Windows 7 Professional Bitlocker Missing

Автор:

Free BitLocker Manager is a strong and yet simple software for managing Microsoft BitLocker drive encryption and is at your service for free. By the capabilities this software provides for you, you can lock/unlock drives protected by BitLocker.By this software, you can simply manage device when workstation goes locked and/or OS goes to hibernate or sleep mode. Another possibility this software has is the possibility to define a hotkey for showing software and another hotkey for locking all drives.

Free BitLocker Manager is a strong and yet simple software for managing Microsoft BitLocker drive encryption and is at your service for free. By the capabilities this software provides for you, you can lock/unlock drives protected by BitLocker.By this software, you can simply manage device when workstation goes locked and/or OS goes to hibernate or sleep mode. Another possibility this software has is the possibility to define a hotkey for showing software and another hotkey for locking all drives.

Data on this volume is protected by BitLocker. The system volume is the volume that contains the hardware-specific files needed to load Windows 7 computers after the BIOS has booted the platform. For BitLocker to work, the system volume must not be encrypted, must differ from the operating system volume, and must be formatted with NTFS. I have windows 7 professional although it doesn't contain BIT LOCKER option in Control Panel. What can i do to get bit locker it is very.

Hey all,I'm interested in rolling out full drive encryption for most if not all of our laptops. I'm making this post after seeing few search results on here about Windows 7 pro and drive encryption.Hopefully this thread can assist others looking for more drive encryption information.Possible drive encryption methods -Upgrade Windows 7 Pro to Ultimate and roll out bitlocker.Find 3rd party drive encryption utility like TrueCrypt, PGP, etc.With those two options, what's the recommended option?I've seen some grumble about the boot time passwords. To me, in order to maintain full security a preboot password is necessary. I know if I had access to the laptop boot options I could pop in a password reset disc and get access to the local administrator account. I could then logon and have full access to the files.

Am I wrong in that thinking?If the preboot password is not enabled the only thing the encryption is protecting is if the drive is physically removed from the laptop and looked at right?For those of you that aren't using bitlocker, what are you using for drive encryption? How easy was it for you to deploy and use?If you're using boot time passwords, what happens if a user forgets their boot password? Do you have a method of overriding it say with a USB override key or something? Rod7996 wrote:We were looking at full drive encryption, but as I remember with true crypt you would have to have a password reset disk for each machine that you encrypt. We were trying to find something that could be centrally managed with the bonus of being able to reset the password remotely, in cases where the laptop is out of town at a conference.

Otherwise, when out of town, the user, (in this case usually somebody from upper management) would be SOL and I am sure NOT a happy camper. Good luck.That's the exact boat I'm in then. I'm looking for something centrally managed that can accomodate the out of town situations and where every computer doesn't have it's own reset disk.I'm not looking for something free but something that's efficient and not overly complicated. Ian S wrote:Nick-C wrote:+1 for Bitlocker since you are Windows based it makes the most sense as it can all be integrated with AD, plus it is boot time full disk encryption so secures everything rather than just the users folder.Will computers need to be completely reformatted for bitlocker to encrypt the entire drive? Or can bitlocker be enabled on unencrypted drives already in use?Nope, you can enable it from within Windows and it will then reboot and start the initialisation process, read up on it though as you may want to setup some GPO' to control how it works before enabling it, more details can be found in this technet guide. We are using Wave Cloud to centrally manage BitLocker recovery keys. We also have some systems with hardware-based Self Encrypting Drives and it manages them as well.

As a bonus, it can manage Mac FileVault keys too. For Bitlocker, you need Win 7 Ultimate or Enterprise or Win 8 Pro.The SEDs have been very reliable, with very few failures. We've started moving away from them, however. Msn app for mac. Bitlocker is less expensive and on modern hardware, is plenty fast. It also works better with Sleep/Resume than the SEDs.I wouldn't use TrueCrypt unless for a very small # of machines due to lack of key management. People do forget passwords and without a recovery disk, you'll be wiping the machine and restoring from the last good backup.

Depending on the industry you are in, lack of certification with any standards/governing body may be an issue, regardless of how good TrueCrypt actually is. Bryan Doe wrote:If you're talking about more than a few laptops, I'd be inclined to use something with central management. We're using PGP, and since I can tie it to Active Directory, it's been pretty painless.

There is a boot password, but SSO lets PGP pass the credentials to Windows so it automatically logs in. They have to type the password at some point anyway.Without the boot password does that prevent someone from putting in a password reset disc and resetting the local admin password to gain access to files and folders? Alequaff wrote:yes we use boot time passwords, we keep a list of the passwords in IT in the incase everyone gets hit by a bus tomorrow book, plus we all know the passwords. We only encrypt laptops that can easily be stolen and we usually have the same password per department since we are not trying to secure the computer from internal threats only external, we also set the passwords we don't allow users to choose. So basicly if the laptop is lost or stolen joe schmoe out there cant access the data.So are your users keeping track of their boot time password along with an active directory password that changes?

Is every boot time password unique? Yes they do, and no they are not unique, they are only unique to that department and they are usually fairly simple like:Th!$D3pI$CoOLso if one person forgets they can get it from someone else in their department.

For internal security this is horrible but we don't care about that, we care about outside people stealing one from a car or something and getting access to sensitive data. We figure that if they can get their hands on a department password they can get their hands on unique passwords if they really wanted so all unique passwords for encryption would do is make it harder for the user and ultimately us. I have customers who use one slot of a Yubikey for a static password for truecrypt.

Alequaff wrote:yes they do, and no they are not unique, they are only unique to that department and they are usually fairly simple like:Th!$D3pI$CoOLso if one person forgets they can get it from someone else in their department. For internal security this is horrible but we don't care about that, we care about outside people stealing one from a car or something and getting access to sensitive data. We figure that if they can get their hands on a department password they can get their hands on unique passwords if they really wanted so all unique passwords for encryption would do is make it harder for the user and ultimately us.Have you run into any issues with TrueCrypt when trying to run a Windows 7 system repair? Will it be able to repair the encrypted partitions?