mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
updates
This commit is contained in:
parent
ea13272152
commit
e776af1dea
@ -24,23 +24,6 @@ The Dictionary Attack Prevention Parameters provide a way to balance security ne
|
||||
|
||||
Increasing the PIN length requires a greater number of guesses for an attacker. In that case, the lockout duration between each guess can be shortened to allow legitimate users to retry a failed attempt sooner, while maintaining a similar level of protection.
|
||||
|
||||
### Disable new DMA devices when this computer is locked
|
||||
|
||||
This policy setting allows blocking of direct memory access (DMA) for all hot pluggable PCI ports until a user signs in to Windows.
|
||||
|
||||
| Item | Info |
|
||||
|:---|:---|
|
||||
|**Policy description**|This setting helps prevent attacks that use external PCI-based devices to access BitLocker keys.|
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|*Computer Configuration* > *Administrative Templates* > *Windows Components* > *BitLocker Drive Encryption*|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|Every time the user locks the screen, DMA will be blocked on hot pluggable PCI ports until the user signs in again.|
|
||||
|**When disabled or not configured**|DMA is available on hot pluggable PCI devices if the device is turned on, regardless of whether a user is signed in.|
|
||||
|
||||
#### Reference: Disable new DMA devices when this computer is locked
|
||||
|
||||
This policy setting is only enforced when BitLocker or device encryption is enabled. As explained in the [Microsoft Security Guidance blog](/archive/blogs/secguide/issue-with-bitlockerdma-setting-in-windows-10-fall-creators-update-v1709), in some cases when this setting is enabled, internal, PCI-based peripherals can fail, including wireless network drivers and input and audio peripherals. This problem is fixed in the [April 2018 quality update](https://support.microsoft.com/help/4093105).
|
||||
|
||||
### Configure use of smart cards on fixed data drives
|
||||
|
||||
This policy setting is used to require, allow, or deny the use of smart cards with fixed data drives.
|
||||
@ -147,30 +130,6 @@ When set to **Do not allow complexity**, no password complexity validation is do
|
||||
|
||||
For information about this setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](../../../threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
|
||||
|
||||
### Validate smart card certificate usage rule compliance
|
||||
|
||||
This policy setting is used to determine what certificate to use with BitLocker.
|
||||
|
||||
| Item | Info |
|
||||
|:---|:---|
|
||||
|**Policy description**|With this policy setting, an object identifier from a smart card certificate can be associated to a BitLocker-protected drive.|
|
||||
|**Drive type**|Fixed and removable data drives|
|
||||
|**Policy path**|*Computer Configuration* > *Administrative Templates* > *Windows Components* > *BitLocker Drive Encryption*|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|The object identifier that is specified in the **Object identifier** setting must match the object identifier in the smart card certificate.|
|
||||
|**When disabled or not configured**|The default object identifier is used.|
|
||||
|
||||
#### Reference: Validate smart card certificate usage rule compliance
|
||||
|
||||
This policy setting is applied when BitLocker is turned on.
|
||||
|
||||
The object identifier is specified in the extended key usage (EKU) of a certificate. BitLocker can identify which certificates can be used to authenticate a user certificate to a BitLocker-protected drive by matching the object identifier in the certificate with the object identifier that is defined by this policy setting.
|
||||
|
||||
The default object identifier is 1.3.6.1.4.1.311.67.1.1.
|
||||
|
||||
> [!NOTE]
|
||||
> BitLocker doesn't require that a certificate have an EKU attribute; however, if one is configured for the certificate, it must be set to an object identifier that matches the object identifier configured for BitLocker.
|
||||
|
||||
### Enable use of BitLocker authentication requiring preboot keyboard input on slates
|
||||
|
||||
| Item | Info |
|
||||
@ -696,9 +655,6 @@ The following list identifies all of the available PCRs:
|
||||
- PCR 5: GPT/Partition Table
|
||||
- PCR 6: Resume from S4 and S5 Power State Events
|
||||
- PCR 7: Secure Boot State
|
||||
|
||||
For more information about this PCR, see [About the Platform Configuration Register (PCR)](#about-the-platform-configuration-register-pcr) in this article.
|
||||
|
||||
- PCR 8: Initialized to 0 with no Extends (reserved for future use)
|
||||
- PCR 9: Initialized to 0 with no Extends (reserved for future use)
|
||||
- PCR 10: Initialized to 0 with no Extends (reserved for future use)
|
||||
|
@ -7,7 +7,13 @@ ms.topic: include
|
||||
|
||||
### Disable new DMA devices when this computer is locked
|
||||
|
||||
This policy allows blocking direct memory access (DMA) for all Thunderbolt hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host Thunderbolt PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug Thunderbolt PCI ports with no children devices, until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged or the system is rebooted or hibernated. This policy setting is only enforced when BitLocker or device encryption is enabled. Note: Some PCs may not be compatible with this policy if the system firmware enables DMA for newly attached Thunderbolt devices before exposing the new devices to Windows.
