How to encrypt a disk or flash drive with secret data using Bitlocker. A few final words


IN Lately More and more often I hear about ransomware viruses that encrypt the contents of your disk and extort money. Microsoft has built protection against ransomware viruses into Windows 10.

Protection works on system level. “Controlled folder access” allows you to keep certain user folders under control.

The trick is that any action is blocked by default. This feature should prevent any suspicious application from changing the contents of your selected folders. When the user activates this function, the following folders are protected by default: “Images”, “Videos”, “Documents” and others. If you need to protect specific folder, then you need to add it yourself.

In order to this feature worked, Windows Defender must be turned on. Brief instructions will be given below.

First you need to open the center Windows protection Defender and for this we enter in the Start menu search - Windows Defender Center - and open the application that appears. A window will appear in front of you with the following content:

Sometimes, due to inattention, you open Windows Defender Setting, then select - Windows Defender Security Center

Select the item - Virus & threat protection - in the left side menu, and then in the main window - Virus & threat protection settings -

Now in the interface that appears, we go down until we see the item - Controlled folder access - and enable the function by toggling the On/Off toggle switch. A window will appear asking “Do you want to allow this application to make changes to how your device operates?” We answer in the affirmative.

By doing this, we enabled the protection function for the main folders “Images”, “Desktop”, “Videos”, etc. Now let’s select those folders and directories that need to be protected in addition to the main ones. To do this, select the option - Protected Folders -

And then we add folders. After adding all the folders, go back and select the option - Allow an app through Controlled folder access, thereby allowing specific applications change contents in protected folders. If you are working with cloud services through clients, then you should add them too so that nothing interferes with synchronization.

Now you have completed setting up protection against ransomware viruses in Windows 10. To disable it, simply switch the toggle switch to Off mode in - Controlled Folder Access -.

Now, if an unknown virus tries to encrypt files in these folders, the user will see a notification in the right side panel. And all actions of the virus will be stopped.

This is very useful feature and it not only protects selected folders from ransomware viruses, but also from any unauthorized changes (image editors, text editors that were not included in the exclusion list).

The disk encryption function or BitLocker appeared in Windows 7. With its help, you can encrypt an SSD, HDD drives or removable media. However, this process is accompanied by a number of difficulties, the main one of which is the lack of a TPM module, which can be removable or integrated into motherboard. As a result, the user may encounter a message that “...the device cannot use the TPM. The administrator must set the parameter. Allow BitLocker to be used without a compatible TPM."

How to fix this error and enable BitLocker in Windows 10?

Read also: Putting a password on a flash drive in Windows 8

Enable BitLocker on Windows 10 without a compatible TPM

To enable disk encryption without a compatible TPM, you must make changes in the Local Group Editor Windows policies 10. To do this we perform the following actions:

  • Press “Win+R” and enter “msc”.

  • Go to the branch “Computer Configuration”, “Administrative Templates”, “ Windows components", "This policy setting allows you to select BitLocker drive encryption", "Operating system drives". We find the option “This policy setting allows you to configure the requirement for additional authentication at startup.”

  • Double click open the parameter settings. We set the following values.

  • After the system restarts, you can go to the “Control Panel” and select “BitLocker Drive Encryption”.

It is worth noting that before creating an encrypted device, it is worth doing backup copy data.

SoftikBox.com

How to enable BitLocker on Windows 10

2. In the “Parameters” window, go to “System”

3. Next, go to the “About System” tab, go to the very bottom and click “BitLocker Settings”

4. Here we select the removable media that we want to protect and click “Enable BitLocker”

5. Wait for the action to complete.

6. Next we will need to select one of the blocking options:

7. I chose password protection! Check the box “Use a password to unlock the disk,” then enter the password we created twice and click “Next.”

