
Customization note: This document contains guidance and/or step-by-step
installation instructions that can be reused, customized, or deleted entirely if
they do not apply to your organization’s environment or installation
scenarios. The text marked in red indicates either customization guidance or
organization-specific variables. All of the red text in this document should
either be deleted or replaced prior to distribution.
Prepare to Enable BitLocker
All new systems that <<organization >>provides are ready for BitLocker
enablement. However, before you enable BitLocker, you need to join your
computer to a corporate domain (if it isn’t already joined) and ensure that
you are connected to the <<organization >>corporate network. For
information on joining your computer to a corporate domain, see the Joining a
Windows 7 System to a Domain Work Smart Guide:
<< Insert Joining a Windows 7 System to a Domain Work Smart Guidefile
location or URL>>
Note
You will not be able to encrypt your drive unless you have a network
connection.
Back Up and Transfer Files
<<Organization>>provides several solutions for backing up your data.
• <<insert preferred methods here>>
• <<insert preferred methods here>>
Turn On BitLocker
After you connect to the corporate network, you can turn on BitLocker.
BitLocker then turns on your computer’s Trusted Platform Module (TPM) chip,
which is a microchip that enables your computer to utilize advanced security
features.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 2 of 2
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
Start BitLocker
Initially, when you start BitLocker, you can create a personal identification
number (PIN) that you can use each time you start your computer, or you can
designate a startup key that you must enter each time that you attempt to
access a USB drive. This additional protection is optional, but is recommended.
If you are going to use DirectAccess as your remote-connectivity software
solution, you must create a PIN.
To start BitLocker and create a PIN or startup key:
1 Click Start , click Control Panel, click System andSecurity, and
then click BitLocker Drive Encryption.
2 Ensure your computer’s TPM is turned on. To do this, look for a
TPMAdministration link in the lower-left corner of the window
under See also.
If you do not see this link, the TPM is not on. For assistance in turning
it on, contact << helpdesk contact or technical support URL>>.
3 Click Turn On BitLocker.
4 On the Set BitLocker startuppreferences page, clickRequire a PIN
at every startup.
Important
<<Organization>>recommends using a PIN or startup key because it
is the most secure option. You must create a PIN if you are going to
use DirectAccess as your remote-connectivity software solution.
5 On the Enter a numeric startup PIN page, in the PIN field, type a
number that is between 5 and 20 digits in length. The longer your
PIN number, the more secure your computer will be.
6 In the Confirm PIN field, retype the number.
7 Click Set PIN.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 3 of 3
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
8 On the How do you want to store your recovery key? page, click
one of the following options:
• Save the recovery key to a file.Microsoft IT recommends this
option,which enables you to save your password to a network
file-share folder, such as My Site.
• Print the recovery key.
9 Click Next.
10 On the Encrypt the drive page, select the Run BitLocker System
check box, and then click Continue.
11 Close and save any files that you have open. (In the next step, you
will restart the computer.)
12 Click Continue.
BitLocker restarts your computer and begins the encryption process.
Notes
• BitLocker will encrypt your hard-disk drive in approximately one to
three hours, depending on its size. You can continue to use
yourcomputer duringthe encryption process.
• After BitLocker is enabled, each time that you attempt to log on to your
computer, you will need to enter your BitLocker PIN before Windows
starts. If you have anyissues accessing your computer, contact
<< helpdesk contact or technical support URL>>.
Suspend BitLocker Protection
You may need to suspend BitLocker. For example, you might need to do a
hardware upgrade or basic input/output system (BIOS) updates. When you
suspend BitLocker, Windows disables protection on your system. You won’t
need to enter your PIN to start your computer, but your data will be
unprotected.
You can perform all updates and system changes by suspending BitLocker
protection. You typically do not need to turn BitLocker off for any reason
other than to decrypt your drive.
To suspend BitLocker:
1 Click Start , click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
2 Click Suspend Protection.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 4 of 4
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
Resume BitLocker Protection
1 Click Start , click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
2 Click Resume Protection.
Decrypt Your Drive
1 Click Start , click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
2 Click Turn Off BitLocker.
BitLocker will decrypt your hard-disk drive in approximately 1–3 hours,
depending on the hard-disk size. You can continue to use your computer
during the encryption process.
Encrypt a Portable Drive with
BitLocker To Go
When you encrypt a portable drive with BitLocker To Go, you can set it to
unlock by using a password or your smart card.
1 Connect to the corporate network.
2 Decide whether you want to use password protection orsmart card
protection..
3 Insert the portable drive (USB drive, SC card, SD/MMC card, etc.) into
the appropriate slot.
4 Click Start, click Control Panel, click System and Security, and then
click BitLocker Drive Encryption.
5 ClickTurn On BitLockernext to the portable storage device that you
want to encrypt.
6 In the Choose how you want to unlock this drive dialog box, select
one of the following options.
• If you want to use a password to unlock the drive, select the
Use a password to unlock the drive check box, enter your
password twice, and then click Next.
• If you want to use a smart card to unlock the drive instead,
select theUse my smart card to unlock the drivecheck box,
insert your smart card, and then click Next.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 5 of 5
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
Important
Create a password with 8–12 characters.It is recommended that you
use an easy-to-remember passphrase and change certain letters to
caps or obvious special characters. Entering a password is a one-time
event. You will not need to change or reset it unless you want to.
7 In the BitLocker Drive Encryption dialog box, do one of the
following:
• To print the recovery key, click Print the recovery key, and
then click Next.
–Or–
a. To save the recovery key to My Site or another file share, click
Save the recovery key to a file.
b. In the Save BitLocker Recovery Key as dialog box, BitLocker
suggests a filename to use. You can edit this filename to
distinguish it from recovery keys that you may acquire for
additional portable devices. For example, you might want to
name it “BitLockerSan Disk 2Gig Recovery Key DDxxxDxx….”
c. Go to My Site or the file-share folder where you want to save
the recovery key.
d. Click Save.
8 Click Start Encrypting.
Encryption time varies but typically takes 3 minutes per GB of data.
An encryption progress dialog box will appear, followed eventually
by a completion notice.
9 Click Close.
10 When the encryption is complete, remove the device. If you chose
smart card encryption, remove your smart card. Wait a few seconds
and then reinsert the device and/or smart card.
11 Do one of the following:
If you chose password protection:
i. Enter your password.
ii. If you want to have the device automatically unlocked
when you use it with your computer, select the
Automatically unlock on this computer from nowon
check box. To use auto-unlock, BitLocker must be
enabled.
iii. Click Unlock.
• If you chose smart card protection, click Unlock, enter your
PIN, and then click OK.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 6 of 6
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
Notes
• BitLocker To Go can encrypt your drive in minutes or hours,
depending on your drive’s size, your connection speed,and the
technology you use, such as External Serial AdvancedTechnology
(eSATA), FireWire, USB, or USB2.0. You can continue touse your
computer during the encryption process.
• Each time you attempt to use the drive, you will need to enter
thepassword or smart card unless you set up BitLocker To Go to
unlockthe drive automatically. If you have any issues accessing your
drive,contact the << helpdesk contact or technical support URL>>.
• If you want to change the password for a portable drive or change
the auto-unlock feature, click Start, click Control Panel, click System
and Security, and then click BitLocker Drive Encryption. In the
BitLocker Drive Encryption dialog box, click Manage BitLocker
next to the portable drive information.
• All recovery keys are stored in Active Directory
®
and can be obtained
<<selfhelp URL, helpdesk contact, technical support URL>>.
Manage BitLocker To Go
After you encrypt a portable drive, you may want to change a password,
remove a password, add a smart card to unlock the drive, save or print a
recovery key again, or turn the automatic unlock feature on or off.
To make any of these changes:
1 Click Start , click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
2 Click Manage BitLocker.
3 Select one of the options in the dialog box.
Decrypt a Portable Drive
1 Click Start , click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
2 Click Turn Off BitLocker.
3 Click Decrypt Drive.
More Work Smart Content: http://microsoft.com/itshowcase
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. © 2012 Microsoft Corporation. All rights reserved.
Page 7 of 7
Work Smart: Protect Data with Windows®
7 BitLocker®
Get Started
For More Information
• BitLocker Drive Encryption
http://windows.microsoft.com/en-
US/windows7/products/features/bitlocker

