SlideShare una empresa de Scribd logo
1 de 11
BitLocker To Go Demo
What is BitLocker To Go? Builds on top of BitLocker introduced in Vista Protects removable storage devices with full-disk encryption Compatible with both FAT and NTFS  Available only in Win 7 Enterprise & Ultimate Can be read in down-level Windows versions Works independently from BitLocker and does not require TPM
Turning on BitLocker To Go
Drive Security
Recovery Key BitLocker Drive Encryption Recovery Key  The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: EBC06BD0-D667-4D Full recovery key identification: EBC06BD0-D667-4D17-B87C-1B6ECB22CF03 BitLockerRecovery Key: 495330-143814-194315-013354-713449-217866-573738-034298
Encrypt a Drive
Accessing a BitLocker To Go Drive
Drive Options
Decrypt a Drive
Group Policy
BitLocker To Go Reader

Más contenido relacionado

La actualidad más candente

P4 m900 m7 se-20140210
P4 m900 m7 se-20140210P4 m900 m7 se-20140210
P4 m900 m7 se-20140210KADEQUI
 
ASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardLow Hong Chuan
 
Windows Hardware Configuration
Windows Hardware ConfigurationWindows Hardware Configuration
Windows Hardware Configurationadc666
 
1I386H
1I386H1I386H
1I386HCH Yeh
 
Ubuntu installation dual boot with windows 8
Ubuntu installation  dual boot with windows 8Ubuntu installation  dual boot with windows 8
Ubuntu installation dual boot with windows 8Ankit Jain
 
Herný zážitok naplno
Herný zážitok naplnoHerný zážitok naplno
Herný zážitok naplnoPetkaHuskova
 
T22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteT22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteiranzuhuarte
 

La actualidad más candente (11)

P4 m900 m7 se-20140210
P4 m900 m7 se-20140210P4 m900 m7 se-20140210
P4 m900 m7 se-20140210
 
ASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboard
 
Windows Hardware Configuration
Windows Hardware ConfigurationWindows Hardware Configuration
Windows Hardware Configuration
 
1I386H
1I386H1I386H
1I386H
 
03 bit locker-mod03
03   bit locker-mod0303   bit locker-mod03
03 bit locker-mod03
 
Ubuntu installation dual boot with windows 8
Ubuntu installation  dual boot with windows 8Ubuntu installation  dual boot with windows 8
Ubuntu installation dual boot with windows 8
 
Herný zážitok naplno
Herný zážitok naplnoHerný zážitok naplno
Herný zážitok naplno
 
Manual
ManualManual
Manual
 
Log
LogLog
Log
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
T22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteT22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarte
 

Similar a BitLocker To Go Demo: Encrypt Removable Drives

2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_externalExpert Outsource Pvt Ltd
 
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10Molly Violet
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalIdris Ahmed
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxgomsllhi
 
Mikrotik
MikrotikMikrotik
Mikrotikhzcom
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosQuek Lilian
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesLumension
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220AndrewWright224
 
my Windows 7 info
my Windows 7 infomy Windows 7 info
my Windows 7 infoisky guard
 
ChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadAndrewWright224
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605benavrhm
 
Vlan configuration by amare simachew
Vlan configuration by amare simachewVlan configuration by amare simachew
Vlan configuration by amare simachewAssosa University
 

Similar a BitLocker To Go Demo: Encrypt Removable Drives (20)

2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external
 
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Jftut1.3.7
Jftut1.3.7Jftut1.3.7
Jftut1.3.7
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptx
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it Compares
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADs
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220
 
my Windows 7 info
my Windows 7 infomy Windows 7 info
my Windows 7 info
 
ChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPad
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605
 
Vlan configuration by amare simachew
Vlan configuration by amare simachewVlan configuration by amare simachew
Vlan configuration by amare simachew
 

Más de Zeshan Sattar

CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
IT-Ready UK in Lancashire
IT-Ready UK in LancashireIT-Ready UK in Lancashire
IT-Ready UK in LancashireZeshan Sattar
 
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
UK IT Employment Snapshot Q3 2016
UK IT Employment Snapshot  Q3 2016UK IT Employment Snapshot  Q3 2016
UK IT Employment Snapshot Q3 2016Zeshan Sattar
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipZeshan Sattar
 
From ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaFrom ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaZeshan Sattar
 
CompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesCompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesZeshan Sattar
 
Entry level technology for your college and career minded students
Entry level technology for your college and career minded studentsEntry level technology for your college and career minded students
Entry level technology for your college and career minded studentsZeshan Sattar
 
Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Zeshan Sattar
 
70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam PrepZeshan Sattar
 
Windows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterWindows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterZeshan Sattar
 
MTA Success Story - Zenos
MTA Success Story - ZenosMTA Success Story - Zenos
MTA Success Story - ZenosZeshan Sattar
 
Welcome to Windows 8
Welcome to Windows 8 Welcome to Windows 8
Welcome to Windows 8 Zeshan Sattar
 