8. In the next window, select a recovery option in case you forget your password, for example “Save to file”

9. Select the location to save the file and click “Save”

10. Click “Next”

11. Set the following parameters to suit your needs, for example, I chose “Encrypt the entire disk”, select the option and click “Next”

12. In the next window “Start encryption”

13. We are waiting for the end of encryption of the removable storage device you have chosen!

ns1club.ru

How to encrypt your Windows 10 computer using BitLocker

If you store confidential information on your computer, then system encryption hard drive will be an excellent option to ensure the safety of your data. In this article we will tell you how to encrypt your computer's system drive using the most popular encryption tool from the company Microsoft utilities BitLocker, which comes with all professional versions of Windows. Since Windows release Vista, Microsoft company offers new feature data protection called BitLocker Drive Encryption. Windows 7 introduced BitLocker To Go, encryption for portable storage devices such as flash drives and SD cards.

There is no need to download and install Biltocker, it is already built into operating system and is only available in Window 10 Pro and Enterprise. You can see which edition of Windows is installed on your computer in the Control Panel on the System tab. If you have Window 10 Home installed, which does not support BitLocker, we recommend that you pay attention to a program such as Vera Crypt.

Why Microsoft doesn't make this feature publicly available is an open question, given that data encryption is one of the most effective ways ensuring their safety. Encryption is a way to enhance the security of your data by ensuring that its contents can only be read by the owner of the appropriate encryption key. Windows 10 includes various encryption technologies. For example, encryption file system EFS and BitLocker Drive Encryption, which we will talk about in this article.

  • Encrypting your hard drive may take a long time. Before you begin, we recommend that you back up your data, as an unexpected power outage during the encryption process may damage it.
  • The Windows 10 November update includes more safe standard encryption. note that new standard encryption will only be compatible with Windows systems 10 November Update.
  • If your computer does not have a Trusted Platform Module (TPM) - a chip that gives the computer additional funds security, such as the ability to encrypt BitLocker drives. When you try to enable encryption, you may receive a TPM error message: "This device cannot use the Trusted Platform Module (TPM)"
To resolve this issue, use the EnableNoTPM.reg.zip file. Download, unzip and run this file, this will make the necessary changes to the registry to allow encryption without TPM. Enable BitLocker Drive Encryption in Windows 10. Click Start -> Explorer -> This PC. Then click right click mouse on system disk from Windows (usually drive C), select “Enable BitLocker” from the drop-down menu.

Come up with strong password, to unlock the hard drive. Every time you turn on your computer, Windows will ask you for this password to decrypt your data.


Choose how you want to back up the recovery key. It can be saved in account Microsoft, copy to USB drive or print.


Saved?! Now you need to specify which part of the disk you want to encrypt.

You will have two options:

  • If you encrypt new disk or a new PC, you only need to encrypt the part of the disk that is used in this moment. BitLocker will then automatically encrypt data as it is added.
  • If you enable BitLocker on a PC or drive you're already using, we recommend encrypting the entire drive. This will ensure that all data is protected.
For us, the second option is more preferable. Please note that encryption will take some time, especially if you have big disk. Make sure your computer is connected to the source uninterruptible power supply in case of power failures.
If you have installed November Windows updates 10, then you have access to the more secure XTS-AES encryption mode. Choose this option whenever possible.

When you are ready to start encrypting, click the “Continue” button


Restart your computer when prompted.

Remember the password you created earlier? Now is the time to introduce it.


After logging into Windows, you will notice that nothing global has changed.

To check the encryption status, click Start > File Explorer > This PC. Now you will see a drawn lock on the system disk. Right-click the drive and then select Manage BitLocker.

You will see the current state of the C:\ drive - BitLocker encryption (enabled). You can continue to use your computer as encryption occurs in background. You will be notified when it is completed.


If you want to pause encryption, you can do so in the BitLocker Drive Encryption panel Click on the "Pause Protection" link. After this point, newly created files and folders will not be encrypted. Here you can completely disable BitLocker and decrypt all your data.

P.S

We hope our article was useful and you have securely encrypted your data, but do not forget to take care of the security of your communication - try our anonymous VPN, today on special conditions c promo code BitLocker.

Read also

VeraСrypt - analogue of TrueCrypt, review, comparison and installation

blog.secretvpn.net

Scenario 1: Enable BitLocker Drive Encryption on the operating system drive (Windows 7)

Click Start, click Control Panel, click System and Security, and then click BitLocker Drive Encryption.

