1
0
mirror of https://github.com/TommyTran732/Windows-Setup.git synced 2024-11-09 09:41:46 -05:00
Windows-Setup/Group Policies Objects/Bitlocker.md
Tommy 9de5998b58
Reorganization
Signed-off-by: Tommy <contact@tommytran.io>
2023-12-30 19:19:05 -07:00

1.4 KiB

Bitlocker Drive Encryption

On Domain Controllers, Bitlocker and tools need to be installed as a feature in Server Manager first.

Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption

Choose drive encryption method and cipher strength-> Enable -> XTS-AES 256-bit for operating system, fixed data, and removable drives. For Windows Vista, Windows Server 2008, etc... use AES 256-bit if you wanna set it.

The disable new DMA devices when computer is locked should only be enabled if the specific computer does not support kernel DMA protection. Do not set this at the domain level.

Operating System Drives

  • Disallow standard users from changing the PIN or password -> Enabled
  • Require additional authentication at startup -> Enabled -> Do not allow TPM, Allow startup PIN with TPM, Do not allow startup key with TPM, Allow startup key and PIN with TPM. (This is especially important as we do not want the TPM to automatically release the encryption key at boot.)
  • Require additional authentication at startup (Windows Server 2008 and Windows Vista) -> Enabled -> Uncheck "Allow Bitlocker without a compatible TPM". Not necessary because you shouldn't be running these versions anyways, but just in case you do have them.
  • Allow enhanced PINs for startup -> Enabled.
  • Configure TPM platform validation profile for native UEFI firmware configurations -> Enabled -> PCR 0,1,2,3,3,4,5,6,7,11