Free Essay

The Administration of Bitlocker

In:

Submitted By robbycollazo2
Words 808
Pages 4
The Administration of BitLocker
Robert Collazo
Rasmussen College

The Administration of BitLocker
Describe and detail the system requirements and the various modes of BitLocker. Well because BitLocker stores its own encryption and decryption key in a hardware device that is separate from your hard disk, you must have one of the following, a computer with Trusted Platform Module (TPM), which is a special microchip in some newer computers that supports advanced security features. If your computer was manufactured with TPM version 1.2 or higher, BitLocker will store its key in the TPM. Also a removable USB memory device, such as a USB flashes drive. If your computer doesn’t have TPM version 1.2 or higher, BitLocker will store its key on the flash drive. To turn on BitLocker Drive Encryption, your computer’s hard disk must have at least two partitions. One partition must include the drive Windows is installed on. This is the drive that BitLocker will encrypt. The other partition is the active partition, which must remain unencrypted so that the computer can be started. Once you've encrypted the drive Windows is installed on, you can also encrypt additional data drives on the same computer. Be formatted with the NTFS file system. Have a BIOS that is compatible with TPM and supports USB devices during computer startup. If this is not the case, you will need to update the BIOS before using BitLocker.
Define the three authentication mechanisms that can be used to implement BitLocker encryption. The first authentication mode for BitLocker is; Transparent operation mode: This mode utilizes the capabilities of Trusted Platform Module (TPM) 1.2 hardware to provide for a transparent user experience—the user powers up and logs onto Windows as normal. The key used for the disk encryption is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified. The pre-OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement—a methodology specified by the Trusted Computing Group. This mode is vulnerable to a cold boot attack, as it allows a powered-down machine to be booted by an attacker. The next authentication mode is; User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot PIN. This mode is vulnerable to a bootkit attack. Last but not least we have; USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS. Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre-OS environment. This mode is also vulnerable to a bootkit attack.
How does BitLocker encrypt data and what is the purpose of configuring Data Recovery Agents for this application? Data recovery agents are accounts that are able to decrypt BitLocker-protected drives by using their smart card certificates and public keys. Recovery of a BitLocker-protected drive can be accomplished by a data recovery agent that has been configured with the proper certificate. Before a data recovery agent can be configured for a drive, you must add the data recovery agent to Public Key Policies\BitLocker Drive Encryption in either the Group Policy Management Console (GPMC) or the Local Group Policy Editor. You must also enable and configure the Provide the unique identifiers for your organization policy setting to associate a unique identifier to a new drive that is enabled with BitLocker. An identification field is a string that is used to uniquely identify a business unit or organization. Identification fields are required for management of data recovery agents on BitLocker-protected drives. BitLocker will only manage and update data recovery agents when an identification field is present on a drive and is identical to the value configured on the computer.
Explain the different group policy settings that can be configured for BitLocker and BitLocker to go? BitLocker Drive Encryption Group Policy settings can be set for specific BitLocker-protected drives in your organization (or on your local computer if your computer is not part of a domain). This gives system administrators the ability to define policies based on how the drives are used. These policy settings can be applied to; all drives, these policy settings apply to all BitLocker-protected drives. Operating system drives; this is the drive on the local computer on which the operating system is installed. Fixed data drives; these are drives that are permanently installed on the local computer and cannot be removed while the computer is running. Removable data drives; these are drives that are designed to be removed from one computer and used on another computer while the computer is in use.

Similar Documents

Free Essay

Labs

...Server 2003. (Windows XP Home doesn't include EFS.) EFS enables transparent encryption and decryption of files by using advanced, standard cryptographic algorithms. Any individual or program that doesn't possess the appropriate cryptographic key cannot read the encrypted data. Encrypted files can be protected even from those who gain physical possession of the computer that the files reside on. Even persons who are authorized to access the computer and its file system cannot view the data. While other defensive strategies should be used, and encryption isn't the correct countermeasure for every threat, encryption is a powerful addition to any defensive strategy. EFS are the built-in file encryption tool for Windows file systems. 9. BitLocker Drive Encryption is an FDE solution from Microsoft. It is included with the Ultimate and Enterprise editions of Windows Vista and Windows...

