![]() Microsoft recommends using the TPM with a BitLocker PIN or startup key loaded on a USB to uplift security. This method does not require the user to do anything, and it is the least secure. It automatically decrypts hard drives on startup, without requiring the use of a PIN code, USB, or other form of authentication. The most common authentication method is using the Trusted Protection Module (TPM), a microchip that is built into some laptops and desktops. Let’s start with an overview of BitLocker authentication methods since they can trigger lockouts. This blog will look at the root causes of BitLocker Recovery Mode, and how your organization can mitigate the issue with self-service key recovery. ![]() Here’s where it gets complicated – the recovery keys are 25-digit hexadecimal numbers which are awkward to read, but also hear over a phone line. They have implemented BitLocker as their endpoint encryption solution which means that the IT service desk now has to issue recovery keys. ![]() ![]() Sysadmins often ask us about BitLocker Recovery Mode. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |