SlideShare a Scribd company logo
Step One: Enable the Startup PIN in Group Policy
Editor
Once you’ve enabled BitLocker, you’ll need to go out of your way to enable a PIN with it.
This requires a Group Policy settings change. To open the Group Policy Editor, press
Windows+R, type “gpedit.msc” into the Run dialog, and press Enter.
Head to Computer Configuration > Administrative Templates > Windows Components >
BitLocker Drive Encryption > Operating System Drives in the Group Policy window.
Double-click the “Require Additional Authentication at Startup” Option in the right pane.
Select “Enabled” at the top of the window here. Then, click the box under “Configure
TPM Startup PIN” and select the “Require Startup PIN With TPM” option. Click “OK” to save
your changes.
Step 2: Configure Active Directory to store Bitlocker recovery
information
You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-
protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services
(AD DS). Recovery information includes the recovery password for each BitLocker-protected
drive, the TPM owner password, and the information required to identify which computers and
drives the recovery information applies to.
GPO Settings:
1. Open "Group Policy Management".
2. Navigate the the GPO that's linked to the OU that you want to contain your settings for
Bitlocker.
3. Right click on the GPO and select "Edit"
4. Navigate to Computer Configuration->Policies->Administrative Templates->Windows
Components->Bitlocker Drive Encryption.
5. Double Click on "Store Bitlocker Recovery information in Active Directory Domain Services"
and configure it as follows:
6. Click "OK".
7. Under Computer Configuration->Policies->Administrative Templates->Windows
Components->Bitlocker Drive Encryption, click on the appropriate folder for your
configuration. In this example, I'm configuring bitlocker to encrypt the OS drive.
8. Double click on "Require additional authentication at startup" and configure your settings as
follows:
NOTE: "Allow Bitlocker without a compatible TPM" need only be checked if at least one of the
computers that you're encrypting do not have a trusted platform module.
9. Click "OK".
10. Double click on "Choose how Bitlocker-protected operating system drives can be
recovered" and configure it as follows:
11. Click "OK".
12. Navigate to Computer Configuration->Policies->Administrative Templates->System-
>Trusted Platform Module and set "Turn on TPM backup to Active Directory Domain Services"
to "Enabled".
13. Click "OK".
NOTE: Only machines that have downloaded the updated group policies and were encrypted
after the group policy has been applied to the machine will have their recovery information
stored in Active Directory. To ensure that the newly configured group policy settings are
applied, please reboot the machine prior to encrypting and/or run "gpudate /force" from a
command line on that machine. If a machine has already been encrypted, you can force it to
store its information in Active directory by opening up powershell and typing manage-bde -
protectors -get c: to get its bitlocker information and then typing manage-bde -protectors -
adbackup c: -id '{<numerical password ID>}'

More Related Content

What's hot

Diktat Praktikum Manajemen Jaringan
Diktat Praktikum Manajemen JaringanDiktat Praktikum Manajemen Jaringan
Diktat Praktikum Manajemen Jaringan
I Putu Hariyadi
 
Unity 3d Basics
Unity 3d BasicsUnity 3d Basics
Unity 3d Basics
Chaudhry Talha Waseem
 
7- How to Configure Disk Quota
7- How to Configure Disk Quota7- How to Configure Disk Quota
7- How to Configure Disk Quota
Fahad Al-Balushi
 
Intro to Massively Multiplayer Online Game (MMOG) Design
Intro to Massively Multiplayer Online Game (MMOG) DesignIntro to Massively Multiplayer Online Game (MMOG) Design
Intro to Massively Multiplayer Online Game (MMOG) Design
Christopher Mohritz
 
Building SPFx Solutions using Docker
Building SPFx Solutions using DockerBuilding SPFx Solutions using Docker
Building SPFx Solutions using Docker
Jenkins NS
 
11 Awesome Quotes About Game Design
11 Awesome Quotes About Game Design11 Awesome Quotes About Game Design
11 Awesome Quotes About Game Design
Idea to Appster
 
Unity Game Engine - Basics
Unity Game Engine - BasicsUnity Game Engine - Basics
Unity Game Engine - Basics
FirosK2
 
Game optimization techniques - Most Commons
Game optimization techniques - Most CommonsGame optimization techniques - Most Commons
Game optimization techniques - Most Commons
niraj vishwakarma
 
Asterisk 11to16, What could go wrong
Asterisk 11to16, What could go wrongAsterisk 11to16, What could go wrong
Asterisk 11to16, What could go wrong
Jöran Vinzens
 
Game Development Company, Flash Game Development,
Game Development Company, Flash Game Development,Game Development Company, Flash Game Development,
Game Development Company, Flash Game Development,
Gateway Technolabs
 
Automated Out-of-Band management with Ansible and Redfish
Automated Out-of-Band management with Ansible and RedfishAutomated Out-of-Band management with Ansible and Redfish
Automated Out-of-Band management with Ansible and Redfish
Jose De La Rosa
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
Hypervisors Vs Bare Metal Servers: a Beginner’s Guide
Hypervisors Vs Bare Metal Servers: a Beginner’s GuideHypervisors Vs Bare Metal Servers: a Beginner’s Guide
Hypervisors Vs Bare Metal Servers: a Beginner’s Guide
GlobalTeleHost Corp.
 