Words: 627 - Pages: 3

Premium Essay

Why Upgrading Your Windows Operating System Is Now a Good Thing

...was on Vista. Remote Access consists of VPN Reconnect, Mobile Broadband, RemoteApp and Desktop Connections, DirectAccess, and BranchCache. VPN Reconnect, Mobile Broadband, RemoteApp and Desktop Connections are all brand new clients on Windows 7. DirectAccess and BranchCache are also new but they require Windows 7 Enterprise. Security and Compliance consists of Multiple Active Firewall Profiles, Granular Audit, User Account Control, Domain Name System Security Extensions, Smart Card Support, Biometric Support, BitLocker Drive Encryption, BitLocker To Go, and AppLocker. Multiple Active Firewall Profiles and Domain Name System Security Extensions are brand new to Windows 7 unlike the previous two. Both Granular Audit and User Account Control were introduced on Vista and improved on Windows 7, but XP didn’t have them. All three operating systems had a Smart Card Support, and Biometric Support were 3rd party downloads for XP and Vista while it is included on Windows 7. BitLocker Drive Encryption was not introduced on XP but on Vista, then it was improved on Windows 7 but it required Vista Enterprise and Windows 7 Enterprise....

Words: 1122 - Pages: 5

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104

Premium Essay

Networking 221 Difference Between Server 2003 and 2008

...Differences Between Server 2003 and Server 2008 There are several changes between Server 2003 and Server 2008. Some of the changes dealing with roles and services include Windows Server 2008 operating system eases the task of managing and securing multiple server roles in an enterprise with the new Server Manager console. Server Manager in Windows Server 2008 provides a single source for managing a server's identity and system information, displaying server status, identifying problems with server role configuration, and managing all roles installed on the server. In the Windows Server 2008 operating system, administrators can now choose to install a minimal environment that avoids extra overhead. Although this option limits the roles that can be performed by the server, it can improve security and reduce management. This type of installation is called a Server Core installation. Another change dealing with roles and services is Active Directory Certificate Services (AD CS). AD CS in the Windows Server 2008 operating system provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies. Organizations can use AD CS to enhance security by binding the identity of a person, device, or service to a corresponding private key. AD CS also includes features that allow you to manage certificate enrollment and revocation in a variety of scalable environments. Some of the new security...

Words: 667 - Pages: 3

Premium Essay

Paper

...be providing payroll and scheduling service and will be named SchedulingData. All three servers will have to access the Control Panel to have network connection settings accessed in order to automatically obtain an IP address, also in the Control panel window each server will join Domain “Acme”. Utilizing Driver update, all three servers will perform a driver update to ensure all recent versions are installed, as well as checking to ensure that no generic names are seen. For EmailData the role email services will need to be enabled through the service manager, FileData will have File services as well as utilize the print and document services tool, SchedulingData will have file services enabled, as well as utilizing the Bitlocker Drive Encryption Administration utilities for added...

Words: 283 - Pages: 2

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...

Words: 13687 - Pages: 55

Premium Essay

Cersions of Windows Server 2008

...servers. Improve availability, enhance power management, and integrate solutions for mobile and branch workers. Windows Server 2008 Enterprise is an advanced server platform that provides more cost-effective and reliable support for mission-critical workloads. Windows Server 2008 Standard is the most robust Windows Server operating system to date. With built-in, enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Windows Web Server 2008 is a powerful Web application and services platform. Featuring Internet Information Services (IIS) 7.5 and designed exclusively as an Internet-facing server, it offers improved administration and diagnostic tools to help reduce infrastructure costs when used with a variety of popular development platforms. Windows HPC Server 2008 , the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution for harnessing the power of high-performance computing. Out-of-the-box, world-class performance, and scalability enable organizations of all sizes to rapidly deploy solutions ranging from personal HPC workstations to large clusters spanning thousands of nodes. Windows Server 2008 for Itanium-Based Systems delivers an enterprise-class platform for deploying business-critical applications....

Words: 874 - Pages: 4

Premium Essay

Final -Training Tip Guide for Operating Systems

...Training Tip Guide for Operating Systems at Datamax Inc. IT/282 2013 Introduction to Operating Systems Before we start we should know what an OS (operating system) is. It’s an operating system that manages your hardware, it will run the applications and provide an interface for users, stores, and it retrieves and manipulates files. Basically, every Windows operating systems have variations one being better than the next over time. I will start with Windows 2000, it is an upgrade of Windows NT, which came in a couple of versions, and some were designed for the use with desktops while others were designed for high-end servers. Windows 2000 Server, Advanced Server, and Datacenter Server are network server operating systems. Windows 2000 offered several improvements over Windows NT, including a more stable environment, support for Plug and Play, Device Manager, Recovery Console, Active Directory, better network support, and features specifically targeting Notebook computers. Windows 2000 has a lower system requirements and it has also has an easier interface, whereas Windows XP has all of the features like Windows Movie Maker, inbuilt CD writer support, Internet firewall, as well as Remote Desktop Connection. Windows 2000 is a lot better version of Windows NT and it’s also available in several different versions. Windows 2000 was released to manufacturing on December 15, 1999 and launched to retail...

Words: 3189 - Pages: 13

Free Essay

Securing the Usb Drive

...Technical Writing Project Coversheet Capstone Proposal Project Name: Securing the Universal Serial Bus Interface for the Enterprise Environment Student Name: Steve Wild _ Degree Program: Bachelor of Science in Information Technology – Security Emphasis _ Mentor Name: Yolanda DuPree____________________________________________________ Signature Block: Student’s Signature: _______________________________________________________ Mentor’s Signature: _______________________________________________________ Running head: SECURING THE USB INTERFACE                                                                                                       1    Securing the Universal Serial Bus Interface for the Enterprise Environment Steve Wild Western Governor’s University SECURING THE USB INTERFACE                                                                                                                                  2    Summary The USB interface is one vector of possible attack against a company and must be proactively defended against data theft, data loss, and corporate espionage in order for a company to maintain a secure enterprise environment, minimize downtime, and maximize productivity. Project Goals and Objectives There are several goals that will be accomplished during this project: explore the hardware problems, explore the software problems, explore the policy problems, and give real world examples. The objectives are: provide example...

Words: 3010 - Pages: 13

Free Essay

Case Project

...Chapter 5 Case Project Assignment for Chapter 5 In this assignment, use your problem-solving skills and information presented in this chapter to answer the following real-life scenario. Make sure to address all of the questions posed in the following Case Project. You have been asked to design the entire cabling system for a medical instrument manufacturer’s new warehouse. The company already has three buildings, each 1/2 a mile apart, and the warehouse, 2 miles away, will be its fourth building. Currently, the buildings run on separate networks, but the company wants to be able to exchange data among them. For example, the Quality Control Department in Building 1 would like to be able to access servers in the Research Department in Building 2. In addition, the Sales Department in Building 3 wants to conduct video training for its representatives in the field via the Internet.  What kind of transmission media would you recommend for inside each different building and department of the medical instrument company and why?  What type of media would you recommend using to connect the buildings together and why?  Finally, what kind of media should the company use for connecting the corporate WAN to its ISP and ultimately, the Internet? NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 5. This assignment is turned in using the Assignment Submission for this project found on the Moodle page...

Words: 3057 - Pages: 13

Premium Essay

Mac vs. Pc

...Mac vs. PC When we are discussing the difference between a Mac and a PC it is important to understand exactly what we are comparing. Mac is short for “Macintosh” is only designed, developed and, marketed by Apple, Inc. PC which stands for “Personal Computer” these will be any IBM-Based running computer. That brings us to our first major difference where Mac can only be sold by Apple, PC can be sold anywhere, because of this PC usually are much cheaper then Mac’s. Another big difference would be the applications available on each system. PC would have your common MS Office, Internet Explorer, Media Player, Media Center, Windows Defender, SkyDrive, VLC media player, Chrome browser. Mac on the other hand has a complete different set of popular apps such as iLife, iWork, Xcode, iTunes, Time Machine, Safari, Mac App Store, FaceTime, Game Center, Photo Booth, Chrome browser, Quick Time. Where Mac can open almost all PC files and can coexist on local networks with PCs Such as doc, .exe, .xls, and others. Software exists for other file types. Mac can also run Windows for 100% compatibility. PC cannot open Mac-based files but if proper software is downloaded there is a possibility you can read or even write Mac-based files. If you are looking more for a gaming system a PC would be the better. The library of games available for the PC is exhaustive, and hardware specifically tweaked for gaming performance is much more readily available for Windows. The array of graphics cards and...