Click Turn on BitLocker for your operating system drive. BitLocker will check your computer for compliance system requirements. If the computer meets the requirements, BitLocker will display information about further actions, necessary for enable BitLocker(disk preparation, TPM enablement and disk encryption).

If the operating system drive has a single partition, BitLocker will prepare the drive by compressing it and creating a new operating system partition that is used for system files, which are necessary to start or restore the operating system and are not encrypted. This drive will not have a letter to prevent random save files on it. After preparing the disk, you must restart the computer.

If the TPM is not initialized, the BitLocker Setup Wizard will prompt you to remove all CD, DVD, and USB drives from the computer and restart the computer to begin enabling the TPM. You will be prompted to enable the TPM before the system boots, but in some cases you will need to go to BIOS settings and enable the TPM manually. It depends on the module computer BIOS. Once you confirm that the TPM needs to be enabled, the operating system starts and the Security Hardware Initializing indicator for the TPM appears.

If the computer does not have a TPM, BitLocker can be used, but it will use the Startup Key Only authentication method. All necessary information The encryption key is stored on a USB flash memory device, which must be connected to the computer by the user during system boot. The key, stored on a USB flash drive, is used to unlock the computer. The use of the TPM module is highly recommended as this module allows you to protect against attacks on critical important process computer boot. Using the Start Key Only method provides only disk encryption; it does not provide early boot component verification or hardware spoofing protection. For use this method The computer must be able to read USB devices before loading the operating system, and you must also enable this authentication method by selecting the Allow BitLocker without a compatible TPM policy checkbox in the Group Policy setting Require additional authentication at startup, located in the following area of ​​the Local Group Policy Editor: Configuration Computer\Administrative Templates\Windows Components\BitLocker Drive Protection\Operating System Drives.

After the TPM is initialized, the BitLocker Setup Wizard will prompt you to select a recovery key storage method. The following options are possible:

  • Save the recovery key to USB flash drive. Saves the recovery key to a USB flash drive.
  • Save the recovery key to a file. Saves the recovery key to network drive or in another location.
  • Print the recovery key. Prints the recovery key.

Use one or more options for saving the recovery key. For each item, you must follow the wizard to specify the location to save or print the recovery key. When the recovery key is saved, click Next.

Important
The recovery key is required when moving an encrypted disk to another computer or when making changes to the system boot information. The recovery key is a very important component, so it is recommended that you make additional copies of it and store them in a safe place so that you can refer to them if you need to restore access to the disk. The recovery key is required to unlock encrypted data when BitLocker enters a locked state. The recovery key is unique for each disk. The key is not suitable for recovering encrypted data from another BitLocker-protected drive. For additional security You must store recovery keys separately from your computer.
  • The BitLocker Setup Wizard asks you if you are ready to encrypt the drive. Make sure the Run BitLocker system scan check box is selected, and then click Continue.

    Confirm to restart your computer by clicking the Restart now button. After this, your computer will restart and BitLocker will check that it is compatible with BitLocker and is ready for encryption. If your computer is not ready, you will receive an error message after you log in.

    When the computer is ready for encryption, the Encryption status bar displays with the encryption progress. To check the status of drive encryption, hover your mouse over the BitLocker Drive Encryption icon in the notification area at the right edge of the taskbar. Encrypting the disk will take some time. You can use your computer while encryption is running, but performance will be lower than usual. Once encryption is complete, a message indicating successful completion operations.

    technet.microsoft.com

    How to encrypt a disk in Windows 10 so that no one steals your files?


    On Windows 10 and above earlier versions Windows provides file encryption using BitLocker technology. You only need to configure it once, and you can be sure that no one will gain access to your files or be able to run your programs, even if they do. physical access to the drive of your laptop or computer. How to turn it on BitLocker encryption? First of all, you need to activate security policies: 1. Press Win+R and run the command gpedit.msc. 2. Go to Administrative Templates > Windows Components BitLocker Drive Encryption > Operating System Drives.

    3. Double-click on “This policy setting allows you to configure the requirement for additional authentication at startup” and select the “Enabled” option. Now you can proceed directly to encryption: 1. Open “Explorer” > “My Computer” and select the drive that you want to encrypt. 2. Right-click the drive icon and select Enable BitLocker.

