In this guide, I'll take a closer look at the process of restoring a BitLocker-encrypted drive from an image...
Tag Archive for: encryption
4sysops - The online community for SysAdmins and DevOps
Microsoft Office 365 Message Encryption: Encrypt email in Microsoft 365

Customers using Exchange Online can take advantage of Microsoft Office 365 Message Encryption (Microsoft OME) as an online service...
How to migrate Active Directory Certificate Services to SHA-2 and Key Storage Provider

Businesses need to migrate from the deprecated SHA-1 to SHA-2 to bolster their cybersecurity posture. They may still be...
Migrating AD certificate services to SHA-2: Considerations and challenges

Secure Hash Algorithm (SHA) has been around since the mid-90s and is one of the leading cryptographic hash algorithms...
Provide strong Windows authentication using virtual smart cards

Virtual smart cards provide the benefits of physical smart cards without extra costs or hardware. They are based on...
Manage encrypted PCs remotely using BitLocker Network Unlock

TPM+PIN decryption with BitLocker requires physical access to the device when the endpoint boots or resumes from sleep. This...
OpenVPN IPv6 and IPv4 configuration

OpenVPN is a free, popular, and powerful VPN solution. In this guide, I describe a minimal IPv6 and IPv4...
ManageEngine PAM360: Privileged access management for enterprises

ManageEngine PAM360 is an enterprise solution that allows businesses to gain control over privileged access management in their environment....
Unlock BitLocker drives using recovery agents

If a user can no longer access an encrypted drive, for example because they have forgotten the password, then...
Issue certificates for BitLocker recovery agents

BitLocker supports several mechanisms to unlock an encrypted drive. These include recovery agents, whose certificate can be used to...
Use OpenSSL-based software XCA as offline root certificate authority for AD Certificate Services

When Active Directory Certificate Services are deployed, Microsoft recommends at least a two-tier infrastructure, comprising a root CA and...
BitLocker To Go: USB drive cannot be encrypted

If you want to encrypt a USB drive with BitLocker To Go, it might happen that the command to...
BitLocker To Go: Configure USB drive encryption with Group Policy

If companies want to prevent data leakage, then they should pay special attention to removable drives. If a USB...
Encrypt in AWS using the Key Management Service (KMS)

The AWS Key Management Service (KMS) allows you to create and manage cryptographic keys that you can use across...
Store and Retrieve BitLocker Recovery Keys from Active Directory

Encrypting drives with BitLocker is essential for protecting Windows notebooks against theft and misuse of data. However, if users...
Encrypt event logs and files with PowerShell and group policies

A new feature of Windows 10 and Server 2016 is Protected Event Logging, which encrypts sensitive data in the...
Issuing certificates for document encryption (Cryptographic Message Syntax)

Beginning with version 5, PowerShell supports the IETF standard Cryptographic Message Syntax (CMS) to encrypt data or log entries....
Solution for “The requested certificate template is not supported by this CA”

Sometimes you need to create your own template for requesting certificates from a Windows CA, e.g., for encrypting or...
Specops Key Recovery: Self-service for unlocking BitLocker-encrypted devices

Specops Key Recovery (SKR) is a self-service solution for unlocking devices encrypted with BitLocker or Symantec Endpoint Encryption in...
Install an SSL certificate in Windows Admin Center

If you install Windows Admin Center (WAC) in gateway mode, the browser should communicate with the server via a...