SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Coca-Cola İçecek
BitLocker Disk Encryption
User’s Guide
Understanding Bitlocker
Microsoft Bitlocker is data protection technology available in Windows 7 and in some editions of
windows for securing local harddisks.
Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a
software-attack tool against it or by transferring the computer's hard disk to a different computer.
BitLocker helps mitigate unauthorized data access by enhancing file and system protections.
BitLocker also helps render data inaccessible when BitLocker-protected computers are
decommissioned or recycled.
Why you need to know for BitLocker hard disk encryption?
It is true that the most common use of BitLocker is to protect the data on stolen laptops. You know
that anybody can access the data on an unencrypted disk without requiring any passwords by
booting up from a second drive. Thus, hard disk encryption is the only way to protect the data on
a stolen laptop.
What about the security relevant data that is stored on every system disk? Password hashes for
example. Once an attacker has physical access to one of your company’s system disks, this
opens a variety of ways to attack your whole network. Brute force attacks to crack cached
passwords is only one option. If the stolen computer is a domain member, a hacker can use its
trust relationship to access other machines in your organization. However, if the disk is encrypted,
the bad guy has little chance to compromise your network.
What Bitlocker can do ?
1. Bitlocker provides high level security for the local data.
2. Bitlocker encrypts entire volume including free space, OS files, Paging and Hibernation
files
What Bitocker can’t do ?
1. BitLocker can’t protect from network vulnerabilities.
2. BitLocker can’t protect from Virus threats
BitLocker Installation
BitLocker client agent will be installed on your computer automatically by the system administrator.
Installation will run at the background.
After installation is complete, a screen will appear as follows:
• You can perform only 1 postpone up to the specified time.
• When you click the the Start button, you can work as usual while the encryption process runs at
the background. You can click close and the message will disappear.
• It might require restart on some CCI computers. Please perform reboot if asked.
 Encrypting the disk may take several hours depending on the disk size.
• If you power-off your computer, encryption will resume when the computer restarts.
• After the encryption process is completed, you will see the following screen.
BitLocker Self-Service Key Recovery
• If you encounter errors during the boot time of your computer, you need to enter the
recovery key.
• Boot screen would be as follows:
• As Shown above, make a note Recovery Key ID’s first 8 digits.
Then connect to the address given below from another CCI computer.
https:bitlockerselfservice
• When you connect to the Self-Service Portal address, enter your user name and password
• After login, you must acknowledge the policy statement.
You will need to enter the first eight characters of the Recover Key ID to retrieve the
Recovery Key itself.
• Now enter this newly generated 48-character recovery key at the boot screen of your
computer. Then your computer will boot properly.
• If you do not have access to this self-service portal from another CCI computer, please
contact BT Service Center.
BT Service Center: 0 216 528 4499
Business Technologies

Contenu connexe

En vedette

3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
 
The design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsThe design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsYansi Keim
 
ERPNext Open Day - September 2015
ERPNext Open Day - September 2015ERPNext Open Day - September 2015
ERPNext Open Day - September 2015Anand Doshi
 
Seguranca e prevenção- 9º ano
Seguranca e prevenção- 9º anoSeguranca e prevenção- 9º ano
Seguranca e prevenção- 9º anoYolanda Maria
 

En vedette (7)

3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
 
The design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsThe design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocols
 
ERPNext Open Day - September 2015
ERPNext Open Day - September 2015ERPNext Open Day - September 2015
ERPNext Open Day - September 2015
 
01 intro
01 intro01 intro
01 intro
 
Seguranca e prevenção- 9º ano
Seguranca e prevenção- 9º anoSeguranca e prevenção- 9º ano
Seguranca e prevenção- 9º ano
 
Werable data prescription
Werable data prescriptionWerable data prescription
Werable data prescription
 

Coca Cola Icecek - Bitlocker User Guide v2

  • 1. Coca-Cola İçecek BitLocker Disk Encryption User’s Guide
  • 2. Understanding Bitlocker Microsoft Bitlocker is data protection technology available in Windows 7 and in some editions of windows for securing local harddisks. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. Why you need to know for BitLocker hard disk encryption? It is true that the most common use of BitLocker is to protect the data on stolen laptops. You know that anybody can access the data on an unencrypted disk without requiring any passwords by booting up from a second drive. Thus, hard disk encryption is the only way to protect the data on a stolen laptop. What about the security relevant data that is stored on every system disk? Password hashes for example. Once an attacker has physical access to one of your company’s system disks, this opens a variety of ways to attack your whole network. Brute force attacks to crack cached passwords is only one option. If the stolen computer is a domain member, a hacker can use its trust relationship to access other machines in your organization. However, if the disk is encrypted, the bad guy has little chance to compromise your network. What Bitlocker can do ? 1. Bitlocker provides high level security for the local data. 2. Bitlocker encrypts entire volume including free space, OS files, Paging and Hibernation files What Bitocker can’t do ? 1. BitLocker can’t protect from network vulnerabilities. 2. BitLocker can’t protect from Virus threats
  • 3. BitLocker Installation BitLocker client agent will be installed on your computer automatically by the system administrator. Installation will run at the background. After installation is complete, a screen will appear as follows: • You can perform only 1 postpone up to the specified time. • When you click the the Start button, you can work as usual while the encryption process runs at the background. You can click close and the message will disappear. • It might require restart on some CCI computers. Please perform reboot if asked.
  • 4.  Encrypting the disk may take several hours depending on the disk size. • If you power-off your computer, encryption will resume when the computer restarts. • After the encryption process is completed, you will see the following screen. BitLocker Self-Service Key Recovery • If you encounter errors during the boot time of your computer, you need to enter the recovery key. • Boot screen would be as follows: • As Shown above, make a note Recovery Key ID’s first 8 digits.
  • 5. Then connect to the address given below from another CCI computer. https:bitlockerselfservice • When you connect to the Self-Service Portal address, enter your user name and password • After login, you must acknowledge the policy statement.
  • 6. You will need to enter the first eight characters of the Recover Key ID to retrieve the Recovery Key itself.
  • 7. • Now enter this newly generated 48-character recovery key at the boot screen of your computer. Then your computer will boot properly. • If you do not have access to this self-service portal from another CCI computer, please contact BT Service Center. BT Service Center: 0 216 528 4499 Business Technologies