Windows Server 2019 - NetConf Co
Windows Server 2019 - NetConf CoWindows Server 2019 - NetConf Co
Windows Server 2019 - NetConf Co
Diana Carolina Torres Viasus
 
INTRODUCTION TO IIS
INTRODUCTION TO IISINTRODUCTION TO IIS
INTRODUCTION TO IIS
sanya6900
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
Citrix
 
File server resource manager
File server resource managerFile server resource manager
File server resource manager
laonap166
 
Introduction to Unity3D and Building your First Game
Introduction to Unity3D and Building your First GameIntroduction to Unity3D and Building your First Game
Introduction to Unity3D and Building your First Game
Sarah Sexton
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
Jared Roberts
 
Cài đặt NAS Synology
Cài đặt NAS SynologyCài đặt NAS Synology
Cài đặt NAS Synology
Trung Phan
 

What's hot (20)

Diktat Praktikum Manajemen Jaringan
Diktat Praktikum Manajemen JaringanDiktat Praktikum Manajemen Jaringan
Diktat Praktikum Manajemen Jaringan
 
Unity 3d Basics
Unity 3d BasicsUnity 3d Basics
Unity 3d Basics
 
7- How to Configure Disk Quota
7- How to Configure Disk Quota7- How to Configure Disk Quota
7- How to Configure Disk Quota
 
Intro to Massively Multiplayer Online Game (MMOG) Design
Intro to Massively Multiplayer Online Game (MMOG) DesignIntro to Massively Multiplayer Online Game (MMOG) Design
Intro to Massively Multiplayer Online Game (MMOG) Design
 
Building SPFx Solutions using Docker
Building SPFx Solutions using DockerBuilding SPFx Solutions using Docker
Building SPFx Solutions using Docker
 
11 Awesome Quotes About Game Design
11 Awesome Quotes About Game Design11 Awesome Quotes About Game Design
11 Awesome Quotes About Game Design
 
Unity Game Engine - Basics
Unity Game Engine - BasicsUnity Game Engine - Basics
Unity Game Engine - Basics
 
Game optimization techniques - Most Commons
Game optimization techniques - Most CommonsGame optimization techniques - Most Commons
Game optimization techniques - Most Commons
 
Asterisk 11to16, What could go wrong
Asterisk 11to16, What could go wrongAsterisk 11to16, What could go wrong
Asterisk 11to16, What could go wrong
 
Game Development Company, Flash Game Development,
Game Development Company, Flash Game Development,Game Development Company, Flash Game Development,
Game Development Company, Flash Game Development,
 
Automated Out-of-Band management with Ansible and Redfish
Automated Out-of-Band management with Ansible and RedfishAutomated Out-of-Band management with Ansible and Redfish
Automated Out-of-Band management with Ansible and Redfish
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Hypervisors Vs Bare Metal Servers: a Beginner’s Guide
Hypervisors Vs Bare Metal Servers: a Beginner’s GuideHypervisors Vs Bare Metal Servers: a Beginner’s Guide
Hypervisors Vs Bare Metal Servers: a Beginner’s Guide
 
Windows Server 2019 - NetConf Co
Windows Server 2019 - NetConf CoWindows Server 2019 - NetConf Co
Windows Server 2019 - NetConf Co
 
INTRODUCTION TO IIS
INTRODUCTION TO IISINTRODUCTION TO IIS
INTRODUCTION TO IIS
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 
File server resource manager
File server resource managerFile server resource manager
File server resource manager
 
Introduction to Unity3D and Building your First Game
Introduction to Unity3D and Building your First GameIntroduction to Unity3D and Building your First Game
Introduction to Unity3D and Building your First Game
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
Cài đặt NAS Synology
Cài đặt NAS SynologyCài đặt NAS Synology
Cài đặt NAS Synology
 

Similar to Bitlocker configuration

Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
Olav Tvedt
 
03 bit locker-mod03
03   bit locker-mod0303   bit locker-mod03
03 bit locker-mod03
António Barroso
 
Fcm rapid-install-11122-1634210
Fcm rapid-install-11122-1634210Fcm rapid-install-11122-1634210
Fcm rapid-install-11122-1634210
raman pattanaik
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
Revolucion
 
SysInfoTools RAID Recovery Software
SysInfoTools RAID Recovery SoftwareSysInfoTools RAID Recovery Software
SysInfoTools RAID Recovery Software
SysInfoTools
 
2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external
Expert Outsource Pvt Ltd
 
Installation CentOS 6.3
Installation CentOS 6.3Installation CentOS 6.3
Installation CentOS 6.3
VCP Muthukrishna
 
Toyotaotcvimgtssoftwareoverview 160525025652
Toyotaotcvimgtssoftwareoverview 160525025652Toyotaotcvimgtssoftwareoverview 160525025652
Toyotaotcvimgtssoftwareoverview 160525025652
Chatchai Nuanhing
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comWindows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Michael Gough
 
