Lock the system when it is tampered with.Any alternative software that might start the system does not have access to the decryption keys for the Windows operating system drive. Enhance protection to mitigate offline software-based attacks.Provide a method to check that early boot file integrity has been maintained, and help ensure that there has been no adversarial modification of those files, such as with boot sector viruses or rootkits. ![]() This helps ensure that BitLocker makes the encrypted drive accessible only if those components have not been tampered with and the encrypted drive is located in the original computer.īitLocker helps ensure the integrity of the start-up process by taking the following actions: It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline.īitLocker can use a TPM to verify the integrity of early boot components and boot configuration data. The TPM is a hardware component installed in many newer computers by the computer manufacturers. ![]() Trusted Platform ModuleīitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. ![]() BitLocker is a data protection feature which protects a disk from being read if it is stolen, lost or inappropriately decommissioned.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |