BitLocker Design Guide
BitLocker Design Guide
Design Guide
Microsoft Corporation
Published: August 2007
Abstract
This document describes the various aspects of planning for deploying Windows BitLocker Drive
EncryptionTM for Windows Vista® Enterprise and Windows Vista® Ultimate computers in an
enterprise environment. To plan your enterprise deployment of BitLocker, you must first
understand your current policies and procedures. This guide provides a systematic approach to
help you frame your decision making process before deploying BitLocker and establish BitLocker
design strategy.
This guide is intended for use by an infrastructure specialist or system architect. It assumes that
you have a good understanding of how BitLocker and TPM work on a functional level.
1
The information contained in this document represents the current view of Microsoft Corporation
on the issues discussed as of the date of publication. Because Microsoft must respond to
changing market conditions, it should not be interpreted to be a commitment on the part of
Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the
date of publication.
This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES,
EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
rights under copyright, no part of this document may be reproduced, stored in or introduced into a
retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission
of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail
addresses, logos, people, places and events depicted herein are fictitious, and no association
with any real company, organization, product, domain name, email address, logo, person, place
or event is intended or should be inferred.
© 2007 Microsoft Corporation. All rights reserved.
Microsoft, ActiveX, BitLocker, ImageX, Visual Studio, Windows Deployment Services, Windows
Vista, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation
in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
2
Contents
Windows BitLocker Drive Encryption Design Guide........................................................................4
Designing a BitLocker Strategy...................................................................................................5
Audit your environment............................................................................................................5
Evaluate BitLocker authentication methods.............................................................................8
Create a BitLocker support matrix..........................................................................................12
Define hardware implementation standards...........................................................................13
Define disk configuration........................................................................................................18
Define Active Directory Domain Services configuration..........................................................19
Define BitLocker and Windows Vista Group Policy settings...................................................20
Define password and key management policies....................................................................23
Define support processes.......................................................................................................24
Define inventory and tracking processes................................................................................24
Determine when to configure computers for BitLocker...........................................................25
Checklist: Designing a BitLocker strategy..............................................................................27
Document your BitLocker design............................................................................................29
Case study: Contoso Pharmaceuticals strategy design.........................................................33
Appendix: Reviewing BitLocker Requirements..........................................................................46
3
Windows BitLocker Drive Encryption Design
Guide
This document describes the various aspects of planning for deploying Windows BitLockerTM
Drive Encryption for Windows Vista® Enterprise and Windows Vista® Ultimate computers in an
enterprise environment. To plan your enterprise deployment of BitLocker, you must first
understand your current policies and procedures. This guide provides a systematic approach to
help you frame your decision making process before deploying BitLocker and establish a
BitLocker design strategy.
This guide is intended for use by an infrastructure specialist or system architect. It assumes that
you have a good understanding of how BitLocker and TPM work on a functional level.
After you read this guide and finish gathering and documenting your organization's requirements,
you will have the information necessary to begin deploying BitLocker using the guidance in the
Windows BitLocker Drive Encryption Deployment Guide (http://go.microsoft.com/fwlink/?
LinkId=96685).
Overview of BitLocker
BitLocker is a data protection feature available in Windows Vista Enterprise and Windows Vista
Ultimate for client computers, and in Windows Server® 2008. BitLocker addresses the threats of
data theft and of exposure from lost, stolen, or inappropriately decommissioned personal
computers by providing a closely integrated solution in Windows Vista.
Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a
software attack tool against it or by transferring the computer’s hard disk to a different computer.
BitLocker helps mitigate unauthorized data access by enhancing Windows Vista file and system
protections. BitLocker also helps render data inaccessible when BitLocker-protected computers
are decommissioned or recycled.
For more information about the TPM and BitLocker, see the following resources.
• Windows BitLocker Drive Encryption Technical Overview (http://go.microsoft.com/fwlink/?
LinkId=77977).
• Windows BitLocker Drive Encryption Frequently Asked Questions
(http://go.microsoft.com/fwlink/?LinkId=77976).
• Trusted Computing Group: Trusted Platform Module (TPM) Specifications
(http://go.microsoft.com/fwlink/?LinkID=69584).
4
Designing a BitLocker Strategy
This section describes the critical planning steps that are necessary to deploy BitLocker Drive
Encryption. Review and complete these planning tasks before you begin deployment. The
following sections will help you collect information that you can use to frame your decision-making
process about deploying and managing BitLocker systems. When you design your BitLocker
deployment strategy, define the appropriate policies and configuration requirements based on the
business requirements of your organization.
Topics in this section
• Audit your environment
• Evaluate BitLocker authentication methods
• Create a BitLocker support matrix
• Define hardware implementation standards
• Define disk configuration
• Define Active Directory Domain Services configuration
• Define BitLocker and Windows Vista Group Policy settings
• Define password and key management policies
• Define support processes
• Define inventory and tracking processes
• Determine when to configure computers for BitLocker
• Checklist: Designing a BitLocker strategy
• Document your BitLocker design
• Case study: Contoso Pharmaceuticals strategy design
Note
Refer to the "Audit Your Environment" section in Case study: Contoso Pharmaceuticals
strategy design to understand how Contoso audited and documented its environment.
5
Document current security policies
Begin by reviewing your existing corporate security policies as they relate to disk encryption
software. If your organization is not currently using disk encryption software, none of these
policies will exist. If you are using disk encryption software, then you might need to modify your
organization's policies to address the capabilities of BitLocker.
Use the following questions to help you document your organization's current disk encryption
security policies:
1. Are there policies to address which computers will use BitLocker and which computers
will not use BitLocker?
2. What policies exist to control recovery password and recovery key storage?
3. What are the policies for validating the identity of users that need to perform BitLocker
recovery?
4. What policies exist to control who in the organization has access to recovery data?
5. What policies exist to control computer decommissioning or retirement?
Recommendation
Test your individual hardware platforms with the BitLocker system check option while you are
enabling BitLocker. After you install Windows Vista, use the BitLocker Control Panel item to start
a BitLocker system check on the computer.The system check will ensure that BitLocker can read
the recovery information from a USB device and encryption keys correctly before it encrypts the
volume. CD and DVD drives cannot act as a block storage device and cannot be used to store
the BitLocker recovery material.
7
5. In the BitLocker Drive Encryption dialog box, select an authentication method and
save the BitLocker recovery material in whatever manner you prefer.
6. On the Encrypt the volume page, select the Run BitLocker system check check
box, and then click Next.
7. Restart and log on to the computer, and then check the notification area for any
BitLocker notifications.
8
USB startup key to start the computer or resume from hibernation, and does not provide the pre-
startup system integrity verification offered by BitLocker working with a TPM.
BitLocker in Windows Vista supports four different authentication modes, depending on the
computer's hardware capabilities and the desired level of security.
9
Authentication method Requires user interaction Description
BitLocker authentication methods differ in the level of protection offered, cost of deployment, and
ease of use.
Review the questions and decision-making flowchart below when evaluating authentication
modes to help deploy a solution that best meets your security needs.
10
Decision-making flowchart
Note
Refer to the "Evaluate BitLocker authentication methods" section in Case study: Contoso
Pharmaceuticals strategy design to understand how Contoso documented its current
environment.
12
• Remote location computers
Based on the BitLocker key protectors that you have decided to use, and how you have grouped
your various computers, document the BitLocker authentication modes in your environment. You
can use the sample support matrix table in Document your BitLocker design in the "Create a
BitLocker support matrix" section.
13
TPM states of existence
For each of the TPM states of existence, the TPM can transition into another state (for example,
moving from disabled to enabled). The states are not exclusive.
State Description
Un-owned The TPM does not have a storage root key and
may or may not have an endorsement key.
Important
BitLocker cannot use the TPM until it is in the following state: enabled, activated, and
owned. When the TPM is in this state and only when it is in this state, all operations are
available.
14
The state of the TPM exists independent of the computer’s operating system. Once the TPM is
enabled, activated, and owned, the state of the TPM is preserved if the operating system is
reinstalled.
Endorsement keys
For a TPM to be usable by BitLocker, it must contain an endorsement key, which is an RSA key
pair. The private half of the key pair is held inside the TPM and is never revealed or accessible
outside the TPM. If the TPM does not contain an endorsement key, BitLocker will force the TPM
to generate one automatically as part of BitLocker setup.
An endorsement key can be created at various points in the TPM’s lifecycle, but needs to be
created only once for the lifetime of the TPM. If an endorsement key does not exist for the TPM, it
must be created before TPM ownership can be taken.
You can create the endorsement key with any one of the following:
• BitLocker user interface when you take TPM ownership. For guidance about how to take
ownership of the TPM, see the Windows Trusted Platform Module Step-by-Step Guide
(http://go.microsoft.com/fwlink/?LinkID=82830).
• TPM WMI providers (http://go.microsoft.com/fwlink/?LinkId=93478)
• For a sample WMI script, download the Microsoft BitLocker Deployment Code
Samples (http://go.microsoft.com/fwlink/?LinkID=96685).
For more information about the TPM and the TCG, see the Trusted Computing Group: Trusted
Platform Module (TPM) Specifications (http://go.microsoft.com/fwlink/?LinkID=69584).
Recommendation
Test your individual hardware platforms with the BitLocker system check option while you are
enabling BitLocker. After you install Windows Vista, use the BitLocker Control Panel item to start
a BitLocker system check on the computer.The system check will ensure that BitLocker can read
the recovery information from a USB device and encryption keys correctly before it encrypts the
15
volume. CD and DVD drives cannot act as a block storage device and cannot be used to store
the BitLocker recovery material.
OEM-specific requirements
Choose computers that have a TPM version 1.2 that is certified for Windows Vista. For TPM-
compliant computers, each manufacturer will likely have a different default shipping configuration.
Use the following questions to help plan for automated deployment:
• What tools does the OEM provide to automate TPM management?
Investigate what management tools your OEM provides for managing the BIOS configuration
of your computers. These tools should be comprehensive enough to manage the state of the
TPM and the BIOS administrator password if required. Without these tools, several manual
steps could be interjected into your automated build process.
• When in the computer’s lifecycle is the endorsement key for the TPM generated?
Before you can use a TPM, it must have an endorsement key applied to it. The endorsement
key is valid only for the TPM with which it is associated, and it must be tracked for the entire
life of the computer. There are various times when this endorsement key can be applied to
the platform. The manufacturer can do this during the build process, or a value-added reseller
or the computer owner (consumer) can do it. It is important to know where or when the
endorsement key is applied because this information must be kept secure and tracked for the
entire life of the computer.
You can automate creation of the endorsement key during your build process, or you can rely
on the manufacturer or OEM to apply the endorsement key. If you choose to create the
endorsement key during your build process, and if an endorsement key does not exist, see
the sample WMI script, enablebitlocker.vbs, which is available as part of the Microsoft
16
BitLocker Deployment Code Samples (http://go.microsoft.com/fwlink/?LinkID=96685). The
sample script automatically creates an endorsement key when taking ownership of the TPM.
If you use the BitLocker user interface to enable BitLocker, an endorsement key will be
created automatically when taking ownership of the TPM.
• How is the TPM configured in the BIOS when it is shipped to your organization?
From a deployment perspective it is important to have computers shipped to you in a state
that is secure and that allows you to streamline your deployment process. Computers that are
equipped with a TPM and shipped to your organization in a disabled state will require
physical presence at some point during your build process to enable it. This physical
presence requirement will inject a manual step into your deployment. Some OEMs might
provide automation tools to override this manual step, but this depends on each OEM’s
implementation of the TPM technology.
The TPM can also be shipped in an enabled state. This allows you to automate the activation
and ownership process within Windows Vista, using the BitLocker WMI providers.
• Does the OEM require a BIOS administrator password to use the TPM?
As a part of the physical presence specification, the OEM might require that a BIOS
administrator password be set to enable and activate the TPM. This requirement might also
inject a manual step into your deployment process. Again, OEMs might provide automation
tools to specify the password. You might consider having the OEM ship the computer not only
with the TPM enabled, but also with a default BIOS administrator password for your
organization. You can then change the BIOS password during the build process if the OEM
provides the appropriate automation tools.
• How is the boot order on the BitLocker computers configured?
The boot order on a computer can affect your build process, if you choose to build your
computers using a bootable DVD. If the CD or DVD drive is first in the boot order, or before
the hard disk that will boot Windows Vista, then it would be included in the measurement of
the boot process that BitLocker performs. However, this would be blocked when you try to
enable BitLocker, forcing you to eject the CD or DVD and restart the computer.
If the boot order is configured with the hard disk that will boot Windows Vista before the CD or
DVD drive, then the CD or DVD is not measured during the system boot process. In this
configuration, you still need to remove any CD or DVD bootable media before enabling
BitLocker, but you do not have to restart the computer. However, you can programmatically
eject any CD or DVD media and then continue enabling BitLocker.
If you are planning to automate your build process completely, ensure that the boot order of
your target computers is configured in a way to support this type of automation.
Note
Refer to the OEM-specific configuration section in Case study: Contoso Pharmaceuticals
strategy design to understand how Contoso has planned to support BitLocker systems.
17
Define disk configuration
To function correctly, BitLocker requires a specific disk configuration. Configuring the disk drives
of your computer is the most critical step when preparing a computer to use BitLocker encryption.
BitLocker requires two NTFS partitions: one for the operating system, and one for the system.
The system partition should be at least 1.5 GB for BitLocker, Windows Vista recovery, and
Windows Vista servicing. The operating system partition must meet the Windows Vista installation
requirements.
Windows Recovery Environment (Windows RE) is an extensible recovery platform that is based
on Windows Pre-installation Environment (Windows PE). When the computer fails to start,
Windows automatically transitions into this environment, and the Startup Repair tool in Windows
RE automates the diagnosis and repair of an unbootable Windows Vista installation. Windows RE
also contains the drivers and tools that are needed to unlock a volume protected by BitLocker by
providing a recovery key or recovery password. To use Windows RE in conjunction with
BitLocker, the Windows RE boot image must reside on a volume that is not protected by
BitLocker. To use Windows RE in conjunction with BitLocker, follow the partitioning guidelines in
the table below.
Caution
If you place Windows RE and BitLocker on the same (active) partition, you cannot
perform a restore from a Complete PC backup without using a Windows RE CD. This is
because Complete PC must always restore the active partition, but fails do so when the
files that Windows RE uses to start from are also on the active partition. To ensure that
you can perform a complete PC backup without requiring a Windows RE CD, install
Windows RE and BitLocker on separate partitions.
Windows RE can also be used from boot media other than the local hard disk. If you choose not
to install Windows RE on the local hard disk of BitLocker-enabled computers, you can use
alternate boot methods, such as Windows Deployment Services, CD-ROM, or USB flash drive,
for recovery.
18
Recommendation
Install the Windows RE tools on all of the computers on which you plan to use BitLocker, or give
support personnel an alternate Windows RE boot method, such as Windows Deployment
Services or removable media. Windows RE enables support personnel to use recovery keys and
passwords to unlock BitLocker-protected volumes.
Note
If you have a Windows Server® 2008 Beta 3 domain controller in your environment,
the schema extensions are already in place and do not need to be updated.
By default, domain administrators are the only users that will have access to BitLocker recovery
information. When you plan your support process, define what parts of your organization need
access to BitLocker recovery information. Use this information to define how the appropriate
rights will be delegated in your AD DS environment.
19
Recommenation
We recommend that you extend your Active Directory schema to support storing BitLocker
recovery material in AD DS. If you have more than one AD DS forest in your environment, you
must extend the schema in each forest that contains BitLocker computers.
For more information about Active Directory configuration and BitLocker recovery, see the
following resources:
• Configuring Active Directory to Back up Windows BitLocker Drive Encryption and Trusted
Platform Module Recovery Information (http://go.microsoft.com/fwlink/?LinkId=82827).
• Retrieving a Recovery Password (http://go.microsoft.com/fwlink/?LinkId=93476).
• BitLocker Repair Tool (http://go.microsoft.com/fwlink/?LinkId=91736).
20
Administrative templates to configure these Group Policy settings are pre-installed by Windows
and made available through gpedit.msc. For Windows Vista, these templates are located in
%windir%\PolicyDefinitions and named tpm.admx and VolumeEncryption.admx.
Recommendation
It is best practice always to require backup of recovery information for both the TPM and
BitLocker to AD DS. Configure the Group Policy settings below for your BitLocker-protected
computers.
Refer to the "Define BitLocker and Windows Vista Group Policy settings" section in Case study:
Contoso Pharmaceuticals strategy design to understand how Contoso intends to support
BitLocker systems.
FIPS settings
You can configure the Federal Information Processing Standard (FIPS) settings in Windows Vista
for FIPS compliance. As an effect of FIPS compliance, users cannot create or save a BitLocker
recovery password. You can optionally create a recovery key, however. When FIPS is disabled,
based on the existing Group Policy, users must create and save a recovery key or recovery
password while enabling BitLocker using the user interface.
Important
If you enable this setting, users will be unable to save a recovery password to any
location. This includes AD DS and network folders. In addition, you cannot use WMI or
the BitLocker Drive Encryption wizard to create a recovery password.
You can save the optional recovery key to a USB flash drive. Because recovery passwords
cannot be saved to AD DS when FIPS is enabled, Windows Vista will display an error if AD DS
backup is required by Group Policy.
You can edit the FIPS setting by using the Security Policy Editor (Secpol.msc) or by editing the
Windows registry. You must be an administrator to perform either of these procedures.
