![]() If you specify this protector, users can access the encrypted drive as long as it is connected to the system board that hosts the TPM and the system boot integrity is intact. You can use one of the following methods or combinations of methods for a key protector:īitLocker uses the computer's TPM to protect the encryption key. ![]() When a user accesses a drive protected by BitLocker, such as when starting a computer, BitLocker requests the relevant key protector.įor example, the user can enter a PIN or provide a USB drive that contains a key.īitLocker retrieves the encryption key and uses it to read data from the drive. The Add-BitLockerKeyProtector cmdlet adds a protector for the volume key of the volume protected with BitLocker Drive Encryption. ![]() In this article Syntax Add-Bit Locker Key Protector ![]() Adds a key protector for a BitLocker volume. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |