Thursday, April 27, 2023

Which method suits you to deploy the bitlocker

Standard

 BitLocker is a built-in encryption feature of Microsoft Windows operating systems. Here are three steps you can deploy BitLocker:

  1. Enable by User
  2. GPO Deployment
  3. 3rd Party Application or Intune/MECM

Enable By User

User can enable the bitlocker by user following below steps
  1. Click on the "Start" button and select "Settings" (the gear icon).
  2. Click on "Update & Security".
  3. Click on "Device encryption" or "BitLocker".
  4. If your device doesn't support device encryption, you will see a message indicating that BitLocker isn't available for your device. Otherwise, you will see the BitLocker settings page.
  5. Click on "Turn on BitLocker".
  6. Select the drive you want to encrypt.
  7. Choose how you want to unlock the drive (password, smart card, etc.) and follow the on-screen instructions to set up the unlock method.
  8. Choose where you want to save your recovery key in case you forget your password or lose your unlock method.
  9. Click on "Encrypt" to start the encryption process.

Note: Depending on the size of the drive and the speed of your computer, the encryption process may take some time to complete.


Pros

  • Easy to enable
  • Do not need any vendor support to rollout
  • Settings can be select by user

Cons

  • Recovery key can be lost if not securely store. 
Note: its good to store on the Microsoft Account. here is the link to access the recovery key https://account.microsoft.com/devices/recoverykey













GPO Deployment

Enabling BitLocker by GPO (Group Policy Object) is a good way to ensure that all computers in your organization have BitLocker enabled and that they comply with your company's security policies. Here are the steps to enable BitLocker by GPO:

  1. Open the Group Policy Management Console (gpmc.msc) on a domain-joined computer.
  2. Expand the domain and select the Organizational Unit (OU) that contains the computers you want to enable BitLocker on.
  3. Right-click the OU and select "Create a GPO in this domain, and Link it here".
  4. Name the GPO and click "OK".
  5. Right-click the new GPO and select "Edit".
  6. Navigate to "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption".
  7. Double-click "Operating System Drives" to open the policy settings.
  8. Enable the "Require additional authentication at startup" policy and set it to "Enabled".
  9. Enable the "Choose how BitLocker-protected operating system drives can be recovered" policy and set it to "Enabled".
  10. Configure the remaining policies based on your organization's security policies.
  11. Click "OK" to save the changes.
  12. Close the Group Policy Management Editor window.

The next time the computers in the selected OU update their group policies, BitLocker will be enabled on the operating system drives, and the policies you configured will be applied.

There are Two method we can store the recovery key

  • Store in the Share file location
Navigate to "Computer Configuration\Administrative Templates\Windows Components\Choose Default Folder for Recovery Password"
  • Store in Active directory services
Computer Configuration > Administrative Templates > Windows Components > Bitlocker Drive Encryption and Change the “Store Bitlocker recovery information in Active Directory Domain Services” to enabled

Pros

  • Easy to rollout mass scale
  • automated
  • Key will be store in secure location

Cons

  • Reporting not available
Note, if we only use 3rd party or Intune/MECE will provide the Reporting features. 

Conclusion

In summary, there are three ways to deploy BitLocker encryption on your organization's devices: by enabling it by the user, by using GPO deployment, or by using a third-party application or Intune/MECM. Each method has its own advantages and disadvantages, and the best method for your organization will depend on your specific needs and security policies. By enabling BitLocker encryption on your organization's devices, you can help protect your sensitive data from unauthorized access and mitigate the risk of data breaches.

0 comments:

Post a Comment