The FIPS setting is located in the Security Policy Editor at Local Policies\Security Options\System
cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.
21
To edit the FIPS setting using the Security Policy Editor
1. Click the Start button, type secpol.msc into the Start Search box, and then click
secpol.msc.
2. uac_appears
3. In the console tree, expand Local Policies, and then click Security Options.
4. In the details pane, right-click System cryptography: Use FIPS compliant
algorithms for encryption, hashing, and signing, and then click Properties.
5. Enable or disable the setting, and then click OK.
Setting Configuration
In addition to power management Group Policy settings, you might also consider hiding the drive
letter of the system partition from Windows Shell (My Computer, folder views, etc.). The drive
22
letter is still visible from the command prompt. This is the unencrypted partition that BitLocker and
other Windows components use when booting the system. This setting can be used to prevent
users from easily saving data to this partition in an unencrypted state.
The following policy setting can be used to hide drive letters from Windows Explorer:
Setting Configuration
Note
This setting allows hiding only drive letters A through D. If you need to hide other drive
letters, see Microsoft Knowledge Base article 231289 (http://go.microsoft.com/fwlink/?
LinkId=93477).
23
Define support processes
In the previous section, you defined how BitLocker recovery material will be managed in your
environment. You should now consider how this information will be used in the support process.
Prepare to use the recovery material saved by BitLocker by defining and testing the necessary
support processes.
• Document what recovery material is created by BitLocker and where it is stored
For example, you might have chosen to use recovery keys in addition to recovery passwords.
Because recovery keys are not stored in AD DS, you might choose to store them in another
secure, documented location. Document what tools are available for accessing this
information, and any associated procedures or approval processes.
• Determine who in your organization will have access to BitLocker recovery
material
You might choose to limit the number of support personnel who have access to this type of
information. In some organizations with tiered Helpdesk support, access to this information
might exist only in the top tier. Conversely, in some organizations first-tier Helpdesk personnel
might have access to the recovery material for faster end-user recovery. Regardless of how
you choose to grant access to this recovery information, ensure that only the individuals who
need appropriate access have it.
• Develop processes for remote and local recovery
Local recovery is the recovery of a BitLocker-protected computer when an IT technician is
physically present at the computer. Remote recovery is the recovery of a BitLocker-protected
computer by the user of the computer when an IT technician is not physically present. Fully
document how users are supported, whether they are considered local or remote.
• Define the end-to-end support model that is used to support BitLocker for each of
the supported BitLocker configurations
You can use the Create a BitLocker support matrix topic to help create the end-to-end
support model for BitLocker.
Note
Refer to the "Define password and key management policies" section in Case study:
Contoso Pharmaceuticals strategy design to understand how Contoso documented its
current environment.
24
impact on systems management tools. Develop a strategy for managing and tracking these
computers.
Pre-build configuration
In the pre-build configuration phase you may choose to make BIOS setting changes to enable
and activate the TPM, meet the physical presence requirement, and set BIOS passwords.
However this phase of the deployment may not necessarily be done by your organization it could
be a service provided by your OEM.
If you or your OEM complete pre-build configuration, you must still configure the hard disk for
BitLocker and enable BitLocker, either during or after the build process.
25
Note
This document does not provide high-level information about how Windows Deployment
Services works and its benefits. To learn more about Windows Deployment Services, see
the Windows Vista Deployment Step by Step Guide (http://go.microsoft.com/fwlink/?
LinkID=53553).
Typically, you use Windows Deployment Services when you want to install pre-configured custom
images to computers that have no operating system installed, or to computers whose existing
data you want to overwrite.
Unattended installation
In the unattended installation design, an image of Windows Vista is deployed to computers using
an unattended answer file. Unattended installation is a Windows installation method that does not
require user interaction during installation. Windows Setup works with an unattended installation
answer file to automate online installations and customizations of Windows. This method is useful
for large-scale rollouts and for achieving consistency and precision in the configuration of each
computer.
Unattended installation requires the creation of one or more answer files that contain
customizations for an installation. For example, you can change the Internet Explorer
configuration or partition and format hard disks.
Note
This document does not provide high-level information about how unattended setup
works and its benefits. To learn more about unattended installation, see the Unattended
Installation Settings Reference (http://go.microsoft.com/fwlink/?LinkId=93479).
Windows imaging
Windows imaging is a Windows installation method that uses the ImageX command-line tool and
Windows image (.wim) format files. Windows imaging enables you to automate much of the
BitLocker setup, but requires that you perform some final setup tasks manually.
