ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    supporting an office of computers with full drive encryption

    Scheduled Pinned Locked Moved Solved IT Discussion
    166 Posts 17 Posters 23.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stacksofplatesS
      stacksofplates
      last edited by

      That may be a setting that can be enabled, idk. I don't manage it.

      MattSpellerM 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @stacksofplates
        last edited by

        @stacksofplates said in supporting an office of computers with full drive encryption:

        @MattSpeller said in supporting an office of computers with full drive encryption:

        @stacksofplates said in supporting an office of computers with full drive encryption:

        @MattSpeller said in supporting an office of computers with full drive encryption:

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        @travisdh1 said in supporting an office of computers with full drive encryption:

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        @travisdh1 said in supporting an office of computers with full drive encryption:

        @Mike-Davis said in supporting an office of computers with full drive encryption:

        so a remote reboot is a no go since you would need to be onsite to put the password in?

        That's a real possibility, yes.

        My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

        Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

        You're going to have that problem no matter what tho. Once booted, what does it even matter?

        We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

        My recent audit agrees with Scott and we are moving to something like bitlocker with Sophos management.

        Sigh. Watching this thread with great interest

        Ya corporate puts bitlocker on machines. It's pointless.

        Why is it pointless? It does not work?

        I guess pointless is strong. But its only useful if someone steals a drive. If they steal the whole machine it will auto unencrypt on boot.

        Which basically means it was put there to trick a manager who is an idiot.

        stacksofplatesS 1 Reply Last reply Reply Quote 0
        • MattSpellerM
          MattSpeller @stacksofplates
          last edited by

          @stacksofplates said in supporting an office of computers with full drive encryption:

          That may be a setting that can be enabled, idk. I don't manage it.

          Good lord I hope you can enable forced password, otherwise you're right, wtf?!

          dafyreD 1 Reply Last reply Reply Quote 1
          • stacksofplatesS
            stacksofplates @scottalanmiller
            last edited by

            @scottalanmiller said in supporting an office of computers with full drive encryption:

            @stacksofplates said in supporting an office of computers with full drive encryption:

            @MattSpeller said in supporting an office of computers with full drive encryption:

            @stacksofplates said in supporting an office of computers with full drive encryption:

            @MattSpeller said in supporting an office of computers with full drive encryption:

            @scottalanmiller said in supporting an office of computers with full drive encryption:

            @travisdh1 said in supporting an office of computers with full drive encryption:

            @scottalanmiller said in supporting an office of computers with full drive encryption:

            @travisdh1 said in supporting an office of computers with full drive encryption:

            @Mike-Davis said in supporting an office of computers with full drive encryption:

            so a remote reboot is a no go since you would need to be onsite to put the password in?

            That's a real possibility, yes.

            My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

            Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

            You're going to have that problem no matter what tho. Once booted, what does it even matter?

            We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

            My recent audit agrees with Scott and we are moving to something like bitlocker with Sophos management.

            Sigh. Watching this thread with great interest

            Ya corporate puts bitlocker on machines. It's pointless.

            Why is it pointless? It does not work?

            I guess pointless is strong. But its only useful if someone steals a drive. If they steal the whole machine it will auto unencrypt on boot.

            Which basically means it was put there to trick a manager who is an idiot.

            Or just to check a box (to get past an audit) which is just as bad.

            1 Reply Last reply Reply Quote 1
            • anthonyhA
              anthonyh
              last edited by

              Hmm. I've been trying to convince my boss to consider thin clients for our users and I think this argument may help me in at least getting him to consider it.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller
                last edited by

                @MattSpeller said in supporting an office of computers with full drive encryption:

                @stacksofplates said in supporting an office of computers with full drive encryption:

                @MattSpeller said in supporting an office of computers with full drive encryption:

                @stacksofplates said in supporting an office of computers with full drive encryption:

                @MattSpeller said in supporting an office of computers with full drive encryption:

                @scottalanmiller said in supporting an office of computers with full drive encryption:

                @travisdh1 said in supporting an office of computers with full drive encryption:

                @scottalanmiller said in supporting an office of computers with full drive encryption:

                @travisdh1 said in supporting an office of computers with full drive encryption:

                @Mike-Davis said in supporting an office of computers with full drive encryption:

                so a remote reboot is a no go since you would need to be onsite to put the password in?

