Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 28 February 2012

Examining BitLocker’s Drive Encryption

Posted on 08:49 by Unknown
BitLocker was first introduced with the release of Windows Vista. Since entering the Windows Server 2008 family of operating systems, Microsoft has continued to improve BitLocker by adding new features, for example: support for data volumes, smart card certificates, data recovery agents, USB flash drives, a new RSAT BitLocker interface, and so on.

Understanding Its Benefits
By using BitLocker in conjunction with Windows Server 2008 R2, an organization can enjoy a number of benefits:

. Prevention of unauthorized access to data at rest, which is located on Windows managed system volumes, data volumes, and USB flash drives.

. Support for integrity checking of early boot components using Trusted Platform Module (TPM) to ensure that a machine has not been tampered with and that encrypted materials are located on the original machine.

. Protection against cold boot attacks by requiring an interactive form of authentication (including a PIN or a USB key) in addition to the presence of the TPM hardware before a machine will boot or resume from hibernation.

. Support for escrow of BitLocker recovery materials in Active Directory.

. A streamlined recovery process, which can be delegated to non-Domain Administrators.

. Windows Server 2008 R2 and Windows 7 automatically creates the necessary BitLocker disk partitions during installation.

. Support for BitLocker protection on USB flash drives. This feature is called BitLocker To Go.

. Lastly, support for Data Recovery Agent (DRA) support so that authorized IT administrators will always have access to BitLocker protected volumes.


Understanding TPM
The term Trusted Platform Module (TPM) is used to refer to both the name of a published specification by the Trusted Computing Group for a secure cryptoprocessor and the implementation
of that specification in the form of a TPM chip. A TPM chip’s main purpose in life is the secure generation of cryptographic keys, the protection of those keys, and the ability to act as a hardware pseudo-random number generator. In addition, a TPM chip can also provide remote attestation and sealed storage. Remote attestation is a feature in which a hash key summary is created based on a machine’s current hardware and software configuration. Typically, remote attestation is used by third-party applications such as BitLocker to ensure a machine’s state has not been tampered with. Sealed storage is used to encrypt data such that it may only be decrypted once the TPM chip releases the appropriate decryption key. This release is only done by TPM chip once the required authenticator for that data has been provided. Lastly, a TPM chip can also be used to authenticate hardware devices.

In BitLocker, a TPM chip is used to protect the encryption keys and provide integrity authentication for a trusted boot pathway (that is, BIOS, boot sector, and so on). This type of TPM-supported protection is only performed when BitLocker is in either Transparent Operation mode or User Authentication mode. When in either of these modes, BitLocker uses the TPM chip to detect if there are unauthorized changes to the preboot environment (trusted boot pathway protection) such as the BIOS and MBR. If unauthorized changes were made, BitLocker will then request that a recovery key be provided before the Volume Master Key can be decrypted and bootup of the machine can continue.

Source of Information : Sams - Windows Server 2008 R2 Unleashed
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows Server 2008 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ▼  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ▼  February (8)
      • Examining BitLocker’s Drive Encryption
      • Understanding BitLocker Drive Encryption
      • Limitations Associated with Windows Server 2008 R2...
      • Examining Prerequisite Tasks When Deploying an RODC
      • Understanding When to Leverage RODCs
      • Organizations’ Branch Office Concerns and Dilemmas
      • Understanding Read-Only Domain Controllers (RODCs)
      • Optimizing Windows Server 2008 R2 for Branch Offic...
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ►  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile