Windows Device and Deployment forum provides technical information for the aspects of Windows device and Operation System deployment, including Windows update, Activation, Setup, Bitlocker, MDT and much more.
To view more articles:
|
How it works
Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing
file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled.
Best Practices
When you design your BitLocker deployment strategy, define the appropriate policies and configuration requirements based on the business requirements of your organization. The following topics will help you collect information that you can use to frame your
decision-making process about deploying and managing BitLocker systems.
Troubleshooting
Problems can occur with any kind of encryption, including BitLocker. The following guides show you the troubleshooting tips when you encounter such issues.
New Feature
This topic describes the new and changed functionality of BitLocker.
GO BACK
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact
tnmff@microsoft.com.