![]() ![]() ![]() These fields are defined by your organization’s group policy. Deny write access to devices configured in another organization–When checked, only drives with identification fields matching the computer's identification fields are granted write access.Use AES-CBC 128-bit or AES-CBC 256-bit if the drive is used in devices not running Windows 10, version 1511. Encryption for removable drives–Select the encryption algorithm and key cipher strength for removable drives. ![]() Removable drives encryption–Enable to require all removable drives to be encrypted before write access is given.48-digit recovery password–Select whether users are allowed, required, or not allowed to generate a 48-digit recovery password.Fixed drives recovery options–Enable to set options for users to recover data from fixed drives protected by BitLocker.Encryption for fixed drives–Select the encryption method and key cipher strength for fixed drives.Fixed drives encryption–Enable to require fixed drives be encrypted before write access is granted.Don't enable BitLocker until recovery information is stored in Active Directory–Check the box to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to Active Directory succeeds.You can select either the Backup recovery password and key package or the Backup recovery password only. Save BitLocker recovery information to Active Directory Domain Services–When checked, you can choose which BitLocker recovery information to store in Active Directory.Hide recovery options from BitLocker setup wizard–Check the box to prevent users from specifying recovery options when they turn on BitLocker.256-bit recovery key–Select whether users are allowed, required, or not allowed to generate a 256-bit recovery key.Specify 48-digit recovery password–Select whether users are allowed, required, or not allowed to generate a 48-digit recovery password.When allowed, these individuals can use their PKI credentials to unlock drives protected by BitLocker. Allow data recovery agent–Data recovery agents are individuals whose public key infrastructure (PKI) certificates are used to create a BitLocker key protector.System drives recovery options–Enable to set options for users to recover data from operating system drives protected by BitLocker.Pre-boot recovery options–Enable to set the recovery message or customize the URL provided on the pre-boot key recovery screen when the operating system drive is locked.TPM startup key and PIN–You can require both a startup key and a PIN.When this USB key is inserted into the device, access to the drive is authenticated and the drive is accessible. A startup key is a USB key with the information to encrypt the drive. TPM startup key–You can require users to authenticate with a TPM startup key to access a drive.You can also configure the minimum PIN length. TPM startup PIN–You can require a 6-digit to 20-digit PIN to be entered before startup.Configure TPM startup without a PIN or key–You can require TPM as startup authentication instead of a PIN or key.Allow BitLocker without a compatible TPM–Check the box to require either a password or a USB drive is required for startup.Additional startup authentication–Select whether BitLocker requires additional authentication each time the computer starts and specify if you’re using a Trusted Platform Module (TPM).Encryption option for system drives–Select the encryption method and the cipher strength of the key for operating system drives. ![]()
0 Comments
Leave a Reply. |