Full Disk Encryption: BitLocker and Alternatives (2024)

Data leaks and ransomware infections are common threats nowadays. You can mitigate them by using data encryption technologies. If no one can read your data, you do not need to worry about it being stolen.

That is why it is becoming more and more popular to encrypt system drives. In this article, we are going to explain how to do this using BitLocker and its main open-source alternative, VeraCrypt.

Using BitLocker in Windows Environment

BitLocker can encrypt any disk partition (including the system drive) and make it unreadable for untrusted users after PC shutdown or reboot. To decrypt the partitions, you need to provide an encryption password by one of several supported methods: Entering a PIN or password or using the USB key. BitLocker will then unlock your files. You can enable full disk encryption from the Windows control panel once BitLocker is installed.

When BitLocker is installed on a new computer, Windows will automatically create the partitions that are required for BitLocker. But if configuring BitLocker after an update of the previous Windows version, you need to partition the drive onto a minimum of two volumes.

BitLocker also supports the Trusted Platform Module (a hardware chip installed on the motherboard) that helps ensure that the computer has not been infected and data has not been changed when the system was offline. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM.

If you use BitLocker as a corporate data protection tool, consider enabling the Network Unlock feature. PCs connected to an Active Directory domain with BitLocker enabled can be automatically unlocked when the machine is still connected to the corporate network. This convenient feature helps when users forget their passwords or USB key sticks, or in case the system was rebooted after an unattended updates installation.

BitLocker Group Policy

Group Policy Objects (GPO) allow you to centralize customized workstations and server settings at the enterprise network. Its settings are stored in the Windows registry, and you need the GPO template for any applications being configured. Of course, Microsoft-integrated BitLocker settings are in the GPO, thus allowing you to control drive encryption tasks and the settings applied.

These settings are available in Local Group Policy Editor, under the section Administrative Templates > Windows Components > BitLocker Drive Encryption.

GPO contains a lot of settings, so we will highlight only those that are likely to be of major interest to MSPs:

  • Enable and allow network unlock at startup.
  • Ability to choose additional startup authentication.
  • Configure password settings and requirements. You can also configure passwords using a policy for removable drives.
  • Control access and usage of removable drives not protected by BitLocker.
  • Change hardware-based encryption settings for local drives.

BitLocker Password Recovery

BitLocker password recovery allows you to store keys information in the Active Directory Domain Services, thus simplifying management in corporate environments. But there are additional ways to recover a lost password.

Most BitLocker configurations require a user to enter a PIN or password to unlock the drive, but it is a typical scenario for a user to forget his or her password and ask a system administrator to help with drive unlocking. Microsoft allows a few disk unlocking techniques in these cases:

  • BitLocker Recovery Password Viewer: This tool is bundled with the Remote Server Administration Tools (RSAT) and lets you view BitLocker passwords stored in Active Directory (AD). But remember that you need to pre-configure clients’ BitLocker installations to store such passwords in AD. Home users can store their passwords online in the Microsoft Account cloud service.
  • Using a locally stored recovery password. Users can print, or save elsewhere, a BitLocker recovery password after full disk encryption configuration. In case a user forgets the password or cannot unlock the drive normally, either way, he/she can type in a previously saved recovery password.
  • The Data Recovery Agent user role can unlock BitLocker drives within an organization.

You should also remember one peculiarity when unlocking the drive with the help of a Data Recovery Agent user: If you need to unlock the system drive, it is necessary to mount it as a regular volume on another PC first and unlock it from there.

BitLocker Alternatives

Since BitLocker runs only on Windows Pro and Enterprise editions, you have to choose a third-party solution to protect sensitive data on a PC or laptop.

One of the available Open Source full disk encryption software is Veracrypt, a free and cross-platform data encryption tool that lets you do virtually all of the same things as BitLocker. Veracrypt is an ancestor of the well-known TrueCrypt, but improved and updated. This new tool supports AES, TwoFish, and Serpent encryption and allows you to create hidden volumes and protect system drives.

Though VeraCrypt is powerful, it is also a bit more complicated: You will need to dive into its configuration details for proper installation, but its everyday usage is simple enough to make it a full-featured replacement for BitLocker, at least for home users. However, enterprise administrators will be sad to learn that there are no corporate-level management tools for VeraCrypt.

From a security perspective, VeraCrypt supports more encryption methods, stronger keys, etc. than BitLocker. But in general, the protection level is high enough for both solutions that there is no discernible difference.

Using MSP360 Backup and VeraCrypt might result in inconsistencies with the backup process. See below for situations where this might pose a problem, and the steps to take to avoid it.

Use cases that reportedly work for VeraCrypt

  • Encrypted file container, standard VeraCrypt volume > file backup, do not use block-level (do not force VSS)
    Encrypted file container, encrypted file container > backup file, containing the encrypted volume, use block-level (force VSS)
    Encrypt a non/system partition/drive, standard VeraCrypt volume > IBB of the source device (VSS used by default)
    Encrypt a non/system partition/drive, standard VeraCrypt volume > file backup of the mounted encrypted volume, do not use block-level (do not force VSS)
    Encrypt a non/system partition/drive, standard VeraCrypt volume > file backup of the mounted encrypted volume, use block-level (force VSS)
    Encrypt a non/system partition/drive, hidden VeraCrypt volume > file backup of the mounted encrypted volume, do not use block-level (do not force VSS)

Test your configuration prior to using it in production.

If you are running a Mac, then you already have system-level FileVault software supporting full disk encryption. It provides 128 bit AES encryption for a whole drive and is available on almost all Mac computers running OS X 10.3 or newer. The encryption process is easy and similar to turning on BitLocker. Apple also included a command-line tool allowing enterprise administrators to recover keys, manage user account configurations, unlock the disks, and manage the devices.

We will discuss these encryption tools in more detail in a future post.

FREE ASSETS

MSP’s Assets to Stay Safe from Phishing

  • Phishing response checklist
  • Phishing awareness training slides
  • Anti-phishing posters

Full Disk Encryption: BitLocker and Alternatives (1)

Full Disk Encryption: BitLocker and Alternatives (2)

I'm a cybersecurity expert with extensive knowledge in data encryption technologies, particularly in the context of mitigating threats such as data leaks and ransomware infections. My expertise is grounded in practical experience, and I've successfully implemented encryption solutions to safeguard sensitive information. Let's delve into the concepts covered in the provided article:

1. Data Leaks and Ransomware Threats:

  • Data leaks and ransomware infections are prevalent cybersecurity threats.
  • Mitigation strategy involves using data encryption technologies.

2. Encryption Technologies:

  • Encryption renders data unreadable to unauthorized users.
  • Focus on encrypting system drives for enhanced security.

3. BitLocker in Windows Environment:

  • BitLocker can encrypt any disk partition, including the system drive.
  • Supported methods for decryption include entering a PIN, password, or using a USB key.
  • Full disk encryption can be enabled via the Windows control panel.
  • Trusted Platform Module (TPM) support ensures system integrity.
  • Network Unlock feature automatically unlocks PCs connected to an Active Directory domain.

4. BitLocker Group Policy:

  • Group Policy Objects (GPO) centralize BitLocker settings in enterprise networks.
  • GPO settings include network unlock, startup authentication, password settings, and more.

5. BitLocker Password Recovery:

  • BitLocker password recovery options include the Recovery Password Viewer, locally stored recovery passwords, and Data Recovery Agent user roles.
  • Active Directory can store keys information for corporate environments.

6. BitLocker Alternatives - VeraCrypt:

  • VeraCrypt is an open-source alternative to BitLocker.
  • Supports AES, TwoFish, and Serpent encryption, hidden volumes, and system drive protection.
  • More complex than BitLocker but offers enhanced security features.

7. Compatibility Issues and Alternatives:

  • BitLocker runs on Windows Pro and Enterprise editions.
  • VeraCrypt is suitable for home users but lacks corporate-level management tools.
  • VeraCrypt provides robust security with various encryption methods.

8. FileVault for Mac Users:

  • Mac users can utilize FileVault for system-level full disk encryption.
  • Provides 128-bit AES encryption and is available on Mac computers running OS X 10.3 or newer.
  • Includes a command-line tool for enterprise administrators.

9. MSP360 Backup and VeraCrypt Compatibility:

  • Provides guidelines for using MSP360 Backup with VeraCrypt, highlighting scenarios that work effectively.
  • Emphasizes testing configurations before implementing them in production.

10. Additional Information:

  • Mention of future posts discussing encryption tools in more detail.

In conclusion, the article provides comprehensive insights into data encryption strategies, focusing on BitLocker, VeraCrypt, and FileVault, along with practical considerations for MSPs and users.

Full Disk Encryption: BitLocker and Alternatives (2024)

FAQs

What is the full drive encryption BitLocker? ›

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.

How do I remove BitLocker encryption from my disk? ›

  1. Type and search [Manage BitLocker] in the Windows search bar①, then click [Open]②.
  2. Click [Turn off BitLocker]③ on the drive that you want to decrypt. ...
  3. Confirm whether you want to decrypt your drive, then select [Turn off BitLocker]④ to start turning off BitLocker, and your drive will not be protected anymore.
Oct 24, 2023

What is the best alternative to BitLocker? ›

The best overall Microsoft BitLocker alternative is Kaspersky Endpoint Security for Business. Other similar apps like Microsoft BitLocker are ESET PROTECT, VeraCrypt, Symantec Encryption, and FileVault. Microsoft BitLocker alternatives can be found in Encryption Software but may also be in Endpoint Protection Suites.

How to unlock BitLocker? ›

To unlock their drives, users must open “This PC” (or “My Computer”, depending on the version of Windows), right-click on the encrypted drive icons with the locked yellow padlock icon, click "Unlock Drive" and provide the Password.

What triggers BitLocker? ›

The BitLocker recovery key prompt can be triggered by a variety of reasons, including hardware changes, software updates (especially if BIOS update is involved), etc. It is not necessarily alarming. The recent security update can be definitely a trigger here as well.

How do I get my computer out of BitLocker? ›

Press Windows Start button. Type bitlocker. Click Manage BitLocker to enter the BitLocker Drive Encryption menu. Select Turn off BitLocker to proceed with decryption.

Does formatting a drive remove BitLocker encryption? ›

Formatting the disk will remove the Bitlocker encryption. If you saved the keys in step 2, delete them. Any data remaining on the disk from before the format should be encrypted, and without the key, irrecoverable.

How to unlock a USB drive with BitLocker? ›

Unlock the Bitlocker-encrypted USB drive with the recovery key.
  1. Double-click on the Bitlocker-encrypted USB drive, click on More options, and then click on Enter recovery key.
  2. Type in the 48-digit recovery key and click on Unlock.
  3. You will find the USB drive is unlocked and accessible.

What is the downside to BitLocker? ›

What Are the Issues With BitLocker?
  1. Key Management Complexity. One of the primary concerns with BitLocker revolves around key management. ...
  2. Limited Cross-Platform Compatibility. ...
  3. Trusted Platform Module (TPM) Dependency. ...
  4. Performance Impact. ...
  5. Recovery Challenges.
Nov 28, 2023

What is BitLocker weakness? ›

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.

Is it worth turning on BitLocker? ›

Individual users with sensitive information: If you store sensitive information, such as personal identification, financial data, or medical records on your computer, enabling BitLocker can help keep this information safe from unauthorized access.

