TPM with PIN and External Key
In Windows 7 and Windows Vista SP1, you have an additional option for BitLocker security on computers with a TPM: requiring the user to type a PIN and insert a USB key. This provides the highest level of BitLocker protection by requiring something the user knows (the PIN) and something the user has (the external key). For an attacker to successfully access data on a BitLocker-protected partition, the attacker needs to acquire the computer with the hard disk, have the USB key, and work with the computer's owner to acquire the PIN.
You must use the Manage-bde.exe BitLocker command-line tool to configure this authentication option. Manage-bde.exe is discussed later in this section.
External Key (Require Startup USB Key At Every Startup)
The user provides the VMK on a USB flash drive or similar external storage so that BitLocker can decrypt the FVEK and the volume without requiring TPM hardware. The external key can be either the standard key or a recovery key created to replace a lost external key.
Using a startup key without TPM does allow you to encrypt a volume without upgrading your hardware. However, it does not provide boot integrity, and it will not detect whether the hard disk has been moved to a different computer.
Recovery Password
The user enters a 48-character recovery password, which decrypts the VMK, granting access to the FVEK and the volume. The recovery password is designed with checksums so that IT support can read the password to a user over the phone and easily detect whether a user has mistyped a character. For more information, read the section titled "How to Recover Data Protected by BitLocker" later in this tutorial.
Clear Key
No authentication occurs. BitLocker does not check the integrity of the computer or operating system, and the VMK is freely accessible, encrypted with a symmetric key stored in the clear on the hard disk. However, the volume remains, in fact, encrypted. This is used only when BitLocker is disabled (to upgrade the computer's BIOS, for example). When BitLocker is re-enabled, the clear key is removed and the VMK is rekeyed and re-encrypted. For more information, read the section titled "How to Disable or Remove BitLocker Drive Encryption" later in this tutorial.
In this tutorial:
- Managing Disks and File Systems
- Overview of Partitioning Disks
- How to Choose Between MBR or GPT
- Converting from MBR to GPT Disks
- GPT Partitions
- Choosing Basic or Dynamic Disks
- Working with Volumes
- How to Create a Simple Volume
- How to Create a Spanned Volume
- How to Create a Striped Volume
- How to Resize a Volume
- How to Delete a Volume
- How to Create and Use a Virtual Hard Disk
- File System Fragmentation
- Backup And Restore
- How File Backups Work
- File and Folder Backup Structure
- How System Image Backups Work
- How to Start a System Image Backup from the Command Line
- How to Restore a System Image Backup
- System Image Backup Structure
- Best Practices for Computer Backups
- How to Manage Backup Using Group Policy Settings
- Previous Versions and Shadow Copies
- How to Manage Shadow Copies
- How to Restore a File with Previous Versions
- How to Configure Previous Versions with Group Policy Settings
- Windows ReadyBoost
- BitLocker Drive Encryption
- How BitLocker Encrypts Data
- How BitLocker Protects Data
- TPM with External Key (Require Startup USB Key At Every Startup)
- TPM with PIN (Require PIN At Every Startup)
- TPM with PIN and External Key
- BitLocker To Go
- BitLocker Phases
- Requirements for Protecting the System Volume with BitLocker
- How to Enable the Use of BitLocker on the System Volume on Computers Without TPM
- How to Enable BitLocker Encryption on System Volumes
- How to Enable BitLocker Encryption on Data Volumes
- How to Manage BitLocker Keys on a Local Computer
- How to Manage BitLocker from the Command Line
- How to Recover Data Protected by BitLocker
- How to Disable or Remove BitLocker Drive Encryption
- How to Decommission a BitLocker Drive Permanently
- How to Prepare AD DS for BitLocker
- How to Configure a Data Recovery Agent
- How to Manage BitLocker with Group Policy
- The Costs of BitLocker
- Windows 7 Encrypting File System
- How to Export Personal Certificates
- How to Import Personal Certificates
- How to Grant Users Access to an Encrypted File
- Symbolic Links
- How to Create Symbolic Links
- How to Create Relative or Absolute Symbolic Links
- How to Create Symbolic Links to Shared Folders
- How to Use Hard Links
- Disk Quotas
- How to Configure Disk Quotas on a Single Computer
- How to Configure Disk Quotas from a Command Prompt
- How to Configure Disk Quotas by Using Group Policy Settings
- Disk Tools
- EFSDump
- SDelete
- Streams
- Sync
- MoveFile and PendMoves