Solved

Bit Locker Hardware

Posted on 2013-10-30
3
411 Views
Last Modified: 2013-11-04
Do I need any special hardware to run Bit Locker on a desktop that's part of a domain (Win 7)?
 
Do I need a TPM chip maybe? I don't really understand the usage of the TPM chip?

Are there different types of Bit Locker?
0
Comment
Question by:ATL74
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 55

Expert Comment

by:McKnife
ID: 39612294
All answers: no.
Before we proceed: did you just get the idea to use it? Why? And have you bothered to read MS TechNet documents about it? You should. :)
0
 
LVL 28

Expert Comment

by:jhyiesla
ID: 39614081
The device you want to install bit locker on either does need a TPM chip or you will have to create a encryption key on a USB stick that MUST be in a USB slot when the computer is turned on. No, there are not different versions of bit locker, but it only comes on Windows Enterprise and Ultimate - assuming you are talking about Windows 7. I'm not sure of the levels in 8 that support bit locker.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 39615673
Bit-locker does offer more than just Full Disk Encryption, but please read this to give you an idea about choosing encryption that fits your needs...
http://www.experts-exchange.com/Security/Encryption/A_12134-Choosing-the-right-encryption-for-your-needs.html
Also, TPM isn't needed, the two authors above are both correct.
-rich
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question