Windows Bit Locker
What is BitLocker?
Full Disk Encryption: BitLocker is a built-in Windows feature (available in Pro, Enterprise, and Education editions) designed to protect data on lost, stolen, or improperly decommissioned devices, using robust encryption.
Transparent Operation: When BitLocker is enabled, data is encrypted as it's written to the disk and decrypted on-the-fly for authorized users – without a noticeable performance impact.
TPM Integration: BitLocker works best in conjunction with a Trusted Platform Module (TPM) – a hardware chip on many computers that provides secure storage for encryption keys.
How to Configure BitLocker
Enable BitLocker:
Search: Search for "Manage BitLocker” and open the Control Panel tool.
Selection: Choose the drive you want to encrypt.
Turn on BitLocker: Follow the on-screen instructions.
Choose an Unlock Method:
TPM Only: The most common, storing the key in the TPM.
Password: Requires a password each time you boot.
USB Drive: Requires inserting a USB flash drive with the stored key.
Combination: A combination of the methods above for higher security.
Backup Recovery Key:
Crucial Step: Store your recovery key securely (print, save on a separate flash drive, etc.). This key allows you to access your data if you lose your password or the TPM malfunctions.
Additional Configuration Settings
Encryption Algorithm: Choose between AES-128 or AES-256 (Manage BitLocker -> "Change encryption method and cipher strength").
Fixed Data Drive Encryption: Enable encryption for non-removable drives.
Pre-boot Authentication: (Advanced) Requires a PIN or other authentication before the operating system boots.
BitLocker and Threat Hunting
Data at Rest Protection: BitLocker makes it much harder for unauthorized individuals to access sensitive data, even if the physical drive is obtained. This is invaluable during forensic investigations.
Incident Response: In the case of a lost or stolen device, BitLocker helps protect data from unauthorized access.
Compliance: BitLocker can help with complying with data security regulations that require encryption.
Considerations
Performance impact: Minimal on modern systems.
TPM Requirement: BitLocker's strongest security mode usually requires a TPM.
Data recovery: Failing to back up your recovery key can lead to permanent data loss.
Let's Go Deeper
How to manage BitLocker via PowerShell or command line
How BitLocker works at a technical level (encryption modes, etc.)
Threat hunting scenarios where BitLocker's presence or absence plays a role
Last updated
Was this helpful?