Problem solve Get help with specific problems with your technologies, process and projects.

How to secure BitLocker configurations

BitLocker can be configured for Windows security in many ways: with TPM, with TPM and a startup PIN or without TPM but with a USB device. The list goes on and on. Find out which of these settings is right for you in this excerpt from "Hacking Exposed Windows."

Hacking Exposed Windows
By Joel Scambray

Have a look inside the third edition of Hacking Exposed Windows : Microsoft Windows Security Secrets and Solutions...

by Joel Scambray, with this excerpt from chapter 12, "Windows security features and tools."

With the introduction of Windows Server and Windows Vista came an

Windows Vista security
Vista BitLocker Drive Encryption tips

Top 10 Windows Vista security tips

Windows Vista's security features: One year later

BitLocker configurations

As mentioned, BitLocker can be configured in a variety of ways. In this section we discuss each, along with its strengths, weaknesses and prerequisites. BitLocker can be configured to operate in the following modes:

  • BitLocker with a Trusted Platform Module (TPM).
  • BitLocker with a TPM + startup PIN.
  • BitLocker with a TPM + USB token.
  • BitLocker without TPM.
  • BitLocker without TPM + USB.
  • BitLocker without TPM + startup PIN.

Tip: Microsoft provides an excellent step-by-step procedure for configuring your system in each of these scenarios.

Depending on the desired configuration for BitLocker, your system must also satisfy other hardware and software prerequisites. To determine whether your Windows Vista computer meets these requirements, perform the following steps:

  1. Click start.
  2. Click control panel.
  3. Click security.
  4. Click BitLocker Drive Encryption.

If your computer configuration meets all prerequisites, you will see the screen shown in Figure 12-1.

At a high level, these configuration options represent different combinations of the following:

  • systems with the TPM.
  • systems without the TPM.
  • systems using single-factor authentication.
  • systems using two-factor authentication.

Of these, the most secure configuration is a system that has a TPM and utilizes two-factor authentication, for this reason: The TPM provides BitLocker with the ability to validate each component of the boot process. This ensures the platform is in a known secure state before decrypting the volume.

With most authentication systems, barring implementation flaws, the degree of difficulty to authenticate as another principal increases with the number of "factors" -- each factor introduces an additional test that must be passed by the entity attempting to authenticate. Common authentication factors include the following:

  • something you have.
  • something you know.
  • something you are.

Figure 12-1: system that satisfies BitLocker prerequisites

Currently, BitLocker supports two of these: something you have (a USB or TPM) and something you know (a PIN). In the next section, we take a deeper look at the desired solution -- BitLocker equipped with a TPM and an additional form of authentication, such as a PIN or USB token.

additional security feature, BitLocker Drive Encryption (BDE, or BitLocker), which protects the confidentiality and integrity of the operating system volume during the boot sequence and while the operating system is not loaded. Windows Server will also extend this capability to protect data volumes as well. BitLocker was designed to mitigate offline attacks, such as removing the physical drive from a lost or stolen laptop and accessing the data from an attacker controlled operating system. In the following section we discuss the various configuration options for BitLocker and their prerequisites.

Dig Deeper on Microsoft Windows Vista operating system

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.