Chapter 13. TPM and BitLocker Drive Encryption

Working with trusted platforms

Managing TPM

Introducing BitLocker Drive Encryption

Using hardware encryption, secure boot, and Network Unlock

Deploying BitLocker Drive Encryption

Setting up and managing BitLocker Drive Encryption

MANY of the security features built into the Microsoft Windows operating system are designed to protect a computer from attacks by individuals accessing the computer over the network or from the Internet. But what about when individuals have direct physical access to a computer? When someone has direct physical access to a computer, many of Windows security safeguards don’t apply. For example, if someone can boot a computer—even if it is to another operating system that person ...

Get Windows Server® 2012 Inside Out now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.