1
0
mirror of https://github.com/TommyTran732/Windows-Setup.git synced 2024-09-19 09:54:50 -04:00
Windows-Setup/Group Policies Objects/Bitlocker.md
Tommy ffd7c1499a
Rename Bitlocker GPO
Signed-off-by: Tommy <contact@tommytran.io>
2023-12-30 16:59:41 -07:00

13 lines
896 B
Markdown

# Bitlocker Drive Encryption
`Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption`
Choose drive encryption method and cipher strength-> Enable -> XTS-AES 256-bit for operating system, fixed data, and removable drives.
**The disable new DMA devices when computer is locked should only be enabled if the specific computer does not support kernel DMA protection.**
## Operating System Drives
- Require additional authentication at startup -> Enabled -> Do not allow TPM, Allow startup PIN with TPM, Do not allow startup key with TPM, Allow startup key and PIN with TPM. (**This is especially important as we do not want the TPM to automatically release the encryption key at boot.**)
- Allow enhanced PINs for startup -> Enabled.
- Configure TPM platform validation profile for native UEFI firmware configurations -> Enabled -> PCR 0,1,2,3,3,4,5,6,7,11