Metadata/style update BitLocker 5

This commit is contained in:
Frank Rojas
2022-11-08 17:59:06 -05:00
parent 3bcb3056e8
commit 046513adc7
23 changed files with 328 additions and 291 deletions

View File

@ -21,8 +21,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker and Active Directory Domain Services (AD DS) FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above

View File

@ -17,7 +17,11 @@ ms.technology: itpro-security
# BitLocker basic deployment
(*Applies to: Windows 10, Windows 11, Windows Server 2016 and above*)
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
This article for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.

View File

@ -17,7 +17,11 @@ ms.technology: itpro-security
# BitLocker Countermeasures
(*Applies to: Windows 10, Windows 11, Windows Server 2016 and above*)
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
Windows uses technologies including trusted platform module (TPM), secure boot, and measured boot to help protect BitLocker encryption keys against attacks. BitLocker is part of a strategic approach to securing data against offline attacks through encryption technology. Data on a lost or stolen computer is vulnerable. For example, there could be unauthorized access, either by running a software attack tool against the computer or by transferring the computer's hard disk to a different computer.

View File

@ -19,7 +19,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker frequently asked questions (FAQ)
summary: |
(*Applies to: Windows 10, Windows 11*)
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:

View File

@ -15,7 +15,11 @@ ms.technology: itpro-security
# BitLocker deployment comparison
(*Applies to: Windows 10, Windows 11, Windows Server 2016 and above*)
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
This article depicts the BitLocker deployment comparison chart.

View File

@ -17,7 +17,11 @@ ms.technology: itpro-security
# Overview of BitLocker Device Encryption in Windows
(*Applies to: Windows 10, Windows 11, Windows Server 2016 and above*)
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
This article explains how BitLocker Device Encryption can help protect data on devices running Windows. For a general overview and list of articles about BitLocker, see [BitLocker](bitlocker-overview.md).

View File

@ -21,8 +21,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker frequently asked questions (FAQ) resources
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
This article links to frequently asked questions about BitLocker. BitLocker is a data protection feature that encrypts drives on your computer to help prevent data theft or exposure. BitLocker-protected computers can also delete data more securely when they're decommissioned because it's much more difficult to recover deleted data from an encrypted drive than from a non-encrypted drive.

View File

@ -16,7 +16,11 @@ ms.technology: itpro-security
# BitLocker: How to deploy on Windows Server 2012 and later
> Applies to: Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
*Applies to:*
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2016 and above
This article explains how to deploy BitLocker on Windows Server 2012 and later versions. For all Windows Server editions, BitLocker can be installed using Server Manager or Windows PowerShell cmdlets. BitLocker requires administrator privileges on the server on which it's to be installed.

View File

@ -17,7 +17,7 @@ ms.technology: itpro-security
# BitLocker: How to enable network unlock
**Applies to**
*Applies to:*
- Windows 10
- Windows 11

View File

@ -19,8 +19,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker Key Management FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:

View File

@ -18,8 +18,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker Network Unlock FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:
- name: Ignored

View File

@ -21,9 +21,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker Overview and Requirements FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:

View File

@ -17,7 +17,7 @@ ms.technology: itpro-security
# BitLocker
**Applies to**
*Applies to:*
- Windows 10
- Windows 11

View File

@ -18,11 +18,11 @@ ms.custom: bitlocker
# BitLocker recovery guide
**Applies to:**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and later
- Windows Server 2016 and above
This article describes how to recover BitLocker keys from AD DS.

View File

@ -19,8 +19,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker Security FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above

View File

@ -19,7 +19,7 @@ metadata:
ms.custom: bitlocker
title: BitLocker To Go FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10

View File

@ -18,8 +18,10 @@ metadata:
ms.custom: bitlocker
title: BitLocker Upgrading FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:

View File

@ -18,7 +18,7 @@ ms.technology: itpro-security
# BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
@ -87,7 +87,7 @@ This command encrypts the drive using the TPM as the default protector. If you a
```
### Using manage-bde with data volumes
Data volumes use the same syntax for encryption as operating system volumes but they don't require protectors for the operation to complete. Encrypting data volumes can be done using the base command: `manage-bde -on <drive letter>` or you can choose to add additional protectors to the volume first. We recommend that you add at least one primary protector and a recovery protector to a data volume.
Data volumes use the same syntax for encryption as operating system volumes but they don't require protectors for the operation to complete. Encrypting data volumes can be done using the base command: `manage-bde.exe -on <drive letter>` or you can choose to add additional protectors to the volume first. We recommend that you add at least one primary protector and a recovery protector to a data volume.
A common protector for a data volume is the password protector. In the example below, we add a password protector to the volume and turn on BitLocker.
@ -103,7 +103,7 @@ You may experience a problem that damages an area of a hard disk on which BitLoc
The BitLocker Repair Tool (Repair-bde) can be used to access encrypted data on a severely damaged hard disk if the drive was encrypted by using BitLocker. Repair-bde can reconstruct critical parts of the drive and salvage recoverable data as long as a valid recovery password or recovery key is used to decrypt the data. If the BitLocker metadata data on the drive has become corrupt, you must be able to supply a backup key package in addition to the recovery password or recovery key. This key package is backed up in Active Directory Domain Services (AD DS) if you used the default setting for AD DS backup. With this key package and either the recovery password or recovery key, you can decrypt portions of a BitLocker-protected drive if the disk is corrupted. Each key package will work only for a drive that has the corresponding drive identifier. You can use the BitLocker Recovery Password Viewer to obtain this key package from AD DS.
> [!TIP]
> If you aren't backing up recovery information to AD DS or if you want to save key packages alternatively, you can use the command `manage-bde -KeyPackage` to generate a key package for a volume.
> If you aren't backing up recovery information to AD DS or if you want to save key packages alternatively, you can use the command `manage-bde.exe -KeyPackage` to generate a key package for a volume.
The Repair-bde command-line tool is intended for use when the operating system doesn't start or when you can't start the BitLocker Recovery Console. Use Repair-bde if the following conditions are true:

View File

@ -18,7 +18,7 @@ ms.technology: itpro-security
# BitLocker: Use BitLocker Recovery Password Viewer
**Applies to**
*Applies to:*
- Windows 10
- Windows 11

View File

@ -19,8 +19,10 @@ metadata:
ms.custom: bitlocker
title: Using BitLocker with other programs FAQ
summary: |
**Applies to**
*Applies to:*
- Windows 10
- Windows 11
- Windows Server 2016 and above
sections:

View File

@ -17,7 +17,7 @@ ms.technology: itpro-security
# Prepare your organization for BitLocker: Planning and policies
**Applies to**
*Applies to:*
- Windows 10
- Windows 11

View File

@ -16,8 +16,9 @@ ms.technology: itpro-security
# Protecting cluster shared volumes and storage area networks with BitLocker
**Applies to**
- Windows Server 2016
*Applies to:*
- Windows Server 2016 and above
This article describes the procedure to protect cluster shared volumes (CSVs) and storage area networks (SANs) by using BitLocker.