From d5f55fe3d472a8181b4ad364fc84e1169ee5aa38 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 3 Oct 2023 09:47:33 -0400 Subject: [PATCH] tabbed xp --- .../data-protection/bitlocker/images/cmd.png | Bin 626 -> 213 bytes .../bitlocker/images/powershell.png | Bin 1166 -> 670 bytes .../data-protection/bitlocker/manage.md | 50 ++++++++++-------- 3 files changed, 29 insertions(+), 21 deletions(-) diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.png b/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.png index 55fd5b43ff09f8c5755346bdb48d00f8c4efe638..c410cfa5d4e364e91fed070c64ed2f5be7520405 100644 GIT binary patch delta 171 zcmeywa+OiBGr-TCmrII^fq{Y7)59eQNDF{42OE%-|NK93qM}JXLzbtDV~B-+vP8uN z`^;bUUIsTBPMgaM9Fd$VY?!fwarwD9s@#Wp8Gg0s_|!5dFhmOa$i(ur1oAk9u_Q0P z{6bbP0l)%^o0J}akdH?_b delta 587 zcmV-R0<`_r0rCVPiBL{Q4GJ0x0000DNk~Le0000W0000W2nGNE0CReJ^pPPne*y-Jd~_ z$tc2`5K?2SAQJfYy&)11e=b6LeZq;0P=wcSML16+!2StE0)aqaY0<13Nr7ZC34_6~ zR4fNe0<^jpSE`(d1WNo@C=`mNA~_KWOuuZDoxo0DC-AWZXpeqcxE#^odpIv%p~zRj zSE?voRdHD=<4mGX$kFjhoi(5AidpD@Kzno=AgfJ4y(Z@Zmc8i(A=w;m2$C;z@!)kPt{1R7gAvn5r8{5sf1|m|0Q5WAy$u!5bQUewBVs z5WEOe?>xb?sC2!8*^^Xsfrob6U=9ub5}cs|@ zH2Aazmph-(XlvU1^uo>|f2*v)*P=NA^6=e!guTbY1S%qpr>0TijH9e0#@pBCuXMc( z&}E>>zk&FCQGj#H860+v!7(z8(1Q$ulW7E_Yq%9j;^-iCK|-{0eg3`$h41=KEHB{O z_Y{=3jnS&!2>9=igO5QB7cd9`au)46jh4$P9C1gm-!b{yDAXO=O@?A<9f+dU8$nag zIQF#M-JPEYZ6Hi*B71U+CWJ-Jo)u>CtTOtM+m(@-C^P!G&Zv5`j{ozJq+h05;)eS{ R9*F<|002ovPDHLkV1mOOGI9U_ delta 1131 zcmV-x1eE)p1&#?JiBL{Q4GJ0x0000DNk~Le0000W0000W2nGNE0CReJ^pPPne*_~* zL_t(oN9~qbPg7A4$N30+6dp`8KCpwbNtIyqO-;Z=1&Sh|h!(7@)-5LL6NsV-AqplY zh!DVCM3AC_3lwFmELH^Bb(}d%@4Y>jMW6X6lUr!-`OTR#^S{?`UF$MaU`o@Tu*?pK zI_2_-KG=#OuWOEz`fD#{(F837v1h(PjC}-RP7krgqikPT(gfR*`w6z3_yCbP-4Jo?9Ykbz z;pZNRD;&28q$b>b0Ntp-&&@%41ty?_Z!7vviy(XyV(o5(4|90lGVtRZe;%II$^ORs ztpclw%1;Zk1TOsc!uv-50I9KS!3ZzV!v`Tc?r*U~02JW$X)&FP(z;;z=z3yufpn zR#U^7z;jLDSrXpHs(@>%4H%T#VxiI~@RCW)*n?%CU_00AT+PHk!9$O z?Xe9TLxto22rkF1q0`tCj=N)`=@5Rx1fHqELk_=SRl{-i7g$Xpe@9+6$yr|xE@$1@ zKPT{9XYaVRjz_p0HwHhd!GqJEQ3JaK(kRM!twxhrGyuIL#-2zzPdnFUU3PqEh6blA zj&+$pY6?kz9zf@~y3q`Jji$b1N}#!}RJWPHUjbGYaD522K4C|KW3CzyW@e>bDsYoo zKX`Rm+5OMyIfzQTe{BvwOz@|GJ;s_9r%W{toYd_rmde38%#He;K115SGkB|@7B(NKW3#^h z;wPwh=!Wa{BN)R_{$L1W5X$QYz z0(%5j6PD8&oi|{Zb@_B#>5XQkS(i|Kh}S&TfN)_OL6zJWuD;RW)9pXu6!>8C2&7R6 xun>$gTs|: -KeyProtectorID "{GUID}" > [!NOTE] > The BitLocker cmdlet requires the key protector GUID enclosed in quotation marks to execute. Ensure the entire GUID, with braces, is included in the command. -#### [:::image type="icon" source="images/cmd.png"::: **Intune**](#tab/cmd) +#### [:::image type="icon" source="images/cmd.png"::: **cmd**](#tab/cmd) ```cmd C:\>manage-bde -status @@ -79,13 +79,10 @@ Volume C: [Local Disk] Numerical Password ``` - -#### [:::image type="icon" source="images/locked-drive.svg"::: **Intune**](#tab/controlpanel) +#### [:::image type="icon" source="images/locked-drive.svg"::: **Settings**](#tab/controlpanel) --- - - ## Manage-bde Manage-bde is a command-line tool that can be used for scripting BitLocker operations. Manage-bde offers additional options not