Bitlocker что это

0 views
Skip to first unread message
Message has been deleted

Oleta Blaylock

unread,
Jul 8, 2024, 7:03:17 PM7/8/24
to faisembrapo

After you type in the recovery key and the laptop boots up be sure to pause then resume bitlocker. This should reestablish the trust and stop the prompt. I would make sure the latest bios is installed and lock down the bios with a password. Also make sure the boot order is only allow the C drive to boot from.

bitlocker что это


Download https://urluss.com/2yS8cN



I have a laptop running Windows 7 Ultimate. I have encrypted my drives using BitLocker. Now I have also installed Lubuntu along with Windows. But my encrypted drives are not visible in Linux. How can I fix this?

My problem was that I could not boot Windows, and I needed a way to access my files on a Bitlocked partition. In order to do this, you need a bitlocker recovery password (8 groups of digits) and the ability to boot your system from USB.

CryptSetup has added experimental support for BitLocker as of version 2.3.0 (February 2020), which is available in Ubuntu's repos for 20.10 Groovy onwards, although support will likely improve in later versions.

When setting up BitLocker on a device choose the option that encrypts the whole device (requires more time). The other option uses Encrypt-On-Write conversion model that makes sure that any new disk writes are encrypted as soon as you turn on BitLocker (data that existed on the device before encryption began can still be read and written without encryption) and is not supported by Cryptsetup.

Once the drive is decrypted, you can use TrueCrypt instead; reading a System Encryption volume under Linux isn't supported by default, but someone has figured out a work-around. See How to use TrueCrypt-encrypted Windows system drives on Linux.

I tried @SrjCoder's suggestion of using a VM. But with VirtualBox on the Linux host, I was not able to see the encrypted drive in the guest Windows system. The unmounted block device that had the encrypted drive was not visible in the VM. I didn't try VMware, and I'm not a VirtualBox expert, so maybe I missed something there.

Finally I installed Windows 10 Pro on a separate machine, and connected the encrypted drive, Windows recognized it as a Bitlocker drive, and I was able to unlock it with the recovery key, and the valuable data was saved! The end.

If you're wondering why I didn't just boot the encrypted drive, it is in a bad state and cannot boot. It blue-screened trying to go back to a restore point. Luckily the data partition was still intact.

I don't know since when nemo supports it, but I installed Ubuntu on a second SSD in my school laptop and could just see the BitLocker'd drive in the "Devices" part of nemo's sidebar as "253 GB encrypted drive". When I clicked it it asked for my BitLocker key and for how long to remember it (not at all, until logout, permanent). When I entered the key it was successfully mounted as "Windows" with the path /media//Windows.

@Henke I guess what I was trying to say is that you can still get the VM backed up and restored if needed, however when it comes to the datavolumes, my understanding is that you would not be able to backup that up while the volume is locked.

For VMware or other VSA style backups, you can backup the volume no problem, but file level browse wont work since that would require the decryption key and code to process bitlocker volumes. You could still do a full VM restore or restore/attach the volume back to another VM to decrypt it

Hello. My personal usage with bit-locker encryption and Norton "backup" is that Norton doesn't play well with that. As far as running Norton on an encrypted drive OS I have never had issues doing so. Just keep in mind that Bitlocker SHOULD provide you with its own recovery key which you will need in the event of a drive recovery.

a few months ago there was a microsoft update forget the kb # addressing bitlocker , which for many caused some issues with a random blue screen of enter your bitlocker number etc... ( when you turn on device)

Hi mgm71

With regards to Bitlocker, that is just a drive encryption option, which is different functionality to Norton Anti-virus and is another layer or protection, should your PC be stolen, but has nothing to do with protection from malware on your PC . . .

Gen trademarks or registered trademarks are property of Gen Digital Inc. or its affiliates. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

But when the client sends the actual Bitlocker boot request the packet isnt being forwarded by the Fortigate. We can see the broadcast but nothing happens to it :( The packet looks OK so not really sure why it isnt forwarded.