Games in the classroom
Games in the classroomGames in the classroom
Games in the classroomZeshan Sattar
 

Más de Zeshan Sattar (18)

CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
IT-Ready UK in Lancashire
IT-Ready UK in LancashireIT-Ready UK in Lancashire
IT-Ready UK in Lancashire
 
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
UK IT Employment Snapshot Q3 2016
UK IT Employment Snapshot  Q3 2016UK IT Employment Snapshot  Q3 2016
UK IT Employment Snapshot Q3 2016
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeship
 
From ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaFrom ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training Ninja
 
CompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesCompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital Industries
 
Entry level technology for your college and career minded students
Entry level technology for your college and career minded studentsEntry level technology for your college and career minded students
Entry level technology for your college and career minded students
 
Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)
 
70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep
 
Introducing the MTA
Introducing the MTAIntroducing the MTA
Introducing the MTA
 
Windows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterWindows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture Poster
 
MTA Success Story - Zenos
MTA Success Story - ZenosMTA Success Story - Zenos
MTA Success Story - Zenos
 
Welcome to Windows 8
Welcome to Windows 8 Welcome to Windows 8
Welcome to Windows 8
 
Games in the classroom
Games in the classroomGames in the classroom
Games in the classroom
 
MTA Case Study
MTA Case StudyMTA Case Study
MTA Case Study
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Último (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

BitLocker To Go Demo: Encrypt Removable Drives

  • 2. What is BitLocker To Go? Builds on top of BitLocker introduced in Vista Protects removable storage devices with full-disk encryption Compatible with both FAT and NTFS Available only in Win 7 Enterprise & Ultimate Can be read in down-level Windows versions Works independently from BitLocker and does not require TPM
  • 5. Recovery Key BitLocker Drive Encryption Recovery Key  The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: EBC06BD0-D667-4D Full recovery key identification: EBC06BD0-D667-4D17-B87C-1B6ECB22CF03 BitLockerRecovery Key: 495330-143814-194315-013354-713449-217866-573738-034298
  • 7. Accessing a BitLocker To Go Drive
  • 11. BitLocker To Go Reader

Notas del editor

  1. The BitLocker Drive Encryption wizard will start up in a separate window. After a moment's pause, you'll be asked to choose between password- and smartcard-based locking. Most individuals will need to use a password, but many businesses are starting to use smartcards, which allow administrators to centrally manage BitLocker certificates in Active Directory. Smartcards provide two-factor authentication: In addition to the physical card requirement, the user will still need to type in a four-digit PIN.In the next step of the wizard, you are asked how you would like to store your recovery key. (Assuming this hasn't been already configured in a managed AD environment.) This key will help you recover the contents of a protected drive should you forget your password, lose your smartcard, or suffer some similar problem. You have two choices: Save (to a text file) or print.
  2. If you do choose to print or save the recovery key, you'll see something like this.
  3. Warning: Disk encryption is still an agonizingly slow process. It takes BitLocker To Go over 20 minutes to encrypt a 2 GB USB memory stick device, for example. I recently encrypted a 320 GB USB hard drive using BitLocker To Go, which isn't recommended: It literally took all of a work day, or several long hours.Tip: As suggested by the BitLocker Drive Encryption wizard, you can pause encryption if you need to remove the device for some reason. If you don't do so, you could damage or lose files stored on the device.
  4. Once BitLocker To Go is installed on a storage device, you can configure it in various ways. If you right-click a protected device in Explorer, a new "Manage BitLocker" option appears in the pop-up menu, replacing "Turn on BitLocker." (You can also access this functionality from the BitLocker Drive Encryption control panel, of course.) The resulting dialog provides a number of options, including ways to change and remove the device's password, remove a smart card (if one is configured), add a smart card, re-save or print the recovery key, and automatically unlock the drive on the current PC.
  5. BitLocker in Windows 7 introduces several new Group Policy settings that permit easy management of features. For example, administrators will be able to:Require all removable drives be BitLocker-protected before data can be saved on them.Require or disallow specific methods for unlocking BitLocker-protected drives. Configure methods to recover data from BitLocker-protected drives if the user’s unlock credentials are not available.BitLocker Group Policy settings can be viewed using either the Local Group Policy Editor or the Group Policy Management Console. Using these policies helps enforce standard deployment of BitLocker Drive Encryption in your organization. In Exercise 2 you will enable the “Deny write access to removable drives not protected by BitLocker” policy setting and go through the process of use a flash drive to validate the process a standard user would go through when this policy is in use.
  6. BitLocker To Go-protected devices work identically on all Windows 7 systems. But how does this feature work on "downlevel" Windows XP and Vista PCs? For these systems, Microsoft provides a BitLocker Reader application on the encrypted device, allowing users to access the stored files. There is one huge limitation to BitLocker Reader, however: It is read-only. So after you've provided the password to unlock the drive, you can view files and copy them to your PC hard drive. But you cannot save files back to the device. Hey, it's better than nothing.