BitLocker; Microsoft Hires Yahoo Exec; Patch Tuesday


  • Windows Advisor: Understanding and Configuring BitLocker with TPM
  • Redmond Radio: Microsoft Hires Yahoo Exec; Patch Tuesday; More
  • Pop Quiz: Vista Security (Exam 70-620)
  • MCP Poll: Is Your Company Planning To Cut IT Jobs?
  • Special Offers: DB Security; Exchange and UC; VSLive! SF; More
-

 SQL Server 2008: Maximize Performance & Reduce Costs with Dell and AMD
No registration required to watch this 3 minute video on how Dell™ customer, ServiceU, maximized their on-demand software business and decreased their power and cooling needs by 50%! All achieved by running Microsoft® SQL Server® 2008 on Dell servers powered by high efficiency AMD Opteron™ processors.

Watch the video today.

-

Windows Advisor: Understanding and Configuring BitLocker with TPM

Vista SP1 has a greatly improved BitLocker. Still, use BitLocker with a Trusted Platform Module for best results.

By Zubair Alexander

I wrote about the BitLocker feature in Microsoft Windows Vista almost two years ago, when Vista had just been released. With Vista Service Pack 1 (SP1), Microsoft implemented a few enhancements to the BitLocker feature and also made available three new tools for its management and repair.

Though BitLocker can be used with or without a Trusted Platform Module (TPM) chip, TPM offers an additional level of security and is the preferred way to use BitLocker in Vista or Windows Server 2008. In this article, I'll discuss a few important concepts that will help you understand how TPM and BitLocker work together on a Vista computer that has a TPM chip installed. I'll also show you how to configure the Basic Input Output System (BIOS) and the operating system properly to get BitLocker working.

In our scenario, we'll assume that you have a Vista laptop with a TPM chip installed on the motherboard. In order to get BitLocker working, you'll first need to configure the TPM settings in the laptop's BIOS, and then configure BitLocker in the OS. But before we get started, let's get go over certain important concepts.

Trusted Module Platform
The TPM is a microchip that supports several advanced security features, such as storing encryption keys, digital certificates and passwords. The BitLocker feature in Vista works with the TPM chip. Depending on your BIOS and manufacturer, TPM Security may be set to OFF in the BIOS by default, meaning TPM can't be used. For example, my test computer was a Dell Latitude D630 and had the TPM functionality turned off. More specifically, there were two settings for TPM in the BIOS on my computer -- TPM Security and TPM Activation -- and they were both turned off by default.

Enabling TPM Security is very simple: Go into BIOS and set it to ON. To turn on TPM Activation, you first need to set TPM Security to ON, save the changes in the BIOS setup, reboot the computer, and then reenter BIOS setup to activate TPM.

Once this is done, you're ready to configure BitLocker in the OS.

BitLocker System Requirements
Before you get started, make sure that your computer meets the minimum system requirements. Here are the system requirements for BitLocker:

  • Two partitions -- one for the system volume (e.g., Drive D) and one for the OS volume (e.g., Drive C).
  • The system partition (Drive D) is unencrypted and the OS volume (Drive C) is encrypted.
  • The system partition (Drive D) is at least 1.5GB and is set as the active partition.

Keep in mind that these are the minimum system requirements; you can encrypt more than one volume in Vista (for example, both Drive C and Drive D can be protected with BitLocker). Also, note that the BIOS setting should be configured to start up with the hard drive, not with the CD or USB drive.

To install Vista, you may need to configure the system to boot from the CD/DVD drive first, but after the installation Microsoft recommends that you configure the BIOS to boot from the hard drive to use BitLocker. If you're working on a computer that already has Vista installed, you don't need to reinstall the operating system. You can simply use the new BitLocker Drive Preparation Tool (which I'll discuss later in this article) to configure your drives to work properly with BitLocker....

Read rest here.

Zubair Alexander, MCSE, MCT, MCSA, and Microsoft MVP is the owner of SeattlePro Enterprises, an IT training and consulting business. His experience covers a wide range of spectrum: trainer, consultant, systems administrator, security architect, network engineer, author, technical editor, college instructor and public speaker. Zubair holds more than 18 technical certifications and Bachelor of Science degrees in Aeronautics & Astronautics Engineering Mathematics and Computer Information Systems. His Web site, www.techgalaxy.net, is dedicated to technical resources for IT professionals.

Check out MCPmag.com's column archive for more savvy tips and tricks from Zubair, Jeffery Hicks, Chris Wolf and other frequent contributors.

-

Business Continuity Solutions for SQL Server 2005 on Dell PowerEdge Servers
Are you about to implement a business continuity strategy for your customer? This report from Dell gives you options and techniques available at the database layer. The Dell Engineering team explains the features Microsoft has built into the SQL Database engine and how they fit into a business continuity strategy.

-

Redmond Radio for the Week of Dec. 15
Hosted by Michael Domingo

Check out what's been happing in the week of IT and Microsoft news from the last week:

  • Microsoft Hires Former Yahoo Search Exec
  • Patch Tuesday Explodes with 28 Fixes
  • Open Source Thrives in the Enterprise
  • U.S. is Biggest Malware Culprit

Listen: http://mcpmag.com/webcasts/mcpradio/radio.asp?id=319

iTunes/iPodder listeners: Download the show automatically by pointing your applet at http://mcpmag.com/rss/podcasts/.

Problems listening to the podcast? Write to mdomingo@1105media.com and describe the problem to get help. We want you to listen if you want to hear it!

Pop Quiz: Vista Security (Exam 70-620)

Which additional security features are found within Windows Vista 64-bit which make it more secure by design than Windows Vista 32-bit? (Choose two)

  1. NTFS
  2. Kernel Patch Protection
  3. Data Execution Protection
  4. Required Driver Signing

[Scroll down this newsletter for the answer and the bonus question.]

Andy Barkl, MCT, MCSE, MCITP, has been studying technology for nearly 23 years. Of the last 10 years, he has spent much of his time sharing the knowledge and experience he has gained from studying and taking IT exams (close to 225) to help others be prepared and successful. He teaches classes in Phoenix, Arizona, where he has lived most of his life.

MCPmag.com Poll

This week: Is your company planning to cut IT staffers?

  • Yes, our company already made cuts and that's it.
  • Yes, and more cuts are expected.
  • We're still waiting for the axe to fall.
  • We're not sure, but we know no job is safe these days.
  • No, we plan to hire.

Vote now!

Results of our last poll: Should Microsoft Buy Yahoo's Search Business?

  • 60% -- Yes
  • 40% -- No

Want to know how other current IT issues fared with your peers? Click here.

Suggest a poll! If we use your's you will live in MCP Poll infamy and win a Redmond T-shirt. E-mail suggestions to Michael Domingo, Exec. Editor.

-

Lucid8 -- Exchange Tools for IT Administrators
Need to RESTORE accidentally deleted emails or corrupted mailboxes? Need to DISCOVER and EXPORT legal evidence in Exchange backups, PST's and live Exchange Servers?

DigiScope eDiscovery and Recovery for Microsoft® Exchange enables IT Administrators and Legal Professionals to DISCOVER, RECOVER and EXPORT emails from Exchange backups, PST's or live servers.

It's Not Just E-mail. It's an Asset! It's Evidence!