More Related Content

What's hot

Readme
ReadmeReadme
Booting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBooting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual box
Brent Muir
 
KJ
KJKJ
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
Quek Lilian
 
ArcaVir RescueDrive - User Manual
ArcaVir  RescueDrive - User ManualArcaVir  RescueDrive - User Manual
ArcaVir RescueDrive - User Manual
Ravtach Solutions
 
Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740
Kojo King
 
Hp envy 13 2021 Laptops Trần Phát
Hp envy 13 2021 Laptops Trần PhátHp envy 13 2021 Laptops Trần Phát
Hp envy 13 2021 Laptops Trần Phát
LAPTOP TRẦN PHÁT
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
Andris Soroka
 
Windows xp and windows 7 installaton
Windows xp and windows 7 installatonWindows xp and windows 7 installaton
Windows xp and windows 7 installaton
Siddharth Jain
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Virtual dj 7 getting started
Virtual dj 7   getting startedVirtual dj 7   getting started
Virtual dj 7 getting started
Viviana Villar Lopez
 
32 bit linux-system
32 bit linux-system32 bit linux-system
32 bit linux-system
Teguh Asmoro
 
2009 reborn card plus version
2009 reborn card plus version 2009 reborn card plus version
2009 reborn card plus version
cordobaboxeador
 
Lakeview Squares
Lakeview SquaresLakeview Squares
Lakeview Squares
Sue Long Smith
 
Lakeview Squares
Lakeview SquaresLakeview Squares
Lakeview Squares
Sue Long Smith
 
Lg user manual_eng
Lg user manual_engLg user manual_eng
Lg user manual_eng
Zokitronki
 
Anonguide
AnonguideAnonguide
Anonguide
Arif Wahyudi
 
Dlc boot 2012
Dlc boot 2012Dlc boot 2012
Dlc boot 2012
tjmbjmci
 
run 64 bit on 32 bit
run 64 bit on 32 bitrun 64 bit on 32 bit
run 64 bit on 32 bit
ssuser1eca7d
 

What's hot (19)

Readme
ReadmeReadme
Readme
 
Booting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBooting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual box
 
KJ
KJKJ
KJ
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
ArcaVir RescueDrive - User Manual
ArcaVir  RescueDrive - User ManualArcaVir  RescueDrive - User Manual
ArcaVir RescueDrive - User Manual
 
Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740
 
Hp envy 13 2021 Laptops Trần Phát
Hp envy 13 2021 Laptops Trần PhátHp envy 13 2021 Laptops Trần Phát
Hp envy 13 2021 Laptops Trần Phát
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Windows xp and windows 7 installaton
Windows xp and windows 7 installatonWindows xp and windows 7 installaton
Windows xp and windows 7 installaton
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Virtual dj 7 getting started
Virtual dj 7   getting startedVirtual dj 7   getting started
Virtual dj 7 getting started
 
32 bit linux-system
32 bit linux-system32 bit linux-system
32 bit linux-system
 
2009 reborn card plus version
2009 reborn card plus version 2009 reborn card plus version
2009 reborn card plus version
 
Lakeview Squares
Lakeview SquaresLakeview Squares
Lakeview Squares
 
Lakeview Squares
Lakeview SquaresLakeview Squares
Lakeview Squares
 
Lg user manual_eng
Lg user manual_engLg user manual_eng
Lg user manual_eng
 
Anonguide
AnonguideAnonguide
Anonguide
 
Dlc boot 2012
Dlc boot 2012Dlc boot 2012
Dlc boot 2012
 
run 64 bit on 32 bit
run 64 bit on 32 bitrun 64 bit on 32 bit
run 64 bit on 32 bit
 

