« 
Custom Administrative Tem... | 
New tool for BitLocker he... »
                        
                            New doc from MS for storing BitLocker recovery information in Active Directory
                        
                            Mon, 15 Jan 2007 15:30:04 GMT
                        
                            
    Just found this document at MS. I’ll post more when I’ve had a chance to review it.
    If you’ve been reading about BitLocker drive encryption in Vista you may already know that one option for storing recovery keys is in Active Directory.
    You have to update the AD schema before Vista can store recovery keys in AD. But Microsoft hasn’t published the LDIF files necessary for updating the schema yet! Part of BitLocker Active Directory Deployment Kit which is vaporware at this point.
    This document, Configuring Active Directory to Back up Windows BitLocker Drive Encryption and Trusted Platform Module Recovery Information, apparently addresses this issue. Stay tuned for more information...
    Here’s the link
     Configuring Active Directory to Back up Windows BitLocker Drive Encryption and Trusted Platform Module Recovery Information  
  
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
5 Indicators of Endpoint Evil
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
                        
                    
                    Comments disabled
powered by Bloget™