Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
System/Trusted Platform Module Services
PolicySettingComment
Turn on TPM backup to Active Directory Domain ServicesEnabled
Require TPM backup to AD DSEnabled
If selected, cannot set or change TPM owner password
if backup fails (recommended default).
If not selected, can set or change TPM owner password
even if backup fails. Backup is not automatically retried.
Windows Components/BitLocker Drive Encryption
PolicySettingComment
Choose drive encryption method and cipher strengthEnabled
Select the encryption method:AES 128-bit with Diffuser (default)
PolicySettingComment
Choose how users can recover BitLocker-protected drives (Windows Server 2008 and Windows Vista)Enabled
Important: To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery options below, you must enable backup of BitLocker recovery information to AD DS. Otherwise, a policy error occurs.
Configure 48-digit recovery password:Do not allow recovery password
Configure 256-bit recovery key:Do not allow recovery key
Note: If you do not allow the recovery password and require the recovery key, users cannot enable BitLocker without saving to USB.
PolicySettingComment
Prevent memory overwrite on restartDisabled
Store BitLocker recovery information in Active Directory Domain Services(Windows Server 2008 and Windows Vista)Enabled
Require BitLocker backup to AD DSEnabled
If selected, cannot turn on BitLocker if backup fails (recommended default).
If not selected, can turn on BitLocker even if backup fails. Backup is not automatically retried.
Select BitLocker recovery information to store:Recovery passwords and key packages
A recovery password is a 48-digit number that unlocks access to a BitLocker-protected drive.
A key package contains a drive's BitLocker encryption key secured by one or more recovery passwords
Key packages may help perform specialized recovery when the disk is damaged or corrupted.
Windows Components/BitLocker Drive Encryption/Fixed Data Drives
PolicySettingComment
Allow access to BitLocker-protected fixed data drives from earlier versions of WindowsEnabled
Do not install BitLocker To Go Reader on FAT formatted fixed drivesDisabled
PolicySettingComment
Choose how BitLocker-protected fixed drives can be recoveredEnabled
Allow data recovery agentDisabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for fixed data drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Backup recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for fixed data drivesEnabled
Windows Components/BitLocker Drive Encryption/Operating System Drives
PolicySettingComment
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Allow data recovery agentDisabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for operating system drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Store recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesEnabled
PolicySettingComment
Require additional authentication at startupEnabled
Allow BitLocker without a compatible TPMEnabled
(requires a startup key on a USB flash drive)
Settings for computers with a TPM:
Configure TPM startup:Allow TPM
Configure TPM startup PIN:Do not allow startup PIN with TPM
Configure TPM startup key:Do not allow startup key with TPM
Configure TPM startup key and PIN:Do not allow startup key and PIN with TPM