Viewers also liked

Chapter 2
Chapter 2Chapter 2
Chapter 2
tBjerke1327
 
Precentación angles
Precentación anglesPrecentación angles
Precentación angles
Kiabeth18
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
tBjerke1327
 
Colegio de bachilleres
Colegio de bachilleresColegio de bachilleres
Colegio de bachilleres
innbecil
 
Reclaiming Agile Development
Reclaiming Agile Development Reclaiming Agile Development
Reclaiming Agile Development
Centric Consulting
 
Precentación angles
Precentación anglesPrecentación angles
Precentación angles
Kiabeth18
 

Viewers also liked (7)

Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Precentación angles
Precentación anglesPrecentación angles
Precentación angles
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Colegio de bachilleres
Colegio de bachilleresColegio de bachilleres
Colegio de bachilleres
 
Reclaiming Agile Development
Reclaiming Agile Development Reclaiming Agile Development
Reclaiming Agile Development
 
Precentación angles
Precentación anglesPrecentación angles
Precentación angles
 
3 g
3 g3 g
3 g
 

Similar to 2569 protect yourdatawithbitlocker_gs_windows7_external

How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
Molly Violet
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptx
gomsllhi
 
Presentación di
Presentación diPresentación di
Presentación di
Irvincp
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
 
Support article1224
Support article1224Support article1224
Support article1224
Breanna.org
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
KernSafe Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
QUICK HEAL TECHNOLOGIES LIMITED
 
Mikrotik
MikrotikMikrotik
Mikrotik
hzcom
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
Idris Ahmed
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
iStorage Server and IP SEC
iStorage Server and IP SECiStorage Server and IP SEC
iStorage Server and IP SEC
KernSafe Technologies
 
Secure traveler user's manual
Secure traveler user's manualSecure traveler user's manual
Secure traveler user's manual
lorena
 
Secure traveler user's manual
Secure traveler user's manualSecure traveler user's manual
Secure traveler user's manual
rokdj
 
Secure Traveler Users Manual
Secure Traveler Users ManualSecure Traveler Users Manual
Secure Traveler Users Manual
lwandemberg
 
Bitlocker configuration
Bitlocker configurationBitlocker configuration
Bitlocker configuration
Chalat Khetprasertkul
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
Taishaun Owens
 
BitlockerToGo
BitlockerToGoBitlockerToGo
BitlockerToGo
Zeshan Sattar
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 

Similar to 2569 protect yourdatawithbitlocker_gs_windows7_external (20)

How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptx
 
Presentación di
Presentación diPresentación di
Presentación di
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Support article1224
Support article1224Support article1224
Support article1224
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
iStorage Server and IP SEC
iStorage Server and IP SECiStorage Server and IP SEC
iStorage Server and IP SEC
 
Secure traveler user's manual
Secure traveler user's manualSecure traveler user's manual
Secure traveler user's manual
 
Secure traveler user's manual
Secure traveler user's manualSecure traveler user's manual
Secure traveler user's manual
 
Secure Traveler Users Manual
Secure Traveler Users ManualSecure Traveler Users Manual
Secure Traveler Users Manual
 
Bitlocker configuration
Bitlocker configurationBitlocker configuration
Bitlocker configuration
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
BitlockerToGo
BitlockerToGoBitlockerToGo
BitlockerToGo
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