Configuration manager
Configuration managerConfiguration manager
Configuration manager
Raghu nath
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Michael Gough
 
SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
Robert Jones
 
SysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc RecoverySysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc Recovery
SysInfoTools Software
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
Anshul Jain
 
Data link mamut_magento
Data link mamut_magentoData link mamut_magento
Data link mamut_magento
Holbi Group, DataLink Department
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
anilinvns
 
2. install os
2. install os2. install os
2. install os
kris harden
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active Directory
Kalai Mani
 
Cctk support for setting hdd password
Cctk support for setting hdd passwordCctk support for setting hdd password
Cctk support for setting hdd password
artisriva
 
How to install share point 2010
How to install share point 2010How to install share point 2010
How to install share point 2010
moorthiameks
 

Similar to Bitlocker configuration (20)

Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
03 bit locker-mod03
03   bit locker-mod0303   bit locker-mod03
03 bit locker-mod03
 
Fcm rapid-install-11122-1634210
Fcm rapid-install-11122-1634210Fcm rapid-install-11122-1634210
Fcm rapid-install-11122-1634210
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
 
SysInfoTools RAID Recovery Software
SysInfoTools RAID Recovery SoftwareSysInfoTools RAID Recovery Software
SysInfoTools RAID Recovery Software
 
2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external
 
Installation CentOS 6.3
Installation CentOS 6.3Installation CentOS 6.3
Installation CentOS 6.3
 
Toyotaotcvimgtssoftwareoverview 160525025652
Toyotaotcvimgtssoftwareoverview 160525025652Toyotaotcvimgtssoftwareoverview 160525025652
Toyotaotcvimgtssoftwareoverview 160525025652
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comWindows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
 
Configuration manager
Configuration managerConfiguration manager
Configuration manager
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
 
SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
 
SysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc RecoverySysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc Recovery
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
 
Data link mamut_magento
Data link mamut_magentoData link mamut_magento
Data link mamut_magento
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
2. install os
2. install os2. install os
2. install os
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active Directory
 
Cctk support for setting hdd password
Cctk support for setting hdd passwordCctk support for setting hdd password
Cctk support for setting hdd password
 
How to install share point 2010
How to install share point 2010How to install share point 2010
How to install share point 2010
 

Recently uploaded

A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
kalichargn70th171
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
anfaltahir1010
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 

Recently uploaded (20)

A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
A Comprehensive Guide on Implementing Real-World Mobile Testing Strategies fo...
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 

Bitlocker configuration

  • 1. Step One: Enable the Startup PIN in Group Policy Editor Once you’ve enabled BitLocker, you’ll need to go out of your way to enable a PIN with it. This requires a Group Policy settings change. To open the Group Policy Editor, press Windows+R, type “gpedit.msc” into the Run dialog, and press Enter. Head to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives in the Group Policy window. Double-click the “Require Additional Authentication at Startup” Option in the right pane. Select “Enabled” at the top of the window here. Then, click the box under “Configure TPM Startup PIN” and select the “Require Startup PIN With TPM” option. Click “OK” to save your changes.
  • 2.
  • 3. Step 2: Configure Active Directory to store Bitlocker recovery information You can configure BitLocker Drive Encryption to back up recovery information for BitLocker- protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS). Recovery information includes the recovery password for each BitLocker-protected drive, the TPM owner password, and the information required to identify which computers and drives the recovery information applies to. GPO Settings: 1. Open "Group Policy Management". 2. Navigate the the GPO that's linked to the OU that you want to contain your settings for Bitlocker. 3. Right click on the GPO and select "Edit" 4. Navigate to Computer Configuration->Policies->Administrative Templates->Windows Components->Bitlocker Drive Encryption.
  • 4. 5. Double Click on "Store Bitlocker Recovery information in Active Directory Domain Services" and configure it as follows: 6. Click "OK". 7. Under Computer Configuration->Policies->Administrative Templates->Windows Components->Bitlocker Drive Encryption, click on the appropriate folder for your configuration. In this example, I'm configuring bitlocker to encrypt the OS drive.
  • 5. 8. Double click on "Require additional authentication at startup" and configure your settings as follows: NOTE: "Allow Bitlocker without a compatible TPM" need only be checked if at least one of the computers that you're encrypting do not have a trusted platform module. 9. Click "OK".
  • 6. 10. Double click on "Choose how Bitlocker-protected operating system drives can be recovered" and configure it as follows: 11. Click "OK". 12. Navigate to Computer Configuration->Policies->Administrative Templates->System- >Trusted Platform Module and set "Turn on TPM backup to Active Directory Domain Services" to "Enabled". 13. Click "OK". NOTE: Only machines that have downloaded the updated group policies and were encrypted after the group policy has been applied to the machine will have their recovery information stored in Active Directory. To ensure that the newly configured group policy settings are applied, please reboot the machine prior to encrypting and/or run "gpudate /force" from a command line on that machine. If a machine has already been encrypted, you can force it to store its information in Active directory by opening up powershell and typing manage-bde - protectors -get c: to get its bitlocker information and then typing manage-bde -protectors - adbackup c: -id '{<numerical password ID>}'