Note
This document does not provide high-level information about how ImageX works and its
benefits. To learn more about ImageX, see the ImageX Technical Reference
(http://go.microsoft.com/fwlink/?LinkId=93480).
Windows imaging with ImageX requires that all of the existing data on the hard drive, including
any existing operating system, be overwritten. Typically, you use a Windows imaging with ImageX
when you want to install pre-configured custom images to computers that have no operating
system installed, or to computers whose existing data you want to overwrite.
26
Post-build configuration
The post-build configuration method is very flexible and can be accomplished using numerous
methods. You can configure a computer for BitLocker immediately after the system build process
completes, or at a later time after the computer is delivered to the end user. The IT administrators
in your organization may choose to enable and configure BitLocker at a later time using another
software distribution tool, Group Policy scripting, or logon scripts.
Before you enable BitLocker, the hard disk must be partitioned to meet BitLocker requirements. If
the computer was not prepared for BitLocker during the build process, you must use the
BitLocker Drive Preparation Tool (http://go.microsoft.com/fwlink/?LinkId=83261) to prepare the
hard disk BitLocker. After you have prepared the hard drive for BitLocker, you can use either the
manage-bde.wsf tool or the BitLocker and TPM WMI providers to enable and configure
BitLocker for computers that already have Windows Vista installed.
Recommendation
The following table shows recommendations for using both of these methods.
Manage-bde.wsf 25 or fewer
User-initiated configuration
You may choose to provide BitLocker as a service to individual internal organizations or to the
end users themselves. A custom solution could be created to allow users the ability to selectively
enroll and configure their computers to use BitLocker.
Note
Complete the tasks in this checklist in order. When a reference link takes you to a
conceptual topic, review the topic and complete the tasks detailed in the topic, and then
return to this topic so that you can proceed with the remaining tasks in this checklist.
Checklist: Designing a BitLocker strategy
Task Reference
passwords.
29
• Define BitLocker and Windows Vista Group Policy settings
• Define password and key management policies
• Define support processes
• Define inventory and tracking processes
Current IT organization
You can use the following table to document service roles, users, and computers in your
organization.
You can use the following table to document how systems are built in your organization.
Understanding the BitLocker functionality that you want to enable can help you select the
appropriate goals for your deployment. Specify whether your scenario requires each of the areas
of functionality in the following table.
30
Functionality Yes/No
Platform TPM only TPM + PIN TPM + startup Startup key Recovery
support key password
Caution
If you place Windows RE and BitLocker on the same (active) partition, you cannot
perform a restore from a Complete PC backup without using a Windows RE CD. This is
31
because Complete PC must always restore the active partition, but fails do so when the
files that Windows RE uses to start from are also on the active partition. To ensure that
you can perform a complete PC backup without requiring a Windows RE CD, install
Windows RE and BitLocker on separate partitions.
Setting Configuration
The following table shows sample values that document key management policies. For a sample
BitLocker WMI deployment script, see the sample WMI script enablebitlocker.vbs, which is part of
the Microsoft BitLocker Deployment Code Samples (http://go.microsoft.com/fwlink/?
LinkID=96685).
32
Define support processes
You can use the following table to define support processes for your organization at a high-level.
Component Process
33
The following table shows that new desktop deployments at Contoso occur within all three of the
company's organizations. It is important to know where computers enter and exit the organization,
as well as how they are configured and deployed when they arrive.
Complicating deployment and management, Contoso has several physical locations. The
following figure shows the physical layout of Contoso.
34
Contoso physical layout
35
Each of the three groups has created its own new method of building and deploying
Windows Vista operating systems to take advantage of the significant changes to Windows Vista
deployment tools. Contoso is installing only Windows Vista as the standard corporate operating
system.
The process that each business unit follows is independent. However, they do share some
infrastructure dependencies. The following table shows the processes that each business unit
uses, as well as the infrastructure components on which they rely.
Central Windows Vista PXE boot Integrated with PXE boot servers
imaging format Windows PE image File share servers
Authentication
Research OEM applied OEM applied Some integrated File share servers
sector-based image image with image, Authentication
others scripted
Various Contoso departments use unattended setup, sector-based, and file-based imaging
technology to build computers before issuing them to end users' computers. Some departments
have the computers pre-configured by the OEM.
The following figure shows a comparison among the three build processes that exist at Contoso.
36
Contoso build processes
Each vertical pillar represents a build process flow for an individual business unit. Task boxes
framed in red are described in the deployment section of this guide. These tasks are described
because they relate to deploying Windows Vista with BitLocker Drive Encryption. Most of these
tasks overlap all three of the build processes, even though the processes are different from each
other.