2569 protect yourdatawithbitlocker_gs_windows7_external

  • 1. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 1 of 1 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started About Windows® 7 BitLocker® Microsoft BitLocker Drive Encryption technology uses the strongest publicly available encryption to protect your computer’s data, and prevents others from accessing your disk drives without authorization. Additionally, the BitLocker To Go ® feature prevents unauthorized data access on your portable storage devices, including Universal Serial Bus (USB) flash drives, also known as “thumb drives.” Topics in this guide include: Prepare to Enable BitLocker Back Up and Transfer Files Turn On BitLocker Suspend BitLocker Protection Decrypt Your Drive Encrypt a Portable Drive with BitLocker To Go Manage BitLocker To Go Decrypt a Portable Drive Customization note: This document contains guidance and/or step-by-step installation instructions that can be reused, customized, or deleted entirely if they do not apply to your organization’s environment or installation scenarios. The text marked in red indicates either customization guidance or organization-specific variables. All of the red text in this document should either be deleted or replaced prior to distribution. Prepare to Enable BitLocker All new systems that <<organization >>provides are ready for BitLocker enablement. However, before you enable BitLocker, you need to join your computer to a corporate domain (if it isn’t already joined) and ensure that you are connected to the <<organization >>corporate network. For information on joining your computer to a corporate domain, see the Joining a Windows 7 System to a Domain Work Smart Guide: << Insert Joining a Windows 7 System to a Domain Work Smart Guidefile location or URL>> Note You will not be able to encrypt your drive unless you have a network connection. Back Up and Transfer Files <<Organization>>provides several solutions for backing up your data. • <<insert preferred methods here>> • <<insert preferred methods here>> Turn On BitLocker After you connect to the corporate network, you can turn on BitLocker. BitLocker then turns on your computer’s Trusted Platform Module (TPM) chip, which is a microchip that enables your computer to utilize advanced security features.
  • 2. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 2 of 2 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started Start BitLocker Initially, when you start BitLocker, you can create a personal identification number (PIN) that you can use each time you start your computer, or you can designate a startup key that you must enter each time that you attempt to access a USB drive. This additional protection is optional, but is recommended. If you are going to use DirectAccess as your remote-connectivity software solution, you must create a PIN. To start BitLocker and create a PIN or startup key: 1 Click Start , click Control Panel, click System andSecurity, and then click BitLocker Drive Encryption. 2 Ensure your computer’s TPM is turned on. To do this, look for a TPMAdministration link in the lower-left corner of the window under See also. If you do not see this link, the TPM is not on. For assistance in turning it on, contact << helpdesk contact or technical support URL>>. 3 Click Turn On BitLocker. 4 On the Set BitLocker startuppreferences page, clickRequire a PIN at every startup. Important <<Organization>>recommends using a PIN or startup key because it is the most secure option. You must create a PIN if you are going to use DirectAccess as your remote-connectivity software solution. 5 On the Enter a numeric startup PIN page, in the PIN field, type a number that is between 5 and 20 digits in length. The longer your PIN number, the more secure your computer will be. 6 In the Confirm PIN field, retype the number. 7 Click Set PIN.
  • 3. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 3 of 3 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started 8 On the How do you want to store your recovery key? page, click one of the following options: • Save the recovery key to a file.Microsoft IT recommends this option,which enables you to save your password to a network file-share folder, such as My Site. • Print the recovery key. 9 Click Next. 10 On the Encrypt the drive page, select the Run BitLocker System check box, and then click Continue. 11 Close and save any files that you have open. (In the next step, you will restart the computer.) 12 Click Continue. BitLocker restarts your computer and begins the encryption process. Notes • BitLocker will encrypt your hard-disk drive in approximately one to three hours, depending on its size. You can continue to use yourcomputer duringthe encryption process. • After BitLocker is enabled, each time that you attempt to log on to your computer, you will need to enter your BitLocker PIN before Windows starts. If you have anyissues accessing your computer, contact << helpdesk contact or technical support URL>>. Suspend BitLocker Protection You may need to suspend BitLocker. For example, you might need to do a hardware upgrade or basic input/output system (BIOS) updates. When you suspend BitLocker, Windows disables protection on your system. You won’t need to enter your PIN to start your computer, but your data will be unprotected. You can perform all updates and system changes by suspending BitLocker protection. You typically do not need to turn BitLocker off for any reason other than to decrypt your drive. To suspend BitLocker: 1 Click Start , click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2 Click Suspend Protection.