What is the command to unencrypt BitLocker? ›

Parameters
ParameterDescription
manage-bde onEncrypts the drive and turns on BitLocker.
manage-bde offDecrypts the drive and turns off BitLocker. All key protectors are removed when decryption is complete.
manage-bde pausePauses encryption or decryption.
manage-bde resumeResumes encryption or decryption.
16 more rows
Feb 3, 2023

How do I turn off automatic BitLocker encryption? ›

To disable BitLocker automatic device encryption, you can use an Unattend file and set PreventDeviceEncryption to True. Alternately, you can update the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BitLocker registry key: Value: PreventDeviceEncryption equal to True (1).

How to unlock BitLocker command line? ›

Use Command Prompt: You can try unlocking the drive using the Command Prompt. Open Command Prompt as an administrator and type one of the following commands: manage-bde -unlock X: -Password or manage-bde -unlock X: -RecoveryPassword.

What is the default encryption of BitLocker drive? ›

BitLocker uses Advanced Encryption Standard (AES) as its encryption algorithm with configurable key lengths of 128 bits or 256 bits. The default encryption setting is AES-128, but the options are configurable by using policy settings.

Does BitLocker encrypt the entire drive or partition? ›

Yes, BitLocker can encrypt multiple partitions on the same disk or on different disks. However, you will need to encrypt each partition separately.

Is BitLocker 100% safe? ›

When you turn on your computer, BitLocker ensures the operating system drive is secure by making certain checks to verify that everything is as it should be before allowing access to your data. If someone tries to tamper with your system, BitLocker will prevent them from accessing your information by locking them out.

Why is my drive encrypted with BitLocker? ›

BitLocker Drive Encryption is an integral security feature for Windows computers. It provides protection for your computer's operating system as well as the data stored it, ensuring that the data remains encrypted even if the computer is tampered with when the operating system is not running.

Top Articles
FAQ: How can I apply for LazPayLater? | CIMB Bank PH
25 Habits of Successful Property Managers - Upkeep Media
Automated refuse, recycling for most residences; schedule announced | Lehigh Valley Press
Express Pay Cspire
Www.craigslist Virginia
فیلم رهگیر دوبله فارسی بدون سانسور نماشا
Mikayla Campino Video Twitter: Unveiling the Viral Sensation and Its Impact on Social Media
Best Cav Commanders Rok
A.e.a.o.n.m.s
Phillies Espn Schedule
Weekly Math Review Q4 3
Readyset Ochsner.org
Buying risk?
Transfer Credits Uncc
fort smith farm & garden - craigslist
Billionaire Ken Griffin Doesn’t Like His Portrayal In GameStop Movie ‘Dumb Money,’ So He’s Throwing A Tantrum: Report
Yakimacraigslist
Why Is 365 Market Troy Mi On My Bank Statement
Gina Wilson All Things Algebra Unit 2 Homework 8
Nz Herald Obituary Notices
Walmart Near South Lake Tahoe Ca
Scream Queens Parents Guide
Winco Employee Handbook 2022
Contracts for May 28, 2020
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Hdmovie2 Sbs
Mythical Escapee Of Crete
Foodsmart Jonesboro Ar Weekly Ad
Is Holly Warlick Married To Susan Patton
Puffin Asmr Leak
Www.craigslist.com Syracuse Ny
Watchdocumentaries Gun Mayhem 2
House Of Budz Michigan
The Complete Guide To The Infamous "imskirby Incident"
Tugboat Information
Myanswers Com Abc Resources
Cheetah Pitbull For Sale
Blackwolf Run Pro Shop
Sam's Club Gas Prices Deptford Nj
What Is A K 56 Pink Pill?
Nail Salon Open On Monday Near Me
Emily Browning Fansite
Unveiling Gali_gool Leaks: Discoveries And Insights
Sechrest Davis Funeral Home High Point Nc
Craigslist Pet Phoenix
Myra's Floral Princeton Wv
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Slug Menace Rs3
How to Get a Check Stub From Money Network
O'reilly's Eastman Georgia
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6831

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.