IT tutorials
 
Technology
 

Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 13) - Managing and troubleshooting BitLocker

11/14/2013 2:59:16 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

6.7 Managing and troubleshooting BitLocker

You can determine whether a system volume, data volume, or inserted removable drive uses BitLocker by tapping or clicking System And Security in Control Panel and then double-tapping or double-clicking BitLocker Drive Encryption. You’ll see the status of BitLocker on each volume, as shown in Figure 21.

The BitLocker Drive Encryption service must be started for BitLocker to work properly. Normally, this service is configured for manual startup and runs under the LocalSystem account.

To use smart cards with BitLocker, the Smart Card service must be started. Normally, this service is configured for manual startup and runs under the LocalService account.

After you create a startup key or PIN and a recovery key for a computer, you can create duplicates of the startup key, startup PIN, or recovery key as necessary for backup or replacement purposes using the options on the BitLocker Drive Encryption page in Control Panel.

With fixed-data and operating-system drives, another way to access this page is to press and hold or right-click the volume in File Explorer and then tap or click Manage BitLocker. If BitLocker is turned off, the Turn On BitLocker option is displayed instead.

Review the current status of BitLocker for each volume.
Figure 21. Review the current status of BitLocker for each volume.

The management options provided depend on the type of volume you are working with and the encryption settings you choose. The available options include the following:

  • Back Up Recovery Key Allows you to save or print the recovery key. Tap or click this option, and then follow the prompts.

  • Change Password Allows you to change the encryption password. Tap or click this option, enter the old password, and then type and confirm the new password. Tap or click Change Password.

  • Remove Password Tap or click this option to remove the encryption password requirement for unlocking the drive. You can do this only if another unlocking method is configured first.

  • Add Smart Card Allows you to add a smart card for unlocking the drive. Tap or click this option, and then follow the prompts.

  • Remove Smart Card Tap or click this option to remove the smart card requirement for unlocking the drive.

  • Change Smart Card Allows you to change the smart card used to unlock the drive. Tap or click this option, and then follow the prompts.

  • Turn On Auto-Unlock Tap or click this option to turn on automatic unlocking of the drive.

  • Turn Off Auto-Unlock Tap or click this option to turn off automatic unlocking of the drive.

  • Turn Off BitLocker Tap or click this option to turn off BitLocker and decrypt the drive.

 Managing BitLocker in large enterprises

Large enterprises might want to use Microsoft BitLocker Administration and Monitoring (MBAM) to simplify BitLocker provisioning and deployment, as well as to improve compliance and reporting on BitLocker. MBAM is included in the Microsoft Desktop Optimization Pack (MDOP), and version 2.0 is recommended for Windows 8 and Windows Server 2012 deployments. MBAM has client components and a multitiered server architecture. The MBAM client must be installed on clients throughout the enterprise. The server architecture uses web portals, web services, SQL databases, and SQL Server Reporting Services.

MBAM 2.0 supports a standalone deployment model and a System Center–integrated model. The key difference between the models is how compliance data and reports are collected and stored. The System Center–integrated model moves compliance data and reporting to System Center Configuration Manager, rather than a standalone website.

Once deployed, the administration and monitoring server hosts the HelpDesk Portal and the Self Service Portal. Administrators can use the HelpDesk Portal to view reports, audit activities, and access recovery data. End users can log on to the self-service portal to look up their own recovery keys without requiring help desk support.

6.8 Recovering data protected by BitLocker Drive Encryption

If you configure BitLocker Drive Encryption and the computer enters Recovery mode, you need to unlock the computer. To unlock the computer using a recovery key stored on a USB flash drive, follow these steps:

  1. Turn on the computer. If the computer is locked, the computer opens the BitLocker Drive Encryption Recovery console.

  2. When you are prompted, insert the USB flash drive that contains the recovery key, and then press Enter.

  3. The computer will unlock and reboot automatically. You do not need to enter the recovery key manually.

If you saved the recovery key file in a folder on another computer or on removable media, you can use another computer to open and validate the recovery key file. To locate the correct file, find Password ID on the recovery console displayed on the locked computer and write down this number. The file containing the recovery key uses this Password ID as the file name. Open the file and locate the recovery key.

To unlock the computer by typing the recovery key, follow these steps:

  1. Turn on the computer. If the computer is locked, the computer opens the BitLocker Drive Encryption Recovery console.

  2. Type the recovery key, and then press Enter. The computer will unlock and reboot automatically.

A computer can become locked if a user tries to enter the recovery key but is repeatedly unsuccessful. In the recovery console, you can press Esc twice to exit the recovery prompt and turn off the computer. A computer might also become locked if an error related to TPM occurs or boot data is modified. In this case, the computer halts very early in the boot process, before the operating system starts. At this point, the locked computer might not be able to accept standard keyboard numbers. If that is the case, you must use the function keys to enter the recovery password. Here, the function keys F1–F9 represent the digits 1 through 9, and the F10 function key represents 0.

6.9 Disabling or turning off BitLocker Drive Encryption

When you need to make changes to TPM or make other changes to the system, you might first need to temporarily turn off BitLocker encryption on the system volume. You cannot temporarily turn off BitLocker encryption on data volumes; you can only decrypt data volumes.

To temporarily turn off BitLocker encryption on the system volume, follow these steps:

  1. In Control Panel, tap or click System And Security, and then double-tap or double-click BitLocker Drive Encryption.

  2. For the system volume, tap or click Turn Off BitLocker Drive Encryption.

  3. In the What Level Of Decryption Do You Want? dialog box, tap or click Disable BitLocker Drive Encryption.

    By completing this procedure, you temporarily disable BitLocker on the operating-system volume.

To turn off BitLocker Drive Encryption and decrypt a data volume, follow these steps:

  1. In Control Panel, tap or click System And Security, and then double-tap or double-click BitLocker Drive Encryption.

  2. For the appropriate volume, tap or click Turn Off BitLocker Drive Encryption.

  3. In the What Level Of Decryption Do You Want? dialog box, tap or click Decrypt The Volume.

To turn off BitLocker Drive Encryption and decrypt a USB flash drive, follow these steps:

  1. In Control Panel, tap or click System And Security, and then double-tap or double-click BitLocker Drive Encryption.

  2. For the appropriate volume, tap or click Turn Off BitLocker Drive Encryption.

  3. In the What Level Of Decryption Do You Want? dialog box, tap or click Decrypt The Volume.

 
Others
 
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 12) - Enabling BitLocker on operating-system volumes
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 11) - Enabling BitLocker on removable data drives
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 10) - Enabling BitLocker on fixed data drives
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 9) - Configuring and enabling BitLocker Drive Encryption
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 8) - Deploying BitLocker Drive Encryption
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 7) - Using Network Unlock
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 6) - Setting permitted encryption types
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 5) - Hardware encrypted drives, Optimizing encryption
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 4) - Introducing BitLocker Drive Encryption
- Managing Windows Server 2012 Storage and File Systems : TPM and BitLocker Drive Encryption (part 3) - Clearing the TPM, Changing the TPM owner password
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us