Words: 695 - Pages: 3

Premium Essay

Preparing the Company-Wide Migration to Windows 8

...|PREPARING THE COMPANY-WIDE MIGRATION TO WINDOWS 8 | |TIMOTHY BLOUNT | |PROF KEVIN JAYNE CIS 329 | |Internal | |Strengths |Weaknesses | |Storage Space |Touch screen interface | |Better Security |Difficult to move between screens | |Windows to Go |No antivirus for Windows 8 | |Faster boot time |Metro Multitasking | |Optimized for touch screen |Flash content on the tablet PC | | | | | ...

Words: 750 - Pages: 3

Premium Essay

Specifications for the Director

...with a plethora of productivity software to accomplish any task. Using the Microsoft Office Suite products, you will be able to create documents, spreadsheets, presentations, databases, send and receive email, and effective plan your progress and meetings. Also installed is are products from Adobe and Corel allowing state of the art editing capabilities of photos and videos and online sharing capabilities. Included is a full HD video camera from Lumens to allow high resolution video conferencing. The all-in-one printer from Hewlett Packard that lets you scan, print, and edit photos right from the machine. For the operating system, it comes with Windows 7 and a license for Windows 8.1 Pro. It protects our data by encrypting it with BitLocker & Access one PC from another with Remote Desktop. It allows access to photos & files virtually anywhere with SkyDrive built-in. Windows 8.1 Pro offers enhanced features to help us easily connect to company networks and access one PC from another, encrypt your data, and more. This is the best machine for our needs. Recommended Computer Manufacturer | Type | Model | Dell | Desktop | Precision Tower 5810 | Hardware Devices Input Devices | Type | Make/Model | Specifications | Video Camera | Lumens VC-G30 High Definition PTZ | Full HD-1080p output with a high frame rate of 60 fps. Well-suited for lecture recording and video conferencing. | Mouse | Dell MS111 USB Optical Mouse | Standard | Keyboard | US English...

Words: 1830 - Pages: 8

Premium Essay

Comparing Windows Xp, Vista, and 2003 Server

...Comparing Windows XP, Vista, and 2003 Server Comparing Windows XP, Vista, and 2003 for Deployment in Riordan Manufacturing Introduction Riordan Manufacturing will require IT infrastructure upgrades in both server/workstation hardware as well as network and workstation operating systems in order to maintain a competitive edge in the market today. Current operating systems in use at Riordan will either not support or ineffectively utilize resources provided in newer hardware available for procurement. Transitioning to new infrastructure requires a detailed look at the applications required for business processes, the availability and pricing of upgraded software packages to replace current applications, and/or the feasibility of rewriting those applications for modern architectures. The upgrade plan should build as much backward compatibility for older applications as possible, while still maintaining progressive replacement cycles aiding in product support and reliability. Windows XP FEATURES Over the years Microsoft has produced many versions of Windows since 1985. Every version of Windows from 1985 to 1990’s can be considered as a testing phase until Windows 3.0 came out for personal computers. Windows XP Professional integrates the strengths of Windows 2000 Professional. Windows XP offers many enhancements and a reduced total cost of ownership over Windows 2000 while increasing your computer power. Windows XP Professional advanced management and support...

Words: 3011 - Pages: 13

Premium Essay

Microsoft Network Operating System

...For this Research assignment part 1, I will be talking about 5 questions. The questions are “Why windows server 2008 comes in different versions? What is the significance of each version,” “What are the new features or enhancements made to windows server 2008? How is windows server 2008 different from windows server 2003,” “Why is 64-bit architecture an advantage?” “Explain the new features of windows server 2008, such as server core, virtualization, and power shell. What is the role of these features and how will they improve efficiency in administering windows?” and “What is a read only domain controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? The reason why there are so many different versions is based on the demand of the company. It comes in different varieties to accommodate what the user needs for the business they are running. Big companies will go and pay the extra money for an operating system that will support many processors and hundreds or thousands of users. But for the small companies that does not have that extra money or do not need the extra feature for such small volumes they made a version just for them as well. By making different sets or versions they gain profits by both parties for what they need and do not need. The significance of each version has its features. For example Windows 2008 datacenter edition has a maximum number of cpu’s at 64 while version Windows 2008 enterprise edition...

Words: 1031 - Pages: 5