|
||||
When enabled, this policy setting blocks direct memory access (DMA) for all hot pluggable PCI ports until a user signs into Windows.
|
||||
|
||||
Once a user signs in, Windows enumerates the PCI devices connected to the host Thunderbolt PCI ports. Every time the user locks the device, DMA is blocked on hot plug Thunderbolt PCI ports with no children devices, until the user signs in again.
|
||||
|
||||
Devices that were already enumerated when the device was unlocked will continue to function until unplugged, or the system is rebooted or hibernated.
|
||||
|
||||
This policy setting is only enforced when BitLocker or device encryption is enabled.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,14 @@ ms.topic: include
|
||||
|
||||
### Validate smart card certificate usage rule compliance
|
||||
|
||||
This policy setting allows you to associate an object identifier from a smart card certificate to a BitLocker-protected drive. The object identifier is specified in the enhanced key usage (EKU) of a certificate. BitLocker can identify which certificates may be used to authenticate a user certificate to a BitLocker-protected drive by matching the object identifier in the certificate with the object identifier that is defined by this policy setting. Default object identifier is 1.3.6.1.4.1.311.67.1.1 Note: BitLocker does not require that a certificate have an EKU attribute, but if one is configured for the certificate it must be set to an object identifier (OID) that matches the OID configured for BitLocker. If you enable this policy setting, the object identifier specified in the "Object identifier" box must match the object identifier in the smart card certificate. If you disable or do not configure this policy setting, a default object identifier is used.
|
||||
This policy setting is used to determine which certificate to use with BitLocker by associating an object identifier (OID) from a smart card certificate to a BitLocker-protected drive. The object identifier is specified in the enhanced key usage (EKU) of a certificate.
|
||||
|
||||
BitLocker can identify which certificates may be used to authenticate a user certificate to a BitLocker-protected drive by matching the object identifier in the certificate with the object identifier that is defined by this policy setting. Default OID is `1.3.6.1.4.1.311.67.1.1`.
|
||||
|
||||
If you enable this policy setting, the object identifier specified in the **Object identifier** field must match the object identifier in the smart card certificate. If you disable or do not configure this policy setting, the default OID is used.
|
||||
|
||||
> [!NOTE]
|
||||
> BitLocker doesn't require that a certificate have an EKU attribute; however, if one is configured for the certificate, it must be set to an object identifier that matches the object identifier configured for BitLocker.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -5,40 +5,40 @@ ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
ms.topic: overview
|
||||
ms.date: 08/14/2023
|
||||
ms.date: 09/25/2023
|
||||
---
|
||||
|
||||
# BitLocker overview
|
||||
|
||||
Bitlocker is a Windows disk encryption feature, designed to protect data by providing encryption for entire volumes.\
|
||||
BitLocker is a Windows security feature that provides encryption for entire volumes.\
|
||||
BitLocker addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.
|
||||
|
||||
BitLocker provides maximum protection when used with a Trusted Platform Module (TPM). A TPM is a hardware component installed in many devices and it works with BitLocker to help protect user data and to ensure that a computer hasn't been tampered with while the system is offline.
|
||||
|
||||
On devices that don't have a TPM, BitLocker can still be used to encrypt the Windows operating system drive. However, this implementation requires the user to insert a USB startup key to start the device or resume from hibernation. An operating system volume password can be used to protect the operating system volume on a computer without TPM. Both options don't provide the pre-startup system integrity verification offered by BitLocker with a TPM.
|
||||
On devices that don't have a TPM, BitLocker can still be used to encrypt the operating system drive. However, this implementation requires the user to insert a USB key to start the device or when resuming from hibernation. A password can also be used to protect the OS volume on a device without TPM. Both options don't provide the pre-startup system integrity verification offered by BitLocker with a TPM.
|
||||
|
||||
In addition to the TPM, BitLocker offers the option to lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable device (such as a USB flash drive) that contains a startup key. These additional security measures provide multifactor authentication and assurance that the computer won't start or resume from hibernation until the correct PIN or startup key is presented.
|
||||
In addition to the TPM, BitLocker offers the option to lock the normal startup process until the user supplies a personal identification number (PIN) or inserts a removable device (such as a USB drive) that contains a startup key. These additional security measures provide multifactor authentication and assurance that the device won't start or resume from hibernation until the correct PIN or startup key is presented.
|
||||
|
||||
## Practical applications
|
||||
|
||||
Data on a lost or stolen device is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard drive to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected devices are decommissioned or recycled.
|
||||
Data on a lost or stolen device is vulnerable to unauthorized access, either by running a software-attack tool against it, or by transferring the computer's hard drive to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected devices are decommissioned or recycled.
|
||||
|
||||
## System requirements
|
||||
|
||||
BitLocker has the following hardware requirements:
|
||||
|
||||
- For BitLocker to use the system integrity check provided by a TPM, the computer must have TPM 1.2 or later versions. If a computer doesn't have a TPM, saving a startup key on a removable drive, such as a USB flash drive, becomes mandatory when enabling BitLocker
|
||||
- For BitLocker to use the system integrity check provided by a TPM, the device must have TPM 1.2 or later versions. If a device doesn't have a TPM, saving a startup key on a removable drive is mandatory when enabling BitLocker
|
||||
- A device with a TPM must also have a Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware. The BIOS or UEFI firmware establishes a chain of trust for the pre-operating system startup, and it must include support for TCG-specified Static Root of Trust Measurement. A computer without a TPM doesn't require TCG-compliant firmware
|
||||
- The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support the USB mass storage device class, including reading small files on a USB flash drive in the pre-operating system environment
|
||||
- The system BIOS or UEFI firmware (for TPM and non-TPM devices) must support the USB mass storage device class, including reading small files on a USB drive in the pre-operating system environment
|
||||
|
||||
> [!NOTE]
|
||||
> TPM 2.0 is not supported in Legacy and Compatibility Support Module (CSM) modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as native UEFI only. The Legacy and CSM options must be disabled. For added security, enable the secure boot feature.
|
||||
>
|
||||
> Installed Operating System on hardware in Legacy mode stops the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](/windows/deployment/mbr-to-gpt) before changing the BIOS mode, which prepares the OS and the disk to support UEFI.
|
||||
> Installed Operating System on hardware in Legacy mode stops the OS from booting when the BIOS mode is changed to UEFI. Use the tool [`mbr2gpt`](/windows/deployment/mbr-to-gpt) before changing the BIOS mode, which prepares the OS and the disk to support UEFI.
|
||||
|
||||
- The hard disk must be partitioned with at least two drives:
|
||||
- The operating system drive (or boot drive) contains the operating system and its support files. It must be formatted with the NTFS file system
|
||||
- The system drive contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker isn't enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. It's recommended that the system drive be approximately 350 MB in size. After BitLocker is turned on, it should have approximately 250 MB of free space
|
||||
- The *operating system drive* (or boot drive) contains the OS and its support files. It must be formatted with the NTFS file system
|
||||
- The *system drive* contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker isn't enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. It's recommended that the system drive be approximately 350 MB in size. After BitLocker is turned on, it should have approximately 250 MB of free space
|
||||
|
||||
> [!IMPORTANT]
|
||||
> When installed on a new device, Windows automatically creates the partitions that are required for BitLocker.
|
||||
@ -46,6 +46,6 @@ BitLocker has the following hardware requirements:
|
||||
> An encrypted partition can't be marked as active.
|
||||
|
||||
> [!NOTE]
|
||||
> When installing the BitLocker optional component on a server, the Enhanced Storage feature also needs to be installed. The Enhanced Storage feature is used to support hardware encrypted drives.
|
||||
> When installing the BitLocker optional component on a server, the *Enhanced Storage* feature must be installed. The feature is used to support hardware encrypted drives.
|
||||
|
||||
[!INCLUDE [bitlocker](../../../../../includes/licensing/bitlocker-enablement.md)]
|
||||
|
@ -27,16 +27,12 @@ items:
|
||||
href: bitlocker-recovery-guide-plan.md
|
||||
- name: Protect cluster shared volumes and storage area networks with BitLocker
|
||||
href: protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md
|
||||
- name: BitLocker features
|
||||
items:
|
||||
- name: Network Unlock
|
||||
href: bitlocker-how-to-enable-network-unlock.md
|
||||
- name: Reference
|
||||
items:
|
||||
- name: BitLocker policy settings
|
||||
href: policy-settings.md
|
||||
- name: BitLocker Group Policy settings
|
||||
href: _bitlocker-group-policy-settings.md
|
||||
- name: BCD settings
|
||||
href: bcd-settings-and-bitlocker.md
|
||||
- name: BitLocker frequently asked questions (FAQ)
|
||||
|
Loading…
x
Reference in New Issue
Block a user