Solved

iPod/Blackberry device connect to machine with Bitlocker for USB Drives turned on

Posted on 2011-03-23
5
1,460 Views
Last Modified: 2012-05-11
My company is testing Bitlocker on USB drives.  But there is a snag when you want to connect a iPod or Blackberry device.  It wants to encrypt the device just like a thumbdrive.  Is there a way around this?  Maybe in group policy?
0
Comment
Question by:SVMBrandon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 11

Accepted Solution

by:
junaidIT earned 500 total points
ID: 35204740
doubt if that would be the case, since the bb and iphone etc are taken as external drives or removable drives by the system and the group policy for bit locker has option to take it out completely for removable drives and not specific to what typeof removable drive it is.
0
 
LVL 11

Expert Comment

by:junaidIT
ID: 35204743
http://technet.microsoft.com/en-us/library/ee706521(WS.10).aspx#BKMK_driveaccess3


microsoft technet article about bit locker group policy reference.
0
 
LVL 11

Expert Comment

by:junaidIT
ID: 35204758
http://mcp.itcommunity.ru/blogs/_asrtechnet/archive/2011/02/10/148400.aspx

this might be what you would want to try and see how you could selectively do the encryption.

 Microsoft BitLocker Administration and Monitoring

gud luck
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35422457
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question