    3. A dialog box will open with options for accessing encrypted data. Follow its instructions and restart your computer. The disk will be encrypted. The encryption process can be lengthy, its duration depending on the volume of data being encrypted. During the encryption setup process, you will need to create a key or password to decrypt the data. The password must use mixed-case letters and numbers. When the drive is installed in your computer, data is encrypted and decrypted automatically, but if you remove the encrypted drive from it and connect it to another device, you will need a key to access the files.

    Data for key recovery can be stored on a flash drive, in Microsoft account, V text file or on a printed sheet of paper. Keep in mind that this is not the key itself, but only information that will help you recover it. The key can only be obtained after entering the login and password for the account Microsoft records, which makes it difficult to break the encryption.

    If you have encrypted the system logical drive, then the password will have to be entered during a cold start of the device or after it reboots.

    Encryption isn't just about stopping NSA - it's about protecting your sensitive data in case you ever lose your PC. Unlike all other modern consumer operating systems - macOS, Chrome OS, iOS and Android - Windows 10 still doesn't offer integrated encryption tools for everyone. You may have to pay for the Professional version of Windows 10 or use third party solution for encryption.

    If your Windows supports encryption

    Many new PCs that ship with Windows 10 automatically enable “Device Encryption.” This feature was first introduced in Windows 8.1 and requires special hardware capabilities. Not every computer will have this feature.

    There is one more limitation: it actually encrypts your drive only if you sign into Windows with a Microsoft account. Your recovery key is then uploaded to Microsoft servers. This will help you recover your files if you are unable to log into your computer. ( This is why the FBI probably isn't too worried about this feature, but we still recommend using encryption as a means of protecting your data from thieves.)

    Device encryption will also be enabled if you log in organization domain. For example, you might be logging into a domain that belongs to your employer or school. Your recovery key will then be uploaded to your organization's servers. However, this does not apply to computers regular user connected to domains.

    To check, Is device encryption enabled?, open the application Options, go to SystemAbout the program and find "Device Encryption" at the bottom of the About panel. If you don't see anything about device encryption here, your computer doesn't support device encryption or it's not enabled.

    If device encryption is turned on, or you can turn it on by signing in with a Microsoft account, you'll see a message telling you so.

    For Windows Pro users: BitLocker

    If device encryption is not enabled or you want a more powerful encryption solution that can also encrypt removable USB drives, you should consider BitLocker.

    Microsoft BitLocker encryption tool from Microsoft is now included in Windows composition several versions. However, Microsoft still limits BitLocker to professional, enterprise, and educational editions of Windows 10.

    BitLocker is most secure on a computer that has Hardware Trusted Platform Module (TPM), present on most modern PCs. If you have collected your own computer, you can add a TPM chip to it. Look for a TPM chip that is sold as an add-on module. You'll need one that supports the motherboard inside your PC.

    Windows usually says that BitLocker requires a TPM, but there is hidden option which allows enable BitLocker without TPM. You will have to use a USB flash drive as a "startup key" that must be present at every boot if you enable this option.

    If you already have a professional version of Windows 10 installed on your computer, you can search for "BitLocker" in the Start menu and use the BitLocker Control Panel to enable it. If you upgraded to Windows 7 Professional or Windows 8.1 Professional for free, you should have Windows 10 Professional.

    If you don't have Windows 10 Professional, you can pay approximately $99 to upgrade from Windows 10 Home to Windows 10 Professional. Just open the Settings app, go to Update and SecurityActivation and press the button Go to the store. You'll get access to BitLocker and other features that Windows 10 Professional includes.

    Security expert Bruce Schnee likes his own full disk encryption tool for Windows called BestCrypt. It is fully functional on Windows 10 with modern equipment. However, the cost of this tool is comparable to upgrading to Windows 10 Professional, so it is better to use BitLocker.

    For everyone: VeraCrypt

    Spending another $99 to encrypt your hard drive for some extra security may be too wasteful when modern Windows PCs often cost just a few hundred dollars. Meanwhile, you don't have to pay extra money for encryption because BitLocker isn't the only option. BitLocker is the most integrated, well-supported option, but there are other encryption tools you can use.