I have the exact same issue, I've been struggling with it now for what seems like forever. I was planning on testing your suggestion actually before I found it. I did implement that change, however what I've found is that the traffic does indeed appear on the correct network when I sniff the interface on the fortigate (which it wasn't doing before) but when I take a packet capture on the server it isn't seeing JUST the BOOTP packet (even though it appears to being forwarded from the FGT packet capture dump on the firewall).

Used in conjunction with the dhcp-relay on the interface what appears to happen is that DHCP packets are being rebroadcast in the correct (server) network, but the microsoft DHCP server is completely ignoring them and only responding to the fortigate ip-helper-fixed (via the dhcp-relay agent) packets--those packets are being 'fixed' by the FortiGate with a relay-ip address.

Were you successfully able to get your WDS server to 'see' the incoming bitlocker BOOTP packet with this method? FWIW I checked the windows firewall rules and added an appropriate rule for ports 67-68 on the WDS server...no dice.

It seems like the easiest solution would be for the FGT to 'fix' these packets like it does for the other DHCP packets; I'm on 5.6.7 and I can confirm it still doesn't do so. Did you ever get this to work, either through the broadcast forwarding or through another novel method?

As you can see the original poster never wrote back how they were successful--I did test a multicast broadcast policy as they suggest but it had no effect (yes the packet landed in the right network but it was unusable by the server hosting WDS without being fixed up with a relay-agent-IP by a helper). After testing that, I abandoned multicast forwarding, and here's what I can tell you in general:

Basically after a week and multiple interactions, they said that the DHCP relay daemon will NOT fix-and-forward BOOTP type packets (which is the nature of the BitLocker packet), here is the excerpt from the support ticket--

"I have found this is a known issue for the DHCP relay. We currently have no workaround. There is a submitted request to support it in the DHCP relay. There is no ETA at this time. We only have support for the BOOTP protocol in DHCP server configuration at the moment. The related NFR request number is 0537876, should you want to follow up on progress."

In other words, the DHCP relay daemon sees the packet, and doesn't 'do' anything to it (i.e. doesn't fix-and-forward). It's troubling because numerous other platforms (Cisco and Juniper I confirmed) *do* handle BOOTP as fix-and-forward via helpers, just not FortiGate...so unless you are willing to setup WDS on the network local to your clients, or setup a local 3rd part DHCP relay daemon on that network and not use the FortiGate DHCP Relay Daemon, it appears we are SoL. I had to abandon this effort; waste of at least 15 hours of setup and testing. Hope this saves you some of that pain.

Overall it appears that Microsoft is not pushing BitLocker Network Unlock anymore...the Microsoft setup document is piss-poor and was obviously written by marketing people as it's scant on actual detail for setting up the WDS server other than just some very basic steps. From what I've read, folks are using the powershell script to reboot machines without requiring the bitlocker PIN when required for maintenance...unfortunately that kind of sucks for WSUS/Microsoft Updates without a lot of extra work.

The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.

I have a few windows VMware virtual machines which have bitlocker enabled for all drives. These machines are backed up using "VMWare" policy type. When i try to perform a file level restore, it does not seem to work. All these servers are Windows 2019 and 2022 servers. The drives are encrypted and unlocked. The "Enable file recovery from VM backup" option is enabled in the backup policy. I get a message saying "There are no files matching teh specified criteria".

Bitlocker shouldn't make a difference for the restore as that should be transparent to NetBackup. I assume that you have a NetBackup client installed in the VM you are testing - as the client is required to perform a single file restore (in general - there are methods to recover without the client installed which are described in the VMware guide).

Given the error you describe, I suspect you may be choosing the wrong backup type in the restore GUI. The type needs to be selected a VMware (and not Windows). Try that, then make sure that the date range you search covers the backup.

59fb9ae87f
Reply all
Reply to author
Forward
0 new messages