![]() BitLocker also has different system requirements based on the version of the operating system you’re running, and some features don’t work unless you have the right hardware set up in a particular way, so using BitLocker in an enterprise full of disparate hardware can get messy.īut overall, it’s a strong product for encrypting an entire drive, and Microsoft is continuing to keep it relevant by adding new features and better security. It’s a shame it’s not available on all versions of Windows. It’s particularly useful for people with laptops containing sensitive or important documents. Final verdictīitLocker is a relatively simple way to encrypt an entire volume on Windows, keeping your files safe even if your computer falls into the wrong hands. It’s free to use, you can view all the source code, and it’s available for macOS and Linux, too, not just Windows. VeraCrypt is arguably the best open-source alternative to BitLocker. If this is a concern, open-source volume encryption software exists. Microsoft denies there’s an intentional built-in backdoor in BitLocker, though there is proof that the UK Home Office at least attempted to get Microsoft to introduce one in 2006. The competitionĪ common concern about BitLocker is that it’s proprietary software, so it's not possible to test whether Microsoft has included a secret backdoor for law enforcement and governments. A note on the website suggests longer wait times at this time are caused by COVID-19. In our testing of the live chat support from Microsoft, we found the wait time to be an average of 15 minutes, but sometimes up to an hour. Business users have the option of calling the Microsoft technical support line in most countries. Modifies the startup key for an operating system drive.ĭisplays brief Help at the command prompt.ĭisplays complete Help at the command prompt.Microsoft support was able to quickly answer our simple query on BitLocker (Image credit: Microsoft) Supportįor home users, support for Microsoft products including BitLocker is available via live chat and community forums only. Select Use a Password to Unlock the Drive. You’re asked to choose how you want to unlock this drive. Turning on BitLocker for a removable drive. Click the Turn on BitLocker button for that drive. Modifies the PIN for an operating system drive. In the BitLocker Drive Encryption window, find the removable drive that you want to encrypt and click it. When the computer restarts, only a recovery password or recovery key can be used to unlock the drive. BitLocker consists of agent initialization, robust disk encryption algorithms, and does a good job with reporting on compliance. ![]() It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection. This command deletes all TPM-related key protectors from the drive. Microsoft BitLocker is very intuitive and easy to maintain. ![]() Sets the drive identifier field on the drive to the value specified in the Provide the unique identifiers for your organization Group Policy setting.įorces a BitLocker-protected drive into recovery mode on restart. To manage the TPM on these computers, use either the TPM Management MMC snap-in or the TPM Management cmdlets for Windows PowerShell. This command isn't supported on computers running Windows 8 or win8_server_2. Manages protection methods for the encryption key.Ĭonfigures the computer's Trusted Platform Module (TPM). Manages automatic unlocking of data drives. Prevents access to BitLocker-protected data.Īllows access to BitLocker-protected data with a recovery password or a recovery key. All key protectors are removed when decryption is complete. Provides information about all drives on the computer, whether or not they are BitLocker-protected.Įncrypts the drive and turns on BitLocker.ĭecrypts the drive and turns off BitLocker. This command-line tool can be used in place of the BitLocker Drive Encryption Control Panel item. ![]()
0 Comments
Leave a Reply. |