Solved

Pitfalls by using bitlocker on an O/S

Posted on 2011-09-16
2
507 Views
Last Modified: 2012-06-27
Has anyone run across any issues/pitfalls using bitlocker on the O/S.  Data corruption/blue screen/compatibility issues/etc....
I know there is no issues on peripherals but don't think it would be so faultless on the actual o/s
0
Comment
Question by:nomaadic
2 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
Some that I can think off
- Key mgmt for recovery of HDD in the event that typically will be connected to backend AD. If the recovery key is lost and user forget or loses his USB key, then the recovery would not be trivial
- If Bitlocker is tied to the TPM, it is binded to machine, so cloning of machine to machine will not be possible to ease mass deployment
- Even during migration to new machine or OS, you may have to temporary disarm Bitlocker which it create a temp key w/o needing user interaction. This may have a short window of exposure
- You cannot use Group Policy to enforce BitLocker PIN rules.
- BitLocker currently does not support smart cards for pre-boot authentication.
- Support for computers that use Extended Firmware Interface (EFI)-based system firmware is planned for Windows Server 2008, but it is not currently supported in Windows Vista.
- Bitlocker creates a  system volume partition (~1.5 Gbytes, on top of another for the OS) to store its startup codes and if machine with recovery partition (for auto revert), have to make sure it is compatible. Ideally there should not be hosting those partition to avoid conflict in bootup if any.
- Bitlocker required  BIOS setting to start up first from the hard drive, not the USB or CD drives.


This FAQ can be useful @ http://technet.microsoft.com/en-us/library/cc766200(WS.10).aspx
0
 

Author Closing Comment

by:nomaadic
Comment Utility
Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now