                That's a real possibility, yes.

                My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                You're going to have that problem no matter what tho. Once booted, what does it even matter?

                We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                My recent audit agrees with Scott and we are moving to something like bitlocker with Sophos management.

                Sigh. Watching this thread with great interest

                Ya corporate puts bitlocker on machines. It's pointless.

                Why is it pointless? It does not work?

                I guess pointless is strong. But its only useful if someone steals a drive. If they steal the whole machine it will auto unencrypt on boot.

                auto unencrypt? don't you need a password to decrypt?

                This is the exact scenario we need to prevent - theft of machines. Seems like it would do a good job

                Loads of people doing encryption aren't doing it for logical reasons, but as a means to bypass a spirit of security. And they "have" encryption, but disable it automatically so that someone stealing hardware might never even know that the data was "encrypted."

                MattSpellerM 1 Reply Last reply Reply Quote 1
                • MattSpellerM
                  MattSpeller @scottalanmiller
                  last edited by

                  @scottalanmiller Ok, I get that - but for real though, bitlocker can be forced to start with a password to decrypt the drive right? And it's reasonably good encryption?

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • black3dynamiteB
                    black3dynamite
                    last edited by

                    Maybe using Citrix XenApps, Citrix XenDesktop, or VMware Horizon is another solution.

                    1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller @MattSpeller
                      last edited by

                      @MattSpeller said in supporting an office of computers with full drive encryption:

                      @scottalanmiller Ok, I get that - but for real though, bitlocker can be forced to start with a password to decrypt the drive right? And it's reasonably good encryption?

                      Oh sure, just not many people doing that.

                      1 Reply Last reply Reply Quote 1
                      • PenguinWranglerP
                        PenguinWrangler
                        last edited by

                        We use Dell DDPE encryption solution. We can log into the server and tell the computer bypass the first Encryption Screen on next boot if the computer is in the office. So that is how we handle WOL scenarios.

                        scottalanmillerS BRRABillB 2 Replies Last reply Reply Quote 4
                        • scottalanmillerS
                          scottalanmiller @PenguinWrangler
                          last edited by

                          @PenguinWrangler said in supporting an office of computers with full drive encryption:

                          We use Dell DDPE encryption solution. We can log into the server and tell the computer bypass the first Encryption Screen on next boot if the computer is in the office. So that is how we handle WOL scenarios.

                          That's a cool feature.

                          PenguinWranglerP 1 Reply Last reply Reply Quote 2
                          • Emad RE
                            Emad R
                            last edited by Emad R

                            hmm, i have been reading through the commends and I have the following:

                            If its desktop or laptop, then it can be grounded (desktop are easier) with kensington cord, and if you are worried about auto decrypt on boot up and theft, then you can use TPM module header.

                            With those even if the Internal HDD got stolen if you used encryption software that uses the TPM it will not decrypt unless the TPM module gets stolen too, for desktops it is different location than laptops and I think it can bind with the motherboard model, note sure though.

                            Using desktops it is alot easier i guess going the above route.

                            1 Reply Last reply Reply Quote 0
                            • dafyreD
                              dafyre @MattSpeller
                              last edited by

                              @MattSpeller said in supporting an office of computers with full drive encryption:

                              @stacksofplates said in supporting an office of computers with full drive encryption:

                              That may be a setting that can be enabled, idk. I don't manage it.

                              Good lord I hope you can enable forced password, otherwise you're right, wtf?!

                              The CIO wants all of the Sysadmin team (and presumably others) to use BitLocker for Full Disk Encryption. I can't reboot my computer without entering the password to decrypt the drives.

                              MattSpellerM scottalanmillerS 2 Replies Last reply Reply Quote 5
                              • MattSpellerM
                                MattSpeller @dafyre
                                last edited by

                                @dafyre said in supporting an office of computers with full drive encryption:

                                @MattSpeller said in supporting an office of computers with full drive encryption:

                                @stacksofplates said in supporting an office of computers with full drive encryption:

                                That may be a setting that can be enabled, idk. I don't manage it.

                                Good lord I hope you can enable forced password, otherwise you're right, wtf?!

                                The CIO wants all of the Sysadmin team (and presumably others) to use BitLocker for Full Disk Encryption. I can't reboot my computer without entering the password to decrypt the drives.

                                41622-Grumpy-cat-good-uUqS.jpeg

                                stacksofplatesS 1 Reply Last reply Reply Quote 2
                                • PenguinWranglerP
                                  PenguinWrangler @scottalanmiller
                                  last edited by

                                  @scottalanmiller If the user forgets password and they are out of town. They can feed you a series of numbers and letters (think windows OS Product Key length) that you plug into the server. That then generates a similar code that you feed back to them then that unlocks the encryption.

                                  Mike DavisM 1 Reply Last reply Reply Quote 0
                                  • stacksofplatesS
                                    stacksofplates @MattSpeller
                                    last edited by

                                    @MattSpeller said in supporting an office of computers with full drive encryption:

                                    @dafyre said in supporting an office of computers with full drive encryption:

                                    @MattSpeller said in supporting an office of computers with full drive encryption:

                                    @stacksofplates said in supporting an office of computers with full drive encryption:

                                    That may be a setting that can be enabled, idk. I don't manage it.

                                    Good lord I hope you can enable forced password, otherwise you're right, wtf?!

                                    The CIO wants all of the Sysadmin team (and presumably others) to use BitLocker for Full Disk Encryption. I can't reboot my computer without entering the password to decrypt the drives.

                                    41622-Grumpy-cat-good-uUqS.jpeg

                                    Good to know the corporate team is on par.......

                                    1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller @dafyre
                                      last edited by

                                      @dafyre said in supporting an office of computers with full drive encryption:

                                      @MattSpeller said in supporting an office of computers with full drive encryption:

                                      @stacksofplates said in supporting an office of computers with full drive encryption:

                                      That may be a setting that can be enabled, idk. I don't manage it.

                                      Good lord I hope you can enable forced password, otherwise you're right, wtf?!

                                      The CIO wants all of the Sysadmin team (and presumably others) to use BitLocker for Full Disk Encryption. I can't reboot my computer without entering the password to decrypt the drives.

                                      I presume that there is data on there?

                                      Mike DavisM dafyreD 2 Replies Last reply Reply Quote 0
                                      • Mike DavisM
                                        Mike Davis @PenguinWrangler
                                        last edited by

                                        @PenguinWrangler said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller If the user forgets password and they are out of town. They can feed you a series of numbers and letters (think windows OS Product Key length) that you plug into the server. That then generates a similar code that you feed back to them then that unlocks the encryption.

                                        Does each user have their own password for the drive? Is it AD integrated? Can the admin log in if the user forgets their password?

                                        PenguinWranglerP 1 Reply Last reply Reply Quote 0
                                        • Mike DavisM
                                          Mike Davis @scottalanmiller
                                          last edited by

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          I presume that there is data on there?

                                          The document I was working off of said that even if their data is web based, if they view a .pdf , the .pdf could get stored as a temp file, and that information could be confidential, so they want the drive encrypted.

                                          PenguinWranglerP scottalanmillerS 2 Replies Last reply Reply Quote 0
                                          • PenguinWranglerP
                                            PenguinWrangler @Mike Davis
                                            last edited by

                                            @Mike-Davis It is all AD integrated. When they change their AD password and login then the Dell DDPE will update the PBA (Preboot Authentication screen) with their AD password.

                                            1 Reply Last reply Reply Quote 3
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 8
                                            • 9
                                            • 2 / 9
                                            • First post
                                              Last post