1
0
mirror of https://github.com/TommyTran732/Windows-Setup.git synced 2024-09-20 02:14:51 -04:00
Windows-Setup/Group Policies/Computer Configuration/Windows Components/Bitlocker Drive Encryption.md
Tommy 1863c622cd
Mention the disable new DMA devices policy
Signed-off-by: Tommy <contact@tommytran.io>
2023-11-14 14:18:42 -07:00

12 lines
804 B
Markdown

# Bitlocker Drive Encryption
`Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption`
Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) -> Enable -> XTS-AES 256-bit for operating system, fixed data, and removable drives.
**The disable new DMA devices when computer is locked should only be enabled if your computer does not support kernel DMA protection.**
## Operating System Drives
- Require additional authentication at startup -> Enabled -> Do not allow TPM, Allow startup PIN with TPM, Do not allow startup key with TPM, Allow startup key and PIN with TPM. (**This is especially important as we do not want the TPM to automatically release the encryption key at boot.**)
- Allow enhanced PINs for startup -> Enabled.