    Dear TrueCrypt, full encryption tool with open source code, which is no longer in development, and has some issues on Windows 10 PCs. It cannot encrypt GPT system partitions and boot them using UEFI, for most Windows 10 PCs. However, VeraCrypt is an open source tool for complete Source-based encryption TrueCrypt supports system encryption EFI partition from version 1.18a and 1.19.

    In other words, VeraCrypt will allow you to encrypt system partition PC Windows 10 free.

    TrueCrypt developers have closed development and declared TrueCrypt vulnerable and insecure, but researchers still doubt the truth of these claims. Much of the discussion around this centers on whether the NSA and other security agencies have a way to break this open source encryption. If you are simply encrypting your hard drive to prevent thieves from accessing your personal files when they steal your laptop, you won't have to worry about it. TrueCrypt is quite secure.

    VeraCrypt Project has improved security and could potentially be more secure than TrueCrypt. Whether you're encrypting just a few files or an entire system partition, this is what we recommend.

    We'd like to see Microsoft give Windows 10 users more access to BitLocker or, by at least, has extended Device Encryption so that it can be enabled on other PCs. Modern computers Windows should have built-in encryption, just like all other modern operating systems. Windows users 10 no need to pay more or look for a third party software, to protect their important data if their laptops are ever lost or stolen.

    This fall, Windows 10 was updated to version 1709, codenamed Fall. Creators Update or Redstone 3. Among the many changes, we were primarily interested in improved protection against unknown malware. Microsoft has taken a number of measures to counter ransomware Trojans and exploits. How successful were they?

    Old new defender

    Everything new is a well-rebranded old one. In the “autumn update for designers”, built-in security components were combined in the “Security Center” Windows Defender" Even the software firewall began to be called “Windows Defender Firewall,” but these changes are purely cosmetic. The more significant ones concern the new features, which we will look at in more detail below.

    Another old-new component introduced in Redstone 3 is called Exploit Protection. Windows Defender Exploit Guard, or simply EG, is enabled through the Windows Defender Security Center in the Application and Browser Control section.

    Technically, Exploit Guard is the former Enhanced Mitigation Experience Toolkit with a slightly increased feature set and a new interface. EMET appeared back in Windows times Vista has now been discontinued and Exploit Guard has taken its place. It belongs to the Advanced Threat Protection tools, along with the plug-in manager devices Device Guard and Application Guard. Evil tongues say that Microsoft initially wanted to introduce a common Advanced component System Security Guard, but the abbreviation turned out to be completely dissonant.

    Exploit protection

    Exploit Guard is just a risk reduction tool; it does not eliminate the need to close vulnerabilities in software, but it makes them more difficult to use. In general, the operating principle of Exploit Guard is to prohibit those operations that are most often used by malware.

    The problem is that many legitimate programs use them too. Moreover, there are old programs (or rather, dynamic libraries), which will simply stop working if used in Windows new memory control functions and others modern means protection.

    Therefore, setting up Exploit Guard is the same as using EMET previously. In my memory, many administrators spent months delving into the intricacies of settings, and then simply stopped using restrictive functions due to numerous user complaints.

    If safety comes first and you need to tighten the screws, then the most popular features of Exploit Guard were (since the days of EMET) and remain:

    • DEP(Data Execution Prevention) - preventing data execution. Does not allow execution of a code fragment that ends up in an area of ​​memory not intended for this purpose (for example, as a result of a stack overflow error);
    • random memory reallocation- prevents attacks on known addresses;
    • disabling expansion points- prevents the injection of DLLs into running processes (see about bypassing UAC, where this method was widely used);
    • team DisallowChildProcessCreation- prohibits the specified application from creating child processes;
    • filtering import address tables (IAF) and export address tables (EAF)- prevents a (malicious) process from brute-forcing address tables and accessing the memory page of system libraries;
    • CallerCheck- checks for rights to call confidential APIs;
    • SimExec- simulation of execution. Checks before actual code execution to whom sensitive API calls will return.

