diff --git a/windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md b/windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md new file mode 100644 index 0000000000..64bec8113c --- /dev/null +++ b/windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md @@ -0,0 +1,169 @@ +--- +title: Overview of BitLocker and device encryption in Windows 10 +description: This topic provides an overview of how BitLocker and device encryption can help protect data on devices running Windows 10. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: Justinha +--- + +# Overview of BitLocker and device encryption in Windows 10 + +**Applies to** +- Windows 10 + +This topic provides an overview of the ways that BitLocker and device encryption can help protect data on devices running Windows 10. For a general overview and list of topics about BitLocker, see [BitLocker](bitlocker-overview.md). + +When users travel, their organization’s confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access. Windows has a long history of providing at-rest data-protection solutions that guard against nefarious attackers, beginning with the Encrypting File System in the Windows 2000 operating system. More recently, BitLocker has provided encryption for full drives and portable drives; in Windows 10, BitLocker will even protect individual files, with data loss prevention capabilities. Windows consistently improves data protection by improving existing options and by providing new strategies. + +Table 2 lists specific data-protection concerns and how they are addressed in Windows 10 and Windows 7. + +Table 2. Data Protection in Windows 10 and Windows 7 + +
Windows 7 | +Windows 10 | +
---|---|
When BitLocker is used with a PIN to protect startup, PCs such as kiosks cannot be restarted remotely. |
+Modern Windows devices are increasingly protected with device encryption out of the box and support SSO to seamlessly protect the BitLocker encryption keys from cold boot attacks. +Network Unlock allows PCs to start automatically when connected to the internal network. |
+
Users must contact the IT department to change their BitLocker PIN or password. |
+Modern Windows devices no longer require a PIN in the pre-boot environment to protect BitLocker encryption keys from cold boot attacks. +Users who have standard privileges can change their BitLocker PIN or password on legacy devices that require a PIN. |
+
When BitLocker is enabled, the provisioning process can take several hours. |
+BitLocker pre-provisioning, encrypting hard drives, and Used Space Only encryption allow administrators to enable BitLocker quickly on new computers. |
+
There is no support for using BitLocker with self-encrypting drives (SEDs). |
+BitLocker supports offloading encryption to encrypted hard drives. |
+
Administrators have to use separate tools to manage encrypted hard drives. |
+BitLocker supports encrypted hard drives with onboard encryption hardware built in, which allows administrators to use the familiar BitLocker administrative tools to manage them. |
+
Encrypting a new flash drive can take more than 20 minutes. |
+Used Space Only encryption in BitLocker To Go allows users to encrypt drives in seconds. |
+
BitLocker could require users to enter a recovery key when system configuration changes occur. |
+BitLocker requires the user to enter a recovery key only when disk corruption occurs or when he or she loses the PIN or password. |
+
Users need to enter a PIN to start the PC, and then their password to sign in to Windows. |
+Modern Windows devices are increasingly protected with device encryption out of the box and support SSO to help protect the BitLocker encryption keys from cold boot attacks. |
+