mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-07 18:17:22 +00:00
configure update
This commit is contained in:
parent
897a0b8386
commit
78e10e99f9
@ -77,7 +77,6 @@ The following procedures describe the most common tasks performed by using the B
|
|||||||
### Install BitLocker Recovery Password Viewer
|
### Install BitLocker Recovery Password Viewer
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### View the recovery passwords for a computer object
|
### View the recovery passwords for a computer object
|
||||||
|
|
||||||
1. In **Active Directory Users and Computers**, locate and then select the container in which the computer is located
|
1. In **Active Directory Users and Computers**, locate and then select the container in which the computer is located
|
||||||
|
@ -196,7 +196,7 @@ Users can check encryption status using the BitLocker Control Panel applet.
|
|||||||
|
|
||||||
### OS drive with TPM protector and startup key
|
### OS drive with TPM protector and startup key
|
||||||
|
|
||||||
In the next example, we add one more protector, the *StartupKey* protector.
|
The following example shows how to enable BitLocker on an operating system drive using the TPM and *startup key* protectors.
|
||||||
|
|
||||||
Assuming the OS drive letter is `C:` and the USB flash drive is drive letter `E:`, here's the command:
|
Assuming the OS drive letter is `C:` and the USB flash drive is drive letter `E:`, here's the command:
|
||||||
|
|
||||||
@ -222,18 +222,25 @@ If prompted, reboot the computer to complete the encryption process.
|
|||||||
|
|
||||||
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
||||||
|
|
||||||
|
The Control Panel applet doesn't allow to enable BitLocker and add a startup key protector at the same time. To add a startup key protector, follow these steps:
|
||||||
|
|
||||||
|
- From the **BitLocker Drive Encryption** Control Panel applet, under the OS drive, select the option **Change how drive is unlocked at startup**
|
||||||
|
- When prompted, select the option **Insert a USB flash drive**
|
||||||
|
- Selecting the USB drive where you want to store the startup key, and select **Save**
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
After reboot, the BitLocker preboot screen displays and the USB startup key must be inserted before the operating system can be started:
|
||||||
|
|
||||||
:::image type="content" source="images/preboot-startup-key.png" alt-text="Screenshot of the BitLocker preboot screen asking for a USB drive containing the startup key.":::
|
:::image type="content" source="images/preboot-startup-key.png" alt-text="Screenshot of the BitLocker preboot screen asking for a USB drive containing the startup key.":::
|
||||||
|
|
||||||
### Data volumes
|
### Data volumes
|
||||||
|
|
||||||
Data volumes use the same syntax for encryption as operating system volumes but they don't require protectors for the operation to complete.
|
Data volumes use a similar process for encryption as operating system volumes, but they don't require protectors for the operation to complete.
|
||||||
|
|
||||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||||
|
|
||||||
Data volume encryption using Windows PowerShell is the same as for operating system volumes. Add the desired protectors prior to encrypting the volume. The following example adds a password protector to the `E:` volume using the variable `$pw` as the password. The `$pw` variable is held as a SecureString value to store the user-defined password:
|
Add the desired protectors prior to encrypting the volume. The following example adds a password protector to the `E:` volume using the variable `$pw` as the password. The `$pw` variable is held as a SecureString value to store the user-defined password:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
$pw = Read-Host -AsSecureString
|
$pw = Read-Host -AsSecureString
|
||||||
@ -259,7 +266,7 @@ Enable-BitLocker C: -EncryptionMethod XtsAes256 -UsedSpaceOnly -Pin $SecureStrin
|
|||||||
|
|
||||||
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
||||||
|
|
||||||
Data volumes use the same syntax for encryption as operating system volumes but they don't require protectors for the operation to complete. Encrypting data volumes can be done using the base command:
|
Encrypting data volumes can be done using the base command:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
manage-bde.exe -on <drive letter>
|
manage-bde.exe -on <drive letter>
|
||||||
@ -320,7 +327,7 @@ manage-bde.exe -protectors -add -recoverypassword C:
|
|||||||
|
|
||||||
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
||||||
|
|
||||||
This information is not available in the Control Panel.
|
From the **BitLocker Drive Encryption** Control Panel applet, select the volume where you want to add a protector and select the option **Back up your recovery key**.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -348,7 +355,7 @@ From the **BitLocker Drive Encryption** Control Panel applet, expand the drive w
|
|||||||
|
|
||||||
#### Add an Active Directory protector
|
#### Add an Active Directory protector
|
||||||
|
|
||||||
The **ADAccountOrGroup** protector is an Active Directory SID-based protector. This protector can be added to both operating system and data volumes, although it doesn't unlock operating system volumes in the pre-boot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a cluster-aware disk by adding an SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover and unlock to any member computer of the cluster.
|
The Active Directory protector is a SID-based protector that can be added to both operating system and data volumes, although it doesn't unlock operating system volumes in the preboot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a cluster-aware disk by adding an SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover and unlock to any member computer of the cluster.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The SID-based protector requires the use of an additional protector such as TPM, PIN, recovery key, etc. when used on operating system volumes.
|
> The SID-based protector requires the use of an additional protector such as TPM, PIN, recovery key, etc. when used on operating system volumes.
|
||||||
@ -356,9 +363,6 @@ The **ADAccountOrGroup** protector is an Active Directory SID-based protector. T
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This option is not available for Microsoft Entra joined devices.
|
> This option is not available for Microsoft Entra joined devices.
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Active Directory-based protectors are normally used to unlock Failover Cluster-enabled volumes.
|
|
||||||
|
|
||||||
In this example, a domain SID-based protector is added to a previously encrypted volume. The user knows the SID for the user account or group they wish to add and uses the following command:
|
In this example, a domain SID-based protector is added to a previously encrypted volume. The user knows the SID for the user account or group they wish to add and uses the following command:
|
||||||
|
|
||||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||||
@ -367,13 +371,13 @@ In this example, a domain SID-based protector is added to a previously encrypted
|
|||||||
Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup "<SID>"
|
Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup "<SID>"
|
||||||
```
|
```
|
||||||
|
|
||||||
To add an **ADAccountOrGroup** protector to a volume, either the domain SID is needed or the group name preceded by the domain and a backslash. In the example below, the **CONTOSO\\Administrator** account is added as a protector to the data volume G.
|
To add the protector to a volume, either the domain SID or the group name preceded by the domain and a backslash are needed. In the following example, the **CONTOSO\\Administrator** account is added as a protector to the data volume G.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Enable-BitLocker G: -AdAccountOrGroupProtector -AdAccountOrGroup CONTOSO\Administrator
|
Enable-BitLocker G: -AdAccountOrGroupProtector -AdAccountOrGroup CONTOSO\Administrator
|
||||||
```
|
```
|
||||||
|
|
||||||
For users who wish to use the SID for the account or group, the first step is to determine the SID associated with the account. To get the specific SID for a user account in Windows PowerShell, use the following command:
|
To use the SID for the account or group, the first step is to determine the SID associated with the security principal. To get the specific SID for a user account in Windows PowerShell, use the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Get-ADUser -filter {samaccountname -eq "administrator"}
|
Get-ADUser -filter {samaccountname -eq "administrator"}
|
||||||
@ -383,7 +387,7 @@ Get-ADUser -filter {samaccountname -eq "administrator"}
|
|||||||
> Use of this command requires the RSAT-AD-PowerShell feature.
|
> Use of this command requires the RSAT-AD-PowerShell feature.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> In addition to the Windows PowerShell command above, information about the locally logged on user and group membership can be found using: `WHOAMI /ALL`. This doesn't require the use of additional features.
|
> Information about the locally logged on user and group membership can be found using: `whoami.exe /all`.
|
||||||
|
|
||||||
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
||||||
|
|
||||||
@ -422,7 +426,16 @@ Remove-BitLockerKeyProtector <volume> -KeyProtectorID "{GUID}"
|
|||||||
|
|
||||||
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
||||||
|
|
||||||
|
The following commands return the list of key protectors:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
|
manage-bde.exe -status C:
|
||||||
|
```
|
||||||
|
|
||||||
|
The following command removes keys protector of a certain type:
|
||||||
|
|
||||||
|
```cmd
|
||||||
|
manage-bde.exe -protectors -delete C: -type TPMandPIN
|
||||||
```
|
```
|
||||||
|
|
||||||
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user