37
Contoso's security organization recently mandated that all computer systems that run
Windows Vista will use BitLocker Drive Encryption. Contoso had recently gone through a
hardware refresh, which allowed the company to support Windows Vista on most of its
computers. Not all of the devices in the first wave have a TPM version 1.2. However, most of
the second-wave replacements have this capability. Because of the mix of TPM and non-TPM
hardware, and the security mandate, they have decided to support BitLocker on both TPM-
based and non-TPM-based computers.
• What areas of your organization need a baseline level of data protection?
Most Contoso computers in the Corporate – Secure Sites that will be running Windows Vista
with BitLocker do not contain highly sensitive data and are not mobile computers. For this
reason, Contoso wants to configure these computers with the most transparent configuration
of BitLocker, and the configuration that will have the least impact on users. They have
decided to enable BitLocker using the TPM-only mode on these types of systems.
• What areas of your organization need a more secure level of data protection?
There are several areas in the Contoso environment where the level of data protection needs
to be increased because of the sensitivity of data on these computers. In the Research and
Sales departments, the data that is stored on these computers is classified as very sensitive.
These groups also have more laptop computers than desktop computers in the environment.
For this reason, Contoso has decided to use the TPM + PIN on the laptop computers and the
TPM + USB startup key on the desktop computers.
• What multifactor authentication mode does your organization prefer?
Contoso decided to use multifactor authentication on their computers with highly sensitive
data. For their laptop computers, they chose to use a PIN rather than a USB startup key,
because of the possibility that a user might leave the USB startup key with the computer in an
unprotected situation. For the desktop computers, they have chosen a USB key because all
of these computers are located in field sales locations where the USB startup keys can be
secured when the computers are left unattended.
Corporate desktop – secure site Systems will use BitLocker encryption with a
TPM or USB startup key, depending on
hardware availability. This will be used to control
38
System classification Description
Corporate desktop – field site Systems will use BitLocker encryption with a
TPM and a USB startup key. These desktops
are shared-use computers in field sales
locations with limited security. USB drives will
contain startup keys and will be locked in a safe
when not in use. This will be used to control
data exposure and to manage asset retirement.
Corporate laptop New systems will use a TPM and a PIN for all
computers. Non-TPM computers will use
startup keys on USB drives, but all new
computers will be purchased with TPM devices.
This will be used to control data exposure and
manage asset retirement.
39
5. Helpdesk technician validates the user's identity and gives the user the recovery
password to unlock the volume.
6. User unlocks the volume by typing the 48-digit recovery password into the BitLocker
recovery console.
7. Helpdesk technician verifies that the user has successfully unlocked the volume.
8. Helpdesk technician creates a new recovery password and escrows it to AD DS.
9. AD DS deletes the used recovery password.
10. Helpdesk technician documents the root cause of the recovery for organizational
tracking and closes the support ticket.
Deployment
As part of its deployment planning, Contoso identified both Group Policy settings and key
management policies.
Contoso-BitLocker-Desk-SecureSite
Setting Configuration
Turn on BitLocker backup to Active Directory Require Active Directory Domain Services
Domain Services backup of BitLocker Recovery passwords and
key packages
Turn on TPM backup to Active Directory Require Active Directory Domain Services
Domain Services backup of TPM owner information
40
Setting Configuration
Contoso-BitLocker-Desk-FieldSite
Setting Configuration
Turn on BitLocker backup to Active Directory Require Active Directory Domain Services
Domain Services backup of BitLocker Recovery passwords and
key packages
Turn on TPM backup to Active Directory Require Active Directory Domain Services
Domain Services backup of TPM owner information
Contoso-BitLocker-Laptop
Setting Configuration
Turn on BitLocker backup to Active Directory Require Active Directory Domain Services
Domain Services backup of BitLocker Recovery passwords and
key packages
Control Panel Setup: Enable Advanced Startup Require Startup PIN with TPM
Options
Turn on TPM backup to Active Directory Require Active Directory Domain Services
Domain Services backup of TPM owner Information
Note
Client support for WMI filters exists only on Windows XP, Windows Server 2003, and later
operating systems. WMI filters are available only in domains that have at least one
Windows Server 2003 domain controller.
Other Group Policy settings
41
Additional Group Policy settings establish a default power plan and restrict access to the Power
Options Control Panel item. This applies to the computer object portion of the Group Policy. The
following tables detail the specific Group Policy settings that are configured in the Contoso
environment.