    Commands can be passed via PowerShell. For example, a ban on creating child processes looks like this:

    Set-ProcessMitigation -Name executable.exe -Enable DisallowChildProcessCreation

    All x86 processors and chipsets of the last ten years support DEP at the hardware level, and for very old ones a software implementation of this function is available. However, for the sake of compatibility of new Windows versions with the old one Microsoft software still recommends enabling DEP in “only for system processes" For the same reason, it was possible to disable DEP for any process. All of this has been successfully used in DEP bypass techniques.

    Therefore, it makes sense to use Exploit Guard only if it is possible to use several protective functions at once without causing a failure at least in the operation of the main applications. In practice this is rarely possible. Here is an example of an EG profile converted from EMET, which generally causes Windows 10 to crash into BSoD. Once upon a time, Hacker had a “Western Construction” section, and Exploit Guard would have fit perfectly into it.

    Continuation is available only to subscribers

    Option 1. Subscribe to Hacker to read all materials on the site

    Subscription will allow you to read ALL paid materials on the site within the specified period. We accept payment bank cards, electronic money and transfers from mobile operator accounts.

    If you store confidential information on your computer, then encryption systemic hard disk will be an excellent option to ensure the safety of your data.

    In this article we will tell you how to encrypt your computer's system drive using the most popular encryption tool from Microsoft, the BitLocker utility, which comes with all professional versions of Windows.

    What is BitLocker and where to download it

    Since release Windows Vista, Microsoft is offering a new data protection feature called BitLocker Drive Encryption. Windows 7 introduced BitLocker To Go, encryption for portable storage devices such as flash drives and SD cards.

    There is no need to download and install Biltocker, it is already built into the operating system and is only available in Window 10 Pro and Enterprise. You can see which edition of Windows is installed on your computer in Control panels on the tab System. If you have Window 10 Home installed, which does not support BitLocker, we recommend that you pay attention to a program such as.

    Why Microsoft doesn't make this feature publicly available is an open question, given that data encryption is one of the most effective ways to keep it secure.

    What is encryption

    Encryption is a way to enhance the security of your data by ensuring that its contents can only be read by the owner of the appropriate encryption key. Windows 10 includes various encryption technologies. For example, EFS file system encryption and BitLocker Drive Encryption, which we will talk about in this article.

    What you need to know and do before using BitLocker

    • Encrypting your hard drive may take a long time. Before you begin, we recommend that you back up your data, as an unexpected power outage during the encryption process may damage it.
    • The Windows 10 November update includes a more secure encryption standard. Please note that the new encryption standard will only be compatible with Windows 10 November Update systems.
    • If your computer does not have a Trusted Platform Module (TPM), a chip that gives your computer additional security features, such as the ability to encrypt BitLocker drives. When you try to enable encryption, you may receive a TPM error message: "This device cannot use the Trusted Platform Module (TPM)"

    To resolve this issue, use the EnableNoTPM.reg.zip file. Download, unzip and run this file, this will make the necessary changes to the registry to allow encryption without TPM.

    How to Encrypt a Drive Using BitLocker

    Enable BitLocker Drive Encryption in Windows 10. Click the button Start -> Explorer -> This computer. Then right-click on the Windows system drive (usually drive C), select from the drop-down menu .

    Create a strong password to unlock your hard drive. Every time you turn on your computer, Windows will ask you for this password to decrypt your data.

    Choose how you want to back up the recovery key. You can save it to your Microsoft account, copy it to a USB drive, or print it.

    Saved?! Now you need to specify which part of the disk you want to encrypt.

    You will have two options:

    • If you are encrypting a new drive or a new PC, you only need to encrypt the part of the drive that is currently in use. BitLocker will then automatically encrypt data as it is added.
    • If you enable BitLocker on a PC or drive you're already using, we recommend encrypting the entire drive. This will ensure that all data is protected.
    For us, the second option is more preferable. Please note that encryption will take some time, especially if you have a large drive. Make sure your computer is connected to an uninterruptible power supply in case of power outages.

    If you have the November Windows 10 updates installed, then you have access to the more secure XTS-AES encryption mode. Choose this option whenever possible.

    When you are ready to start encryption, click the button "Continue"

    Restart your computer when prompted.





  • 

    2024 gtavrl.ru.