displayed in the BitLocker control panel. For a complete list of the `manage-bde.exe` options, see the [Manage-bde](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/ff829849(v=ws.11)) command-line reference. @@ -132,7 +129,25 @@ The above command encrypts the drive using the TPM as the default protector. If manage-bde.exe -protectors -get ``` -### Using manage-bde with data volumes +## Manage data volumes + +Follow the instructions below to configure your devices, selecting the option that best suits your needs. + +#### [:::image type="icon" source="images/powershell.png"::: **PowerShell**](#tab/powershell) + +Data volume encryption using Windows PowerShell is the same as for operating system volumes. Add the desired protectors prior to encrypting the volume. The following example adds a password protector to the E: volume using the variable $pw as the password. The $pw variable is held as a +SecureString value to store the user-defined password. + +```powershell +$pw = Read-Host -AsSecureString + +Enable-BitLockerKeyProtector E: -PasswordProtector -Password $pw +``` + +> [!NOTE] +> The BitLocker cmdlet requires the key protector GUID enclosed in quotation marks to execute. Ensure the entire GUID, with braces, is included in the command. + +#### [:::image type="icon" source="images/cmd.png"::: **cmd**](#tab/cmd) Data volumes use the same syntax for encryption as operating system volumes but they don't require protectors for the operation to complete. Encrypting data volumes can be done using the base command: @@ -147,6 +162,10 @@ manage-bde.exe -protectors -add -pw C: manage-bde.exe -on C: ``` +#### [:::image type="icon" source="images/locked-drive.svg"::: **Settings**](#tab/controlpanel) + +--- + ## BitLocker Repair Tool Hard disk areas on which BitLocker stores critical information could be damaged, for example, when a hard disk fails or if Windows exits unexpectedly. @@ -214,17 +233,6 @@ In the example below, adds one additional protector, the StartupKey protector an Enable-BitLocker C: -StartupKeyProtector -StartupKeyPath -SkipHardwareTest ``` -### Using the BitLocker Windows PowerShell cmdlets with data volumes - -Data volume encryption using Windows PowerShell is the same as for operating system volumes. Add the desired protectors prior to encrypting the volume. The following example adds a password protector to the E: volume using the variable $pw as the password. The $pw variable is held as a -SecureString value to store the user-defined password. - -```powershell -$pw = Read-Host -AsSecureString - -Enable-BitLockerKeyProtector E: -PasswordProtector -Password $pw -``` - ### Using an SID-based protector in Windows PowerShell The **ADAccountOrGroup** protector is an Active Directory SID-based protector. This protector can be added to both operating system and data volumes, although it doesn't unlock operating system volumes in the pre-boot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a cluster-aware disk by adding an SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover and unlock to any member computer of the cluster.