Windows 2003 Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 9 September 2007

What is BitLocker? How does it work?

Posted on 11:00 by Unknown
BitLocker

Windows BitLocker Drive Encryption is a data protection feature available in Windows Vista Enterprise and Windows Vista Ultimate for client computers and in Windows Server 2008. BitLocker provides enhanced protection against data theft or exposure on computers that are lost or stolen, and more secure data deletion when BitLocker-protected computers are decommissioned.

Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software attack tool against it or by transferring the computer’s hard disk to a different computer. BitLocker helps mitigate unauthorized data access on lost or stolen computers by combining two major data-protection procedures:
•
Encrypting the entire Windows operating system volume on the hard disk. BitLocker encrypts all user files and system files in the operating system volume, including the swap and hibernation files.
•
Checking the integrity of early boot components and boot configuration data. On computers that have a Trusted Platform Module (TPM) version 1.2, BitLocker leverages the enhanced security capabilities of the TPM to help ensure that your data is accessible only if the computer’s boot components appear unaltered and the encrypted disk is located in the original computer. If you enable BitLocker on a computer that has a TPM version 1.2, you can add a second factor of authentication to the TPM protection. BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN) or inserts a USB device (such as a flash drive) that contains a BitLocker startup key. These additional security measures provide multifactor authentication and helps ensure that the computer will not start or resume from hibernation until the correct PIN or startup key is presented.
BitLocker is tightly integrated into Windows Server and provides enterprises with enhanced data protection that is easy to manage and configure. For example, BitLocker can use an existing Microsoft Active Directory Domain Services (AD DS) infrastructure to remotely store BitLocker recovery keys. BitLocker also provides a recovery console that enables data retrieval for non-domain-joined computers or computers that are unable to connect the domain (for example, computers in the field).
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Active Directory Inside Out 10 Hrs of CBT
    TechNet Webcast: Active Directory Fundamentals—Level 200 Event Overview Do you want to get a better understanding of the basic concep...
  • What are Preliminary AD DS Installation Steps and what all commands are available to upgrade the Forest schema to accept Windows server 2008?
    For new Forest: . Strong password. . Correct Network settings. . Latest Security updates. For Existing Forest: . Extend Schema using adprep...
  • How are Fine grained password Policies are stored in Windows server 2008? What are different objects associated with it?
    To store fine-grained password policies, Windows Server 2008 includes two new object classes in the Active Directory Domain Services schema:...
  • What is Well known Security principal?
    Well-Known Security Principals The term well-known security principal refers to fixed accounts that are somewhat like users or groups. Howev...
  • What is access token and how it is used?
    Access Tokens An access token describes the security context of a process. When the process tries to perform various operations in the compu...
  • Steps to create a Clone of Domain Controller in Windows 2012
    1) Make sure your hypervisor generates VM-Generation-ID.  2) Make sure your PDC FSMO runs on Windows 2012.             BTW you cannot clon...
  • How is Kerberos used while accessing file share on the network? What is the background processing involved in it?
    When user is already logged onto a domain and wants to access a resource located on a server within the same domain, a network logon process...
  • What are the new features in Windows 2012 Active Directory
    All the new features of Windows 2012 Active Directory are given below. You can use Active Directory Domain Services (AD DS) in Windows Serve...
  • What are the improvements introduced in AD Directory Domain Service Installation wizard?
    Active Directory Domain Services Installation Wizard New Wizard Page Description Additional optio...
  • How do we login in domain and what happens in the background at time of logon
    How does authentication and authoriztion happens in active directory? Everything starts when User presses Ctrl+Alt+Del and User chooses to l...

Categories

  • Active Directory Recycle bin
  • AD replication
  • Advance audit policy settings
  • Advance Audit policy settings in Windows 2008 and Windows 7.
  • Advanced Audit policy settings
  • Burflags registry Key
  • Clone Windows 2012 DC
  • Cloning Domain Controller Windows 2012 Active Directory
  • D2
  • D4
  • DCPROMO
  • domain functional levels
  • Forest functional levels
  • Group Policy preference
  • Group policy preferences in Windows 2008
  • how to rebuild sysvol
  • Journal Wrap
  • Managed service accounts in Windows 2008 R2
  • Metadata cleanup
  • NTLM Blocker
  • NTLM Blocker in Windows 2008
  • Recycle bin and Active Directory
  • Recycle Bin GUI in windows 2012
  • Recycle Bin in Windows 2008 R2
  • Recycle Bin in Windows 2012
  • Rolling back forest functional level of Windows 2008.
  • steps to clone Windows 2012 DC
  • Troubleshooting Journal Wrap
  • Upgrade Windows 2003 domain Controller to Windows 2012 Domain Controller
  • Upgrade Windows 2003 Server to windows 2012 Server
  • Upgrading domain functional level
  • upgrading forest functional level
  • USN rollback
  • Windows 2003 AD upgrade to Windows 2012 AD

Blog Archive

  • ►  2013 (1)
    • ►  January (1)
  • ►  2012 (6)
    • ►  August (1)
    • ►  February (5)
  • ►  2011 (3)
    • ►  March (3)
  • ►  2009 (2)
    • ►  November (1)
    • ►  August (1)
  • ►  2008 (1)
    • ►  May (1)
  • ▼  2007 (28)
    • ►  November (2)
    • ►  October (2)
    • ▼  September (24)
      • What is anonymous authentication and what are the ...
      • What are different group policies related to kerbe...
      • How Kerberos authentication works?
      • Please explain us the NTLM Authentication process?
      • What are new features introduced in Windows 2008 d...
      • What are different Authentication Protocols availa...
      • What are the improvements introduced in AD Directo...
      • What are the improvements introduced in AD Directo...
      • What is Active Directory object quota? How can you...
      • How do you Define the Scope of Fine-Grained Passwo...
      • What is AdminSDHolder Object and how admincount at...
      • How are Fine grained password Policies are stored ...
      • What is Well known Security principal?
      • What is BitLocker? How does it work?
      • What is access token and how it is used?
      • What are Fine-Grained Password Policies in Longhor...
      • What are the new features of Windows server 2008 v...
      • What are the core components of Windows Security S...
      • How is Kerberos used while accessing file share on...
      • How do we login in domain and what happens in the ...
      • What is restartable feature of AD DS?
      • What are Preliminary AD DS Installation Steps and ...
      • What are the events that trigger Urgent Replication?
      • What is prerequisites for deploying an RODC in you...
Powered by Blogger.

About Me

Unknown
View my complete profile