Skip to main content

Enable BitLocker Encryption to your Workstation running Windows 10 Operating System

How to encrypt your entire workstation hard drive using Windows 10 Professional? This will save you sometime searching the internet for answers. Here's the step by step procedures on how you can encrypt your computer. Disclaimer: Always backup your important data before you proceed.

Related: How to setup BitLocker in Windows 10 Professional for Laptop.

I've tested it using Windows 10 computer, it should work for Windows 8.x version too.

How to Configure Computer to Enable BitLocker without Compatible TPM:  (Source: Microsoft Community)

Administrators must follow the steps below to configure their Windows 8 computers to allow enabling Bit Locker Drive Encryption without compatible TPM:
  1. Log on to Windows 8 computer with the account that has administrative privileges.
  2. Assuming that the computer has been configured to display classic start menu, click Start and at the bottom of the menu in search box type GPEDIT.MSC command and press enter key.
  3. On the opened Local Group Policy Editor snap-in from the left pane expand Computer Configuration > Administrative Templates > Windows Components > Bit Locker Drive Encryption and from the expanded list click to select Operating System Devices.
  4. From the right pane double-click “Require additional authentication” at startup.
  5. On the opened box click to select Enabled radio button and ensure that under Options section Allow Bit Locker without a compatible TPM checkbox is checked.
  6. Once done, click Ok button to allow the changes to take effect and close Local Group Policy Editor snap-in.
Reboot your computer, then run "bitlocker" press [Enter]. Click on Turn on BitLocker to start. You will see your computer doing some check ... Choose how to unlock your drive at startup. Your option is to Insert a USB Flash drive or Enter a password. If you have a spare USB flash drive this is highly recommended. For this test, I will use Enter a password method. How do you want to backup your recovery key? You have the following options.
  • Save to your Microsoft Account
  • Save to a USB flash drive
  • Save to a file
  • Print the recovery key
I select to "Save to a USB flash drive" then I can copy it to somewhere for additional backup. Save it. Encrypt your entire disk, click next to continue. Run BitLocker system check, click next to continue. Restart your computer. Done check it out.

Source: Hardworking.com a service of KING.NET


Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp