{"id":945,"date":"2013-11-06T15:57:02","date_gmt":"2013-11-06T21:57:02","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=945"},"modified":"2015-04-27T08:29:52","modified_gmt":"2015-04-27T13:29:52","slug":"contd-encrypting-your-hard-drive-using-bitlocker-drive-encryption","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/contd-encrypting-your-hard-drive-using-bitlocker-drive-encryption\/","title":{"rendered":"Encrypt Hard Drives Using BitLocker Drive Encryption-Cont&#8217;d"},"content":{"rendered":"<p>\n\t<span style=\"font-size:18px;\">Part 2<\/span>\u2026\n<\/p>\n<p>\n\tFrom previous experience I can tell you that this operation can take several hours if your hard drive contains a lot of data, so make sure that the laptop stays on until the encryption is complete. Upon finishing the operation, you will receive the following message:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/07-BitLocker-Encryption-Finished.jpg\"><img loading=\"lazy\" decoding=\"async\" alt=\"BitLocker Encryption Finished\" class=\"alignnone size-full wp-image-921\" height=\"173\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/07-BitLocker-Encryption-Finished.jpg\" width=\"361\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/07-BitLocker-Encryption-Finished.jpg 361w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/07-BitLocker-Encryption-Finished-300x143.jpg 300w\" sizes=\"auto, (max-width: 361px) 100vw, 361px\"><\/a>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\tIf you are encrypting a system partition like I did, then every time your computer is started, an authentication password will be required prior to the OS loading screen.\n<\/p>\n<p>\n\tBitLocker is the most effective way to protect your information in case of theft. The encryption mechanism used with this protection feature is AES (Advanced Encryption Standard). AES is a<strong> s<\/strong>ymmetric-key algorithm which basically means that the same cryptographic key is used for both encryption and decryption. The algorithm was developed in 2001 as an enhanced encryption algorithm which is widely used today in different technologies.\n<\/p>\n<p>\n\tBy default, the OS will encrypt information stored on the hard drive using a 128 bit encryption key. If you haven\u2019t changed any policy regarding the BitLocker encryption key then this version will be used. Windows supports also a 256 encryption key when using AES for BitLocker, this feature can be enabled from local group policy console (<em>gpedit.msc<\/em>). Navigate to <em>Computer Configuration\/Administrative Templates\/Windows Components\/BitLocker Drive Encryption <\/em>and open the <em>Choose drive encryption method and cipher strength <\/em>policy. There can be two policies with the same name, one compatible with Windows 8 and Windows Server 2012 and another one compatible with older versions of Windows. Remember that this policy has no effect if you apply it to an already encrypted hard drive or when the encryption is running. If you want to use a 256 encryption key, enable this policy prior to turning on BitLocker:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/08-Encryption-Method-Cypher-Strength.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Encryption Method-Cypher Strength\" class=\"alignnone size-full wp-image-922\" height=\"640\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/08-Encryption-Method-Cypher-Strength.jpg\" style=\"border: 6px solid LightSteelBlue;\" title=\"\" width=\"698\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/08-Encryption-Method-Cypher-Strength.jpg 698w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/08-Encryption-Method-Cypher-Strength-300x275.jpg 300w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\"><\/a>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\tBy using a 256 bit key, the encryption mechanism is enhanced and your device becomes even more secure.\n<\/p>\n<p>\n\tIf BitLocker is enabled inside a private domain that is using an Active Directory infrastructure it is recommended that you store the recovery information within AD. The only requirement for this feature to is to enable the <em>Store BitLocker recovery information in Active Directory Domain Services<\/em> policy. You can select to store either <em>Recovery passwords and key packages<\/em> or <em>Recovery passwords only<\/em>:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/09-BitLocker-Recovery-Information.jpg\"><img loading=\"lazy\" decoding=\"async\" alt=\"BitLocker Recovery Information\" class=\"alignnone size-full wp-image-923\" height=\"640\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/09-BitLocker-Recovery-Information.jpg\" width=\"697\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/09-BitLocker-Recovery-Information.jpg 697w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/09-BitLocker-Recovery-Information-300x275.jpg 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\"><\/a>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\tIf you are not using an Active Directory Infrastructure then you can create a default password repository by enabling the <em>Choose default folder for recovery password<\/em> policy. This policy will not prevent the user from storing the recovery key in another folder but it will be used by default by all systems where this policy is applied. There are multiple policies available in this section like providing a unique identifier for your organization that will be used with each encrypted device or prevent memory overwrite on restart. I like that BitLocker supports a lot of features and policies. You can explore each of these policies in <em>Fixed Data Drives<\/em>, <em>Operating System Drives<\/em> and <em>Removable Data Drives<\/em> sections.