Bitlocker vs. EFS: https://www.howtogeek.com/236719/whats-the-difference-between-bitlocker-and-efs-encrypting-file-system-on-windows/
Auto Unlock: https://petri.com/how-to-configure-bitlocker-auto-unlock
Keep in mind that if enabled, and using the password option, you will not be able to access the PC via RDP if it is rebooted.
Bitlocker has been available since Windows Vista but only in Professional and Enterprise versions.
manage-bde -status manage-bde -protectors -get e: Get-BitLockerVolume Get-BitlockerVolume -MountPoint "E:"
These commands will allow you to specify a startup key on most any drive, not just USB drives.
The -usedspaceonly
switch is needed for thinly provisioned storage.
Add protectors and encrypt drive C:
manage-bde -protectors -add C: -recoverypassword -password -startupkey E: manage-bde -status manage-bde -on C: -usedspaceonly
Delete a protector:
manage-bde -protectors -delete c: -id {Protector-ID}
When enabling Bitlocker it will check to see if your computer has TPM. If not, it will throw a message that you can use Bitlocker without it but need to change a Local Group Policy.
gpedit.msc
and press Enter to start the Local Group Policy Editor.You may want to change the password that unlocks your hard drive for various reasons. If you know the current password you can change it. A minimum of 8 characters is required and a mixture of upper case, lower case, numeric and special characters is recommended.
DO NOT FORGET YOUR NEW PASSWORD.
Install Bitlocker Feature: https://abouconde.com/2019/05/20/encrypt-drives-with-bitlocker-on-windows-server-2019/
Enable FIPS Compliance Policy: https://blogs.oracle.com/cloud-infrastructure/windows-server-fips-compliance-v2
Video Howto: https://www.youtube.com/watch?v=Ujac3q_yBrc
adsiedit.msc
to delete keys from AD if they are no longer needed.
Group Policy Settings: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings
https://theitbros.com/config-active-directory-store-bitlocker-recovery-keys/
https://www.rootusers.com/deploy-bitlocker-without-a-trusted-platform-module-tpm/
Import-module ActiveDirectory Get-ADObject -SearchBase ((GET-ADRootDSE).SchemaNamingContext) -Filter {Name -like 'ms-FVE-*'} Get-ADComputer 'some-computer-name'| Get-ADObject -properties * | Select-Object distinguishedname, msFVE-REcoveryPassword, whencreated