mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
updates
This commit is contained in:
parent
8a232e50a5
commit
3f67863dd2
@ -10,7 +10,7 @@ ms.date: 08/11/2023
|
|||||||
Starting in Windows 11, version 22H2, Personal Data Encryption (PDE) is a security feature that provides file-based data encryption capabilities to Windows.
|
Starting in Windows 11, version 22H2, Personal Data Encryption (PDE) is a security feature that provides file-based data encryption capabilities to Windows.
|
||||||
|
|
||||||
PDE utilizes Windows Hello for Business to link *data encryption keys* with user credentials. When a user signs in to a device using Windows Hello for Business, decryption keys are released, and encrypted data is accessible to the user.\
|
PDE utilizes Windows Hello for Business to link *data encryption keys* with user credentials. When a user signs in to a device using Windows Hello for Business, decryption keys are released, and encrypted data is accessible to the user.\
|
||||||
When a user logs off, decryption keys are discarded and data is inaccessible, even if another user signs in to the device.
|
When a user logs off, decryption keys are discarded and data is inaccessible, even if another user signs into the device.
|
||||||
|
|
||||||
The use of Windows Hello for Business offers the following advantages:
|
The use of Windows Hello for Business offers the following advantages:
|
||||||
|
|
||||||
@ -26,7 +26,10 @@ To use PDE, the following prerequisites must be met:
|
|||||||
|
|
||||||
- Windows 11, version 22H2 and later
|
- Windows 11, version 22H2 and later
|
||||||
- The devices must be [Azure AD joined][AAD-1]. Domain-joined and hybrid Azure AD joined devices aren't supported
|
- The devices must be [Azure AD joined][AAD-1]. Domain-joined and hybrid Azure AD joined devices aren't supported
|
||||||
- Users must sign in using [Windows Hello for Business](../../../identity-protection/hello-for-business/index.md). Password and [security key][AAD-2] sign in aren't supported
|
- Users must sign in using [Windows Hello for Business](../../../identity-protection/hello-for-business/index.md)
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If you sign in with a password or a [security key][AAD-2], you can't access PDE protected content.
|
||||||
|
|
||||||
[!INCLUDE [personal-data-encryption-pde](../../../../../includes/licensing/personal-data-encryption-pde.md)]
|
[!INCLUDE [personal-data-encryption-pde](../../../../../includes/licensing/personal-data-encryption-pde.md)]
|
||||||
|
|
||||||
@ -64,8 +67,8 @@ PDE is meant to work alongside BitLocker. PDE isn't a replacement for BitLocker,
|
|||||||
| Item | PDE | BitLocker |
|
| Item | PDE | BitLocker |
|
||||||
|--|--|--|
|
|--|--|--|
|
||||||
| Release of decryption key | At user sign-in via Windows Hello for Business | At boot |
|
| Release of decryption key | At user sign-in via Windows Hello for Business | At boot |
|
||||||
| Decryption keys discarded | When user signs out of Windows or one minute after Windows lock screen is engaged | At reboot |
|
| Decryption keys discarded | When user signs out of Windows or one minute after Windows lock screen is engaged | At shutdown |
|
||||||
| Files protected | Individual specified files | Entire volume/drive |
|
| Protected content | All files in protected folders | Entire volume/drive |
|
||||||
| Authentication to access protected content | Windows Hello for Business | When BitLocker with TPM + PIN is enabled, BitLocker PIN plus Windows sign-in |
|
| Authentication to access protected content | Windows Hello for Business | When BitLocker with TPM + PIN is enabled, BitLocker PIN plus Windows sign-in |
|
||||||
|
|
||||||
## Differences between PDE and EFS
|
## Differences between PDE and EFS
|
||||||
@ -89,7 +92,7 @@ Encryption information including what encryption method is being used to protect
|
|||||||
The following are recommendations for using PDE:
|
The following are recommendations for using PDE:
|
||||||
|
|
||||||
- Enable [BitLocker Drive Encryption](../bitlocker/index.md). Although PDE works without BitLocker, it's recommended to enable BitLocker. PDE is meant to work alongside BitLocker for increased security at it isn't a replacement for BitLocker
|
- Enable [BitLocker Drive Encryption](../bitlocker/index.md). Although PDE works without BitLocker, it's recommended to enable BitLocker. PDE is meant to work alongside BitLocker for increased security at it isn't a replacement for BitLocker
|
||||||
- Backup solution such as [OneDrive in Microsoft 365](/sharepoint/onedrive-overview). In certain scenarios, such as TPM resets or destructive PIN resets, the keys used by PDE to protect content will be lost making any PDE-protected concent inaccessible. The only way to recover such content is from a backup. If the files are synced to OneDrive, to regain access you must re-sync OneDrive
|
- Backup solution such as [OneDrive in Microsoft 365](/sharepoint/onedrive-overview). In certain scenarios, such as TPM resets or destructive PIN resets, the keys used by PDE to protect content will be lost making any PDE-protected content inaccessible. The only way to recover such content is from a backup. If the files are synced to OneDrive, to regain access you must re-sync OneDrive
|
||||||
- [Windows Hello for Business PIN reset service](../../../identity-protection/hello-for-business/hello-feature-pin-reset.md). Destructive PIN resets will cause keys used by PDE to protect content to be lost, making any content protected with PDE inaccessible. After a destructive PIN reset, content protected with PDE must be recovered from a backup. For this reason, Windows Hello for Business PIN reset service is recommended since it provides non-destructive PIN resets
|
- [Windows Hello for Business PIN reset service](../../../identity-protection/hello-for-business/hello-feature-pin-reset.md). Destructive PIN resets will cause keys used by PDE to protect content to be lost, making any content protected with PDE inaccessible. After a destructive PIN reset, content protected with PDE must be recovered from a backup. For this reason, Windows Hello for Business PIN reset service is recommended since it provides non-destructive PIN resets
|
||||||
- [Windows Hello Enhanced Sign-in Security](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security) offers additional security when authenticating with Windows Hello for Business via biometrics or PIN
|
- [Windows Hello Enhanced Sign-in Security](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security) offers additional security when authenticating with Windows Hello for Business via biometrics or PIN
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user