  • 4. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 4 of 4 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started Resume BitLocker Protection 1 Click Start , click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2 Click Resume Protection. Decrypt Your Drive 1 Click Start , click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2 Click Turn Off BitLocker. BitLocker will decrypt your hard-disk drive in approximately 1–3 hours, depending on the hard-disk size. You can continue to use your computer during the encryption process. Encrypt a Portable Drive with BitLocker To Go When you encrypt a portable drive with BitLocker To Go, you can set it to unlock by using a password or your smart card. 1 Connect to the corporate network. 2 Decide whether you want to use password protection orsmart card protection.. 3 Insert the portable drive (USB drive, SC card, SD/MMC card, etc.) into the appropriate slot. 4 Click Start, click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 5 ClickTurn On BitLockernext to the portable storage device that you want to encrypt. 6 In the Choose how you want to unlock this drive dialog box, select one of the following options. • If you want to use a password to unlock the drive, select the Use a password to unlock the drive check box, enter your password twice, and then click Next. • If you want to use a smart card to unlock the drive instead, select theUse my smart card to unlock the drivecheck box, insert your smart card, and then click Next.
  • 5. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 5 of 5 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started Important Create a password with 8–12 characters.It is recommended that you use an easy-to-remember passphrase and change certain letters to caps or obvious special characters. Entering a password is a one-time event. You will not need to change or reset it unless you want to. 7 In the BitLocker Drive Encryption dialog box, do one of the following: • To print the recovery key, click Print the recovery key, and then click Next. –Or– a. To save the recovery key to My Site or another file share, click Save the recovery key to a file. b. In the Save BitLocker Recovery Key as dialog box, BitLocker suggests a filename to use. You can edit this filename to distinguish it from recovery keys that you may acquire for additional portable devices. For example, you might want to name it “BitLockerSan Disk 2Gig Recovery Key DDxxxDxx….” c. Go to My Site or the file-share folder where you want to save the recovery key. d. Click Save. 8 Click Start Encrypting. Encryption time varies but typically takes 3 minutes per GB of data. An encryption progress dialog box will appear, followed eventually by a completion notice. 9 Click Close. 10 When the encryption is complete, remove the device. If you chose smart card encryption, remove your smart card. Wait a few seconds and then reinsert the device and/or smart card. 11 Do one of the following: If you chose password protection: i. Enter your password. ii. If you want to have the device automatically unlocked when you use it with your computer, select the Automatically unlock on this computer from nowon check box. To use auto-unlock, BitLocker must be enabled. iii. Click Unlock. • If you chose smart card protection, click Unlock, enter your PIN, and then click OK.
  • 6. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 6 of 6 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started Notes • BitLocker To Go can encrypt your drive in minutes or hours, depending on your drive’s size, your connection speed,and the technology you use, such as External Serial AdvancedTechnology (eSATA), FireWire, USB, or USB2.0. You can continue touse your computer during the encryption process. • Each time you attempt to use the drive, you will need to enter thepassword or smart card unless you set up BitLocker To Go to unlockthe drive automatically. If you have any issues accessing your drive,contact the << helpdesk contact or technical support URL>>. • If you want to change the password for a portable drive or change the auto-unlock feature, click Start, click Control Panel, click System and Security, and then click BitLocker Drive Encryption. In the BitLocker Drive Encryption dialog box, click Manage BitLocker next to the portable drive information. • All recovery keys are stored in Active Directory ® and can be obtained <<selfhelp URL, helpdesk contact, technical support URL>>. Manage BitLocker To Go After you encrypt a portable drive, you may want to change a password, remove a password, add a smart card to unlock the drive, save or print a recovery key again, or turn the automatic unlock feature on or off. To make any of these changes: 1 Click Start , click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2 Click Manage BitLocker. 3 Select one of the options in the dialog box. Decrypt a Portable Drive 1 Click Start , click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2 Click Turn Off BitLocker. 3 Click Decrypt Drive.
  • 7. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 7 of 7 Work Smart: Protect Data with Windows® 7 BitLocker® Get Started For More Information • BitLocker Drive Encryption http://windows.microsoft.com/en- US/windows7/products/features/bitlocker