IT tutorials
 
Technology
 

Windows 8 : Managing BitLocker Drive Encryption (part 2) - Enabling BitLocker on USB Flash Drives

10/8/2013 7:19:32 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Enabling BitLocker on USB Flash Drives

Encrypting USB flash drives protects the data stored on the volume. Any USB flash drive formatted with FAT, FAT32, exFAT or NTFS can be encrypted with BitLocker. The length of time it takes to encrypt a drive depends on the size of the drive, the processing power of the computer, and the level of activity on the computer.

Before you enable BitLocker, you should configure the appropriate Removable Data Drives policies and settings in Group Policy and then wait for Group Policy to be refreshed. If you don’t do this and you enable BitLocker, you might need to turn BitLocker off and then turn BitLocker back on because certain state and management flags are set when you turn on BitLocker.

To be sure that you can recover an encrypted volume, you should allow data-recovery agents and store recovery information in Active Directory. If you use a flash drive with earlier versions of Windows, the Allow Access To BitLocker-Protected Removable Data Drives From Earlier Versions Of Windows policy can ensure that you have access to the USB flash drive on other operating systems and computers. Unlocked drives are read-only.

To enable BitLocker encryption on a USB flash drive, follow these steps:

  1. Insert the USB flash drive. In File Explorer, press and hold or right-click the USB flash drive, and then tap or click Turn On BitLocker. BitLocker then verifies that your computer meets its requirements and then initializes the drive.

  2. On the Choose How You Want To Unlock This Drive page, choose one or more for the following options, and then tap or click Next:

    • Use A Password To Unlock This Drive Select this option if you want the user to be prompted for a password to unlock the drive. Passwords allow a drive to be unlocked in any location and to be shared with other people.

    • Use My Smart Card To Unlock The Drive Select this option if you want the user to use a smart card and enter the smart card PIN to unlock the drive. Because this feature requires a smart card reader, it is normally used to unlock a drive in the workplace and not for drives that might be used outside the workplace.

  3. On the How Do You Want To Back Up Your Recovery Key? page, tap or click Save The Recovery Key To A File.

  4. In the Save BitLocker Recovery Key As dialog box, choose a save location, and then tap or click Save.

  5. You can now print the recovery key if you want to. When you have finished, tap or click Next.

  6. If allowed in Group Policy, you can elect to encrypt used disk space only or the entire drive and then tap or click Next. Encrypting the used disk space only is faster than encrypting an entire volume. It is also the recommended option for newer computers and drives (except in high-security environments).

  7. On the Are You Ready To Encrypt This Drive? page, tap or click Start Encrypting. Be sure to pause encryption before removing the drive and then resume to complete the encryption. Do not otherwise remove the USB flash drive until the encryption process is complete. How long the encryption process takes depends on the amount of data to encrypt and other factors.

The encryption process does the following:

  1. It adds an Autorun.inf file, the BitLocker To Go reader, and a Read Me.txt file to the USB flash drive.

  2. It creates a virtual volume with the encrypted contents of the drive.

  3. It encrypts the virtual volume to protect it. USB flash drive encryption takes approximately 6 to 10 minutes per gigabyte to complete. The encryption process can be paused and resumed, provided that you don’t remove the drive.

When you insert an encrypted drive into a USB slot on a computer running Windows 8, Windows 8 displays a notification on the secure desktop, as shown in Figure 2. If the notification disappears before you can tap or click it, simply remove and then reinsert the encrypted drive.

Tap or click the notification to display the BitLocker dialog box shown in Figure 3. This dialog box also is displayed on the secure desktop.

Tap or click the notification.

Figure 2. Tap or click the notification.

When you are prompted, enter the password. Optionally, tap or click More Options to expand the dialog box so that you select Automatically Unlock On This Computer to save the password in an encrypted file on the computer’s system volume. Finally, tap or click Unlock to unlock the drive so that you can use it.

Unlock the encrypted drive.

Figure 3. Unlock the encrypted drive.

If you forget or lose the password for the drive but have the recovery key, tap or click More Options and then tap or click Enter Recovery Key. Enter the 48-digit recovery key and then tap or click Unlock. This key is stored in the XML-formatted recovery key file as plain text.

 
Others
 
- Windows 8 : Managing BitLocker Drive Encryption (part 1) - Enabling BitLocker on Nonsystem Volumes
- Windows Server 2012 : Continuous availability (part 8) - Easy conversion between installation options
- Windows Server 2012 : Continuous availability (part 8) - Windows NIC Teaming
- Windows Server 2012 : Continuous availability (part 7) - SMB Transparent Failover, Storage migration
- Windows Server 2012 : Continuous availability (part 6) - Failover Clustering enhancements - Guest clustering, Configuring Fibre Channel from the guest
- Windows Server 2012 : Continuous availability (part 5) - Failover Clustering enhancements - Node drain, Cluster-Aware Updating
- Windows Server 2012 : Continuous availability (part 4) - Failover Clustering enhancements - Virtual machine monitoring
- Windows Server 2012 : Continuous availability (part 3) - Failover Clustering enhancements - VM priority
- Windows Server 2012 : Continuous availability (part 2) - Failover Clustering enhancements - Simplified cluster management, Active Directory integration
- Windows Server 2012 : Continuous availability (part 1) - Failover Clustering enhancements - CSV2 and scale-out file servers
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us