\n<\/p>\n<p>\n\tWith BitLocker you can also designate users as recovery agents for BitLocker encrypted drives. These recovery agents can decrypt drives using their certificates or public keys. You can add a recovery agent from group policy. Navigate to <em>Computer Configuration\/Windows Settings\/Security Settings\/BitLocker Drive Encryption<\/em>, right click and select <em>Add Data Recovery Agent<\/em>:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/10-Add-Data-Recovery-Agent.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Add Data Recovery Agent\" class=\"alignnone size-full wp-image-924\" height=\"527\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/10-Add-Data-Recovery-Agent.jpg\" style=\"border: 7px solid LightSteelBlue;\" title=\"\" width=\"915\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/10-Add-Data-Recovery-Agent.jpg 915w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/10-Add-Data-Recovery-Agent-300x172.jpg 300w\" sizes=\"auto, (max-width: 915px) 100vw, 915px\"><\/a>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\tNote that you\u2019ll have to provide a <em>.cer<\/em> certificate for the designated users. If you are using an AD infrastructure than you can select the users directly from the database if the certificates are published in the directory.\n<\/p>\n<p>\n\tAfter BitLocker has been activated on a System drive and the encryption is completed, this is how will the OS partition look like compared to an unencrypted drive:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/11-Encrypted-Drive-Appearance.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Encrypted Drive Appearance\" class=\"alignnone size-full wp-image-925\" height=\"520\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/11-Encrypted-Drive-Appearance.jpg\" style=\"border: 6px solid LightSteelBlue;\" title=\"\" width=\"827\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/11-Encrypted-Drive-Appearance.jpg 827w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/11-Encrypted-Drive-Appearance-300x188.jpg 300w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\"><\/a>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\tI\u2019ve read from different sources that BitLocker can increase your resource utilization when it\u2019s enabled. Personally, I\u2019ve enabled this feature on all my portable devices and not one had high usage because of BitLocker. I\u2019ve encrypted drives that were almost full and didn\u2019t have any issues with them. This laptop has an I5 CPU M430 @2.27 Ghz with 4 GB of RAM and this is how the usage graphics look:\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/12-BitLocker-Drive-in-Task-Manager.jpg\"><img loading=\"lazy\" decoding=\"async\" alt=\"BitLocker Drive in Task Ma\" class=\"alignnone size-full wp-image-926\" height=\"633\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/12-BitLocker-Drive-in-Task-Manager.jpg\" width=\"718\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/12-BitLocker-Drive-in-Task-Manager.jpg 718w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/12-BitLocker-Drive-in-Task-Manager-300x264.jpg 300w\" sizes=\"auto, (max-width: 718px) 100vw, 718px\"><\/a>\n<\/p>\n<p>\n\tPersonally I think that BitLocker is one of the greatest security features Windows can offer. If you have a different opinion please add a comment and share your thoughts. I hope this article was informative and has helped you.\n<\/p>\n<p>\n\tP.S. If you have any ideas about articles that you\u2019d like to see on our website please send us an email at\u2026 support@poweradmin.com, or simply leave a comment below.\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20Encyrpting%20Your%20Hard%20Drive%20Using%20BitLocker%20Drive%20Encryption%20http:\/\/www.poweradmin.com\/blog\/encrypting-your-hard-drive-using-bitlocker-drive-encryption\/?ref=blog\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Tweet this\" class=\"aligncenter size-medium wp-image-1028\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" style=\"\" title=\"\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/plus.google.com\/share?url={\/blog\/encrypting-your-hard-drive-using-bitlocker-drive-encryption\/?ref=blog}\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Share on Google+\" class=\"aligncenter size-medium wp-image-1053\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" style=\"\" title=\"\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part 2\u2026 From previous experience I can tell you that this operation can take several hours if your hard drive contains a lot of data, so make sure that the laptop stays on until the encryption is complete. Upon finishing the operation, you will receive the following message: \u00a0 If you are encrypting a system [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,9,8],"tags":[],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-general-it","category-how-to","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=945"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/945\/revisions"}],"predecessor-version":[{"id":3569,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/945\/revisions\/3569"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}