BitLocker is a built-in encryption feature of Microsoft Windows operating systems. Here are three steps you can deploy BitLocker:
- Enable by User
- GPO Deployment
- 3rd Party Application or Intune/MECM
Enable By User
User can enable the bitlocker by user following below steps
- Click on the "Start" button and select "Settings" (the gear icon).
- Click on "Update & Security".
- Click on "Device encryption" or "BitLocker".
- If your device doesn't support device encryption, you will see a message indicating that BitLocker isn't available for your device. Otherwise, you will see the BitLocker settings page.
- Click on "Turn on BitLocker".
- Select the drive you want to encrypt.
- Choose how you want to unlock the drive (password, smart card, etc.) and follow the on-screen instructions to set up the unlock method.
- Choose where you want to save your recovery key in case you forget your password or lose your unlock method.
- Click on "Encrypt" to start the encryption process.
Note: Depending on the size of the drive and the speed of your computer, the encryption process may take some time to complete.
Pros
- Easy to enable
- Do not need any vendor support to rollout
- Settings can be select by user
Cons
- Recovery key can be lost if not securely store.
Note: its good to store on the Microsoft Account. here is the link to access the recovery key https://account.microsoft.com/devices/recoverykey
Enabling BitLocker by GPO (Group Policy Object) is a good way to ensure that all computers in your organization have BitLocker enabled and that they comply with your company's security policies. Here are the steps to enable BitLocker by GPO:
- Open the Group Policy Management Console (gpmc.msc) on a domain-joined computer.
- Expand the domain and select the Organizational Unit (OU) that contains the computers you want to enable BitLocker on.
- Right-click the OU and select "Create a GPO in this domain, and Link it here".
- Name the GPO and click "OK".
- Right-click the new GPO and select "Edit".
- Navigate to "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption".
- Double-click "Operating System Drives" to open the policy settings.
- Enable the "Require additional authentication at startup" policy and set it to "Enabled".
- Enable the "Choose how BitLocker-protected operating system drives can be recovered" policy and set it to "Enabled".
- Configure the remaining policies based on your organization's security policies.
- Click "OK" to save the changes.
- Close the Group Policy Management Editor window.
The next time the computers in the selected OU update their group policies, BitLocker will be enabled on the operating system drives, and the policies you configured will be applied.
There are Two method we can store the recovery key
- Store in the Share file location
Navigate to "Computer Configuration\Administrative Templates\Windows Components\Choose Default Folder for Recovery Password"
- Store in Active directory services
Computer Configuration > Administrative Templates > Windows Components > Bitlocker Drive Encryption and Change the “Store Bitlocker recovery information in Active Directory Domain Services” to enabled
Pros
- Easy to rollout mass scale
- automated
- Key will be store in secure location
Cons
- Reporting not available
Note, if we only use 3rd party or Intune/MECE will provide the Reporting features.
0 comments:
Post a Comment