SlideShare uma empresa Scribd logo
1 de 11
BitLocker To Go Demo
What is BitLocker To Go? Builds on top of BitLocker introduced in Vista Protects removable storage devices with full-disk encryption Compatible with both FAT and NTFS  Available only in Win 7 Enterprise & Ultimate Can be read in down-level Windows versions Works independently from BitLocker and does not require TPM
Turning on BitLocker To Go
Drive Security
Recovery Key BitLocker Drive Encryption Recovery Key  The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: EBC06BD0-D667-4D Full recovery key identification: EBC06BD0-D667-4D17-B87C-1B6ECB22CF03 BitLockerRecovery Key: 495330-143814-194315-013354-713449-217866-573738-034298
Encrypt a Drive
Accessing a BitLocker To Go Drive
Drive Options
Decrypt a Drive
Group Policy
BitLocker To Go Reader

Mais conteúdo relacionado

Mais procurados

P4 m900 m7 se-20140210
P4 m900 m7 se-20140210P4 m900 m7 se-20140210
P4 m900 m7 se-20140210KADEQUI
 
ASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardLow Hong Chuan
 
Windows Hardware Configuration
Windows Hardware ConfigurationWindows Hardware Configuration
Windows Hardware Configurationadc666
 
1I386H
1I386H1I386H
1I386HCH Yeh
 
Ubuntu installation dual boot with windows 8
Ubuntu installation  dual boot with windows 8Ubuntu installation  dual boot with windows 8
Ubuntu installation dual boot with windows 8Ankit Jain
 
Herný zážitok naplno
Herný zážitok naplnoHerný zážitok naplno
Herný zážitok naplnoPetkaHuskova
 
T22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteT22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteiranzuhuarte
 

Mais procurados (11)

P4 m900 m7 se-20140210
P4 m900 m7 se-20140210P4 m900 m7 se-20140210
P4 m900 m7 se-20140210
 
ASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboardASUS ROG X299 Series motherboard
ASUS ROG X299 Series motherboard
 
Windows Hardware Configuration
Windows Hardware ConfigurationWindows Hardware Configuration
Windows Hardware Configuration
 
1I386H
1I386H1I386H
1I386H
 
03 bit locker-mod03
03   bit locker-mod0303   bit locker-mod03
03 bit locker-mod03
 
Ubuntu installation dual boot with windows 8
Ubuntu installation  dual boot with windows 8Ubuntu installation  dual boot with windows 8
Ubuntu installation dual boot with windows 8
 
Herný zážitok naplno
Herný zážitok naplnoHerný zážitok naplno
Herný zážitok naplno
 
Manual
ManualManual
Manual
 
Log
LogLog
Log
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
T22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarteT22 imgmothercaract iranzuhuarte
T22 imgmothercaract iranzuhuarte
 

Semelhante a BitlockerToGo

2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_externalExpert Outsource Pvt Ltd
 
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10Molly Violet
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalIdris Ahmed
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxgomsllhi
 
Mikrotik
MikrotikMikrotik
Mikrotikhzcom
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosQuek Lilian
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesLumension
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220AndrewWright224
 
my Windows 7 info
my Windows 7 infomy Windows 7 info
my Windows 7 infoisky guard
 
ChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadAndrewWright224
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605benavrhm
 
Vlan configuration by amare simachew
Vlan configuration by amare simachewVlan configuration by amare simachew
Vlan configuration by amare simachewAssosa University
 

Semelhante a BitlockerToGo (20)

2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external2569 protect yourdatawithbitlocker_gs_windows7_external
2569 protect yourdatawithbitlocker_gs_windows7_external
 
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10How to Lock/Unlock BitLocker Drive without Restarting Windows 10
How to Lock/Unlock BitLocker Drive without Restarting Windows 10
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Jftut1.3.7
Jftut1.3.7Jftut1.3.7
Jftut1.3.7
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
 
bitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptxbitlocker requirement and implementation.pptx
bitlocker requirement and implementation.pptx
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it Compares
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADs
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220ChromePad - Chromium OS ThinkPad X220
ChromePad - Chromium OS ThinkPad X220
 
my Windows 7 info
my Windows 7 infomy Windows 7 info
my Windows 7 info
 
ChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPadChromePad - Chromium OS for ThinkPad
ChromePad - Chromium OS for ThinkPad
 
Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605Tkos secure boot_lecture_20190605
Tkos secure boot_lecture_20190605
 
Vlan configuration by amare simachew
Vlan configuration by amare simachewVlan configuration by amare simachew
Vlan configuration by amare simachew
 

Mais de Zeshan Sattar

CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondZeshan Sattar
 
IT-Ready UK in Lancashire
IT-Ready UK in LancashireIT-Ready UK in Lancashire
IT-Ready UK in LancashireZeshan Sattar
 
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
UK IT Employment Snapshot Q3 2016
UK IT Employment Snapshot  Q3 2016UK IT Employment Snapshot  Q3 2016
UK IT Employment Snapshot Q3 2016Zeshan Sattar
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipZeshan Sattar
 
From ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaFrom ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaZeshan Sattar
 
CompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesCompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesZeshan Sattar
 
Entry level technology for your college and career minded students
Entry level technology for your college and career minded studentsEntry level technology for your college and career minded students
Entry level technology for your college and career minded studentsZeshan Sattar
 
Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Zeshan Sattar
 
70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam PrepZeshan Sattar
 
Windows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterWindows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterZeshan Sattar
 
MTA Success Story - Zenos
MTA Success Story - ZenosMTA Success Story - Zenos
MTA Success Story - ZenosZeshan Sattar
 
Welcome to Windows 8
Welcome to Windows 8 Welcome to Windows 8
Welcome to Windows 8 Zeshan Sattar
 
Games in the classroom
Games in the classroomGames in the classroom
Games in the classroomZeshan Sattar
 

Mais de Zeshan Sattar (18)

CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
IT-Ready UK in Lancashire
IT-Ready UK in LancashireIT-Ready UK in Lancashire
IT-Ready UK in Lancashire
 
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
UK IT Employment Snapshot Q3 2016
UK IT Employment Snapshot  Q3 2016UK IT Employment Snapshot  Q3 2016
UK IT Employment Snapshot Q3 2016
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeship
 
From ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training NinjaFrom ICT Teacher to an IT Training Ninja
From ICT Teacher to an IT Training Ninja
 
CompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital IndustriesCompTIA presents Career Pathways in the Digital Industries
CompTIA presents Career Pathways in the Digital Industries
 
Entry level technology for your college and career minded students
Entry level technology for your college and career minded studentsEntry level technology for your college and career minded students
Entry level technology for your college and career minded students
 
Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)Voice Activation for Remote Robotics (2004)
Voice Activation for Remote Robotics (2004)
 
70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep70-689 - Windows 8 MCSA MMS Exam Prep
70-689 - Windows 8 MCSA MMS Exam Prep
 
Introducing the MTA
Introducing the MTAIntroducing the MTA
Introducing the MTA
 
Windows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture PosterWindows Server “8” Beta Hyper-V Component Architecture Poster
Windows Server “8” Beta Hyper-V Component Architecture Poster
 
MTA Success Story - Zenos
MTA Success Story - ZenosMTA Success Story - Zenos
MTA Success Story - Zenos
 
Welcome to Windows 8
Welcome to Windows 8 Welcome to Windows 8
Welcome to Windows 8
 
Games in the classroom
Games in the classroomGames in the classroom
Games in the classroom
 
MTA Case Study
MTA Case StudyMTA Case Study
MTA Case Study
 

Último

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

BitlockerToGo

  • 2. What is BitLocker To Go? Builds on top of BitLocker introduced in Vista Protects removable storage devices with full-disk encryption Compatible with both FAT and NTFS Available only in Win 7 Enterprise & Ultimate Can be read in down-level Windows versions Works independently from BitLocker and does not require TPM
  • 5. Recovery Key BitLocker Drive Encryption Recovery Key  The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: EBC06BD0-D667-4D Full recovery key identification: EBC06BD0-D667-4D17-B87C-1B6ECB22CF03 BitLockerRecovery Key: 495330-143814-194315-013354-713449-217866-573738-034298
  • 7. Accessing a BitLocker To Go Drive
  • 11. BitLocker To Go Reader

Notas do Editor

  1. The BitLocker Drive Encryption wizard will start up in a separate window. After a moment's pause, you'll be asked to choose between password- and smartcard-based locking. Most individuals will need to use a password, but many businesses are starting to use smartcards, which allow administrators to centrally manage BitLocker certificates in Active Directory. Smartcards provide two-factor authentication: In addition to the physical card requirement, the user will still need to type in a four-digit PIN.In the next step of the wizard, you are asked how you would like to store your recovery key. (Assuming this hasn't been already configured in a managed AD environment.) This key will help you recover the contents of a protected drive should you forget your password, lose your smartcard, or suffer some similar problem. You have two choices: Save (to a text file) or print.
  2. If you do choose to print or save the recovery key, you'll see something like this.
  3. Warning: Disk encryption is still an agonizingly slow process. It takes BitLocker To Go over 20 minutes to encrypt a 2 GB USB memory stick device, for example. I recently encrypted a 320 GB USB hard drive using BitLocker To Go, which isn't recommended: It literally took all of a work day, or several long hours.Tip: As suggested by the BitLocker Drive Encryption wizard, you can pause encryption if you need to remove the device for some reason. If you don't do so, you could damage or lose files stored on the device.
  4. Once BitLocker To Go is installed on a storage device, you can configure it in various ways. If you right-click a protected device in Explorer, a new "Manage BitLocker" option appears in the pop-up menu, replacing "Turn on BitLocker." (You can also access this functionality from the BitLocker Drive Encryption control panel, of course.) The resulting dialog provides a number of options, including ways to change and remove the device's password, remove a smart card (if one is configured), add a smart card, re-save or print the recovery key, and automatically unlock the drive on the current PC.
  5. BitLocker in Windows 7 introduces several new Group Policy settings that permit easy management of features. For example, administrators will be able to:Require all removable drives be BitLocker-protected before data can be saved on them.Require or disallow specific methods for unlocking BitLocker-protected drives. Configure methods to recover data from BitLocker-protected drives if the user’s unlock credentials are not available.BitLocker Group Policy settings can be viewed using either the Local Group Policy Editor or the Group Policy Management Console. Using these policies helps enforce standard deployment of BitLocker Drive Encryption in your organization. In Exercise 2 you will enable the “Deny write access to removable drives not protected by BitLocker” policy setting and go through the process of use a flash drive to validate the process a standard user would go through when this policy is in use.
  6. BitLocker To Go-protected devices work identically on all Windows 7 systems. But how does this feature work on "downlevel" Windows XP and Vista PCs? For these systems, Microsoft provides a BitLocker Reader application on the encrypted device, allowing users to access the stored files. There is one huge limitation to BitLocker Reader, however: It is read-only. So after you've provided the password to unlock the drive, you can view files and copy them to your PC hard drive. But you cannot save files back to the device. Hey, it's better than nothing.