Contoso-BitLocker-Desk-SecureSite
Contoso-BitLocker-Desk-FieldSite
Contoso-BitLocker-Laptop
Pre-build configuration
Contoso has defined its pre-build configuration by using OEM-specific configuration and defining
the disk configuration that will be implemented for each department.
42
OEM-specific configuration
All three business units have their computers preconfigured from the OEM with the following
settings:
• Endorsement keys are generated and managed by a value-added-reseller after the
computer is manufactured.
• TPM is shipped in the enabled and activated state.
• Default BIOS administrator password is set.
The Research IT business unit at Contoso also has the OEM apply a Contoso image before the
computers are shipped. The other business units apply the operating system to their computers
after they receive them from the OEM.
<WillShowUI>Never</WillShowUI>
<Disk>
<DiskID>0</DiskID>
<WillWipeDisk>true</WillWipeDisk>
<CreatePartitions>
<CreatePartition>
<Order>1</Order>
<Type>Primary</Type>
<Size>1500</Size>
</CreatePartition>
<CreatePartition>
<Order>2</Order>
<Type>Primary</Type>
43
<Extend>true</Extend>
</CreatePartition>
</CreatePartitions>
<ModifyPartitions>
<ModifyPartition>
<Order>1</Order>
<PartitionID>1</PartitionID>
<Letter>S</Letter>
<Label>SYSTEM</Label>
<Format>NTFS</Format>
<Active>true</Active>
</ModifyPartition>
<ModifyPartition>
<Order>2</Order>
<PartitionID>2</PartitionID>
<Letter>C</Letter>
<Label>OS</Label><Label>OS</Label>
<Format>NTFS</Format>
<Active>false</Active>
</ModifyPartition>
</MoDifyPartitions>
</Disk>
</DiskConfiguration>
Post-build configuration
Contoso has created definitions for TPM management and encryption configuration.
TPM management
Taking ownership of the TPM is automated during the computer build process. This is
accomplished by auto-logging on to the computer at the end of the build process with a domain
user account. Logon with a domain account because the Contoso BitLocker Group Policy settings
require the TPM owner information be backed up to AD DS. During the take-ownership process, a
hash of the TPM owner password is saved to the computers object in AD DS. This only happens
at the point you take ownership so it is important to have access to AD DS and the computer
object.
44
To automate the process, add the following entries to the Windows-Shell-Setup section of the
unattended installation answer files which are part of the image based and unattended build
processes.
<AutoLogon>
<Enabled>true</Enabled>
<Username>buildaccount</Username>
<Password>**********</Password>
<LogonCount>1</LogonCount>
</AutoLogon>
<FirstLogonCommands>
<SynchronousCommand>
<Order>1</Order>
</SynchronousCommand>
</FirstLogonCommands>
Encryption configuration
At Contoso, there are three standard BitLocker configurations: secure site computers, field site
computers, and laptop computers. During the build process at Contoso, one of the last steps is to
enable BitLocker and start the volume encryption. The following tables show the commands that
are issued on the various computer types, depending on the desired configuration.
Contoso-BitLocker-Desk-SecureSite
Command Description
Enablebitlocker.vbs /on:tpm /rk /promptuser /l: For computers with a TPM, enable BitLocker
%temp%\enablebde.log using a TPM, recovery password, and recovery
key.
Enablebitlocker.vbs /on:tpm /rk /promptuser /l: For computers without a TPM, enable BitLocker
%temp%\enablebde.log using a startup key, recovery password, and
recovery key.
Contoso-BitLocker-Desk-FieldSite
Command Description
Enablebitlocker.vbs /on:tsk /rk /promptuser /l: Enable BitLocker using a startup key, recovery
45
Command Description
Contoso-BitLocker-Laptop
Command Description
Enablebitlocker.vbs /on:tp /rk /promptuser /l: For laptop computers with a TPM, enable
%temp%\enablebde.log BitLocker using a TPM + PIN, recovery
password, and recovery key.
Enablebitlocker.vbs /on:usb /rk /promptuser /l: For computers without a TPM, enable BitLocker
%temp%\enablebde.log using a startup key, recovery password, and
recovery key.
Requirement Description
File system Two NTFS drive partitions, one for the system
volume and one for the operating system
volume. The system volume partition must be at
least 1.5 GB and set as the active partition.
*A TPM is not required for BitLocker. However, only a computer with a TPM can provide the
additional security of pre-boot system integrity verification.
47