Solved

Self-Encrypting Drives (SED) with Array Controller RAID and BitLocker

Posted on 2015-02-11
2
463 Views
Last Modified: 2015-02-11
We are installing HP DL380 Gen9 servers with HP Smart Array P440ar contollers and SED drives that conform to the TCG Opal v2.0 standard, compatible with the Microsoft eDrive IEEE 1667 protocol.

We plan to use Server 2012 BitLocker to secure data at rest. According to BitLocker literature, the 2012 implementation uses SED drive hardware to accelerate drive encryption and also that BitLocker works with hardware RAID arrays. I can find no information that indicates whether BitLocker can use [take advantage of] SED hardware to accelerate encryption on drives connected to an array controller configured in RAID [10] or not.

Can BitLocker use SED hardware to accelerate encryption on drives connected to an array controller configured in RAID [10]?
0
Comment
Question by:immix
2 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40604360
No it can't. Only with single drives - each drive has a single key. But feel free to try, setup a RAID, BL will not allow the option to use hw encryption.
0
 

Author Comment

by:immix
ID: 40604417
Thanks McKnife, thought so.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now