Disk Encryption policy for Windows devices Flashcards
(46 cards)
What is the first policy type to configure encryption on managed devices?
Endpoint security > Windows encryption policy
What are the two profiles available under the Windows encryption policy?
- BitLocker
- Personal Data Encryption
How does Personal Data Encryption (PDE) differ from BitLocker?
PDE encrypts files instead of whole volumes and disks.
When does BitLocker release data encryption keys?
At boot
When does Personal Data Encryption (PDE) release data encryption keys?
Until a user signs in using Windows Hello for Business
What is the second policy type for configuring encryption on managed devices?
Device configuration profile for endpoint protection for BitLocker
What settings are included in the device configuration profile for endpoint protection?
BitLocker settings
What Windows versions support BitLocker settings in endpoint protection?
Windows 10/11
What are the 3 RBAC roles to manage Bitlocker?
- Help Desk Operator
- Endpoint Security Administrator
- Global Admin
What are the 6 steps to create an endpoint security policy for Windows and deploy Bitlocker ?
- Endpoint security > Disk encryption > Create Policy
- Platform: Windows
- Profile: Choose either BitLocker or Personal Data Encryption
- Configuration settings
- Scope tags
- Assignments
In an endpoint security policy for Windows to deploy Bitlocker, what are the 5 configuration settings options ?
- BitLocker
- BitLocker Drive Encryption
- Operating System Drives
- Fixed Data Drives
- Removable Data Drives
What are the 3 key components included in BitLocker option in configuration settings in endpoint security policy ?
- Require Device Encryption,
- Allow Warning for Other Disk Encryption,
- Configure Recovery Password Rotation
These components help manage encryption settings and recovery options in BitLocker.
2
What does BitLocker Drive Encryption option in configuration settings in endpoint security policy allow you to choose?
- Drive encryption method and cipher strength,
- Unique identifiers for your organization
This customization ensures that the encryption meets organizational security standards.
What are the 3 enforcement options for Operating System Drives in BitLocker, in configuration settings in endpoint security policy ?
- Enforce drive encryption type,
- Require additional authentication at startup,
- Choose recovery methods
These options enhance security and recovery processes for operating system drives.
2
In configuration settings in endpoint security policy, what can be enforced for Fixed Data Drives using BitLocker?
- Enforce drive encryption type,
- Choose recovery methods
This ensures that fixed data drives are protected according to organizational policies.
What control does BitLocker provide for Removable Data Drives, in configuration settings in endpoint security policy?
Control use of BitLocker on removable drives
This allows organizations to manage encryption settings for portable storage devices.
What are the 6 steps to create an endpoint security policy for Windows and deploy Bitlocker ?
- Devices > Manage devices > Configuration > On the Policies tab, select Create
- Platform: Windows
- Profile: Select Templates > Endpoint protection
- Configuration settings, expand Windows Encryption.
- Scope tags
- Assignments
What is the most secure combination of authentication methods for unlocking a drive?
TPM + startup PIN + startup key
This combination is considered the most secure as it requires multiple authentication tasks.
Which authentication method requires the user to insert a USB flash drive containing a startup key?
TPM + startup key
In this method, the encryption key is stored on the TPM chip.
What does the TPM + startup PIN method require from the user?
Entering a PIN
The encryption key is stored on the TPM chip.
What is needed for the startup key only method?
Insert a USB flash drive with the startup key
This method does not require a TPM chip, but the BIOS must support USB access before the OS loads.
What does the TPM only method require from the user?
No user action is required
The encryption key is stored on the TPM chip.
True or False: The startup key only method requires a TPM chip.
False
The device does not need to have a TPM chip for this method.
What happens to a BitLocker encrypted drive until it is unlocked?
The drive is encrypted.