HCL Connections
  • Home
  • Profili ▼
  • Comunità ▼
  • App ▼
  • Metriche
  • Moderazione
  • ▼
  • Accesso
  • Condividi
  • ?
  • HCLHCL

Blog

  • Blog personali
  • Blog pubblici
  • Aggiornamenti personali
  • Amministrazione
  • Accedere per partecipare

▼ Tag

 

▼ Archivio

  • settembre 2021

▼ Autori del blog

BigFix - Encryption with Bitlocker is easier now!

Visualizza tutte le voci
Facendo clic su questo pulsante verrà eseguito un aggiornamento della pagina completa. L'utente dovrà passare all'area "Elenco di voci" per visualizzare il nuovo contenuto.) Elenco di voci

BigFix - Encryption with Bitlocker is easier now!

Brad Sexton 64576A77-B31D-BF00-0025-86070027DBEC bsexton@hcltechsw.com | ‎ | 1.029 viste

Many organizations use Bitlocker to encrypt the hard drives of computers. This is typically done through a group policy requiring drive encryption and backing up the key to the Active Directory object. However, often times group policy is not available for remote users or unreliable due to the involvement of a VPN connection. With BigFix however, you can use Bitlocker with a series of steps to help you manage these remote workers and ensure that they are compliant with their drive encryption. Bitlocker requires you to have your TPM chip enabled and activated. Using a series of properties created by Strawgate, you can find candidates that have these settings enabled in the BIOS and encrypt the drive from BigFix. Strawgate also creates a method to store the Bitlocker key as a BigFix Property and view that data within the Console. 

  1. Go to Bigfix.me and download the TPM – Status: https://bigfix.me/analysis/details/2998646
  1. Activate the analysis 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This activates the TPM Analysis that provides valuable information.

image

 

 

 

 

 Strawgate has created great content for Bitlocker for Windows 10:

  • https://github.com/strawgate/C3-Protect/wiki/Bitlocker
  • https://github.com/strawgate/C3-Protect/wiki/Bitlocker
  1. Open the zip file it creates and open the analyses folder.
  1. Import the following into BigFix Console.
  • Bitlocker - Audit - Windows.bes
  • Bitlocker - Recovery Password - Windows.bes

 

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Go to the Fixlets section and import the following Fixlets into BigFix Console.
  • Invoke - Bitlocker Configuration Probe - Windows.bes
  • Invoke - Bitlocker Encrypt Secondary Volume - Windows.bes
  • Invoke - Bitlocker Encrypt System Volume - Windows.bes
  • Invoke - Bitlocker Recovery Password Backup to Active Directory - Windows.bes
  • Invoke - Bitlocker Recovery Password Probe - Windows.bes
  • Invoke - Bitlocker Refresh System Drive Encryption - Windows.bes
  • Invoke - Bitlocker Resume System Drive Encryption - Windows.bes
  • Invoke - Bitlocker Suspend System Drive Encryption - Windows.bes

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

You now have the content you need for gathering information about what PC’s are ready for encryption. The machines that can be encrypted are the ones that have their TPM chip enabled and activated. 

  1. Check the TPM – Status and then correlate that data with the machines that are still fully Decrypted.

image

 

 

 

 

  1. In the Computers view in BigFix Console, add the properties:
  • TPM – Activated in OS
  • TPM – Visible to OS – Windows
  • Bitlocker – Status - Windows

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Filter to display the PCs that are ready to be encrypted.
  • TPM – Visible to OS – True
  • TPM – Activated in OS – Activated
  • Bitlocker – Status – Windows – Fully Decrypted

image

 

 

 

 

 

 

 

 

 

 

 

  1. Take action on the task Invoke – Bitlocker Encrypt System Volume – Windows on these PCs.

Note :Verify and test the action within your environment before deploying to multiple machines.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This encrypts the system drive of PCs.

  1. Ensure that the key is backed up by creating a policy action for the task Invoke – Bitlocker Recovery Password Probe – Windows.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Once this probe runs, add your bitlocker key as a property in BigFix.

image

 

 

 

For machines that do not have TPM enabled or activated, enable each of these items by creating a package in BigFix. For instance Dell has a utility called Dell Command Configure that allows you to create packages to update the BIOS. Other manufactures have similar utilities. Following is a procedure that explains how to enable TPM chips and activate it on Dell machines.

  1. Download and install the Dell Command Configure from http://downloads.dell.com/FOLDER03164404M/1 

image

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Copy the files from C:\Program Files (x86)\Dell\Command Configure\X86_64 to a location from where you can upload them to BigFix

image

 

 

 

 

 

 

 

 

 

 

 

 

  1.  In BigFix Console, go to the System Lifecycle domain.

image

 

 

  1. Click Software Distribution > Manage Software Distribution.

image

 

 

 

 

  1.  Click New Package. Enter a name for the package.

image

 

 

 

 

  1. Add files to the package.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1.  Click Add to Package to add the folder you saved earlier with the Dell CCTK files.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Add the files.

 

  1. Add the command "cctk.exe" --setuppwd=Password1 and click Next.

image

 

 

 

 

 

 

 

 

 

 

 

  1.  Click Create Task

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Scroll down to line 51 and add two lines under the first command.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

"cctk.exe" --tpm=on --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

"cctk.exe" --setuppwd= --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

The action script should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Open the Relevance tab.

image

 

 

  1. Add the following statement to line 4:
(string value of select "Manufacturer from Win32_ComputerSystem" of wmi) contains "Dell"
  1. Add the following statement to line 5:
(not exists selects "* from Win32_Tpm" of wmis "root\CIMv2\Security\MicrosoftTpm") | true
  1. Save the task.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Create a copy of the task - click Copy.

image

 

 

 

 

 

  1. Scroll down to the action script and edit the line 52.

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Replace the text on line 52 with the following text:
"cctk.exe" --tpmactivation=activate --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

Your action script should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Open the Relevance tab.

image

 

 

  1. Add the statement to line 4.
(string value of select "Manufacturer from Win32_ComputerSystem" of wmi) contains "Dell"
  1. Add the statement to line 5.
(not (boolean value of select "IsActivated_InitialValue from Win32_Tpm" of wmi "root\CIMV2\Security\MicrosoftTpm")) 
  1. Enter a name for the task. For example, "Dell Activate TPM' and save the task.

The task should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Create a baseline with the two newly created tasks and save it.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Click set action settings for the baseline.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1.  Open the Execution tab and select the Reapply this action and whenever it becomes relevant again options.

image

 

 

 

 

 

  1.  Open the Post Action tab and select the Restart the computer after the action completes option.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

You can apply this action to any PC that does not have TPM Enabled or TPM Activated. This will enable TPM and if TPM does not activate, it will activate and prompt for a second reboot. You can now encrypt the drive with Bitlocker.

Note: Users may receive a prompt outside of BigFix that might ask them to restart their machine.

image

 

 

 

 

 

 

If by chance the TPM chip does not activate, it could be that the ownership needs to be cleared. Due to the TPM standards, this might require manual intervention.

 

 

  • Aggiungi un commento Aggiungi un commento
  • Modifica
  • Ulteriori azioni v
  • Metti questa voce in quarantena
Invia notifica ad altre persone
notification

Invia notifica email

+

Metti in quarantena questa voce

deleteEntry
duplicateEntry

Contrassegna come duplicato

  • Voce precedente
  • Principale
  • Voce successiva
Feed per voci del blog | Feed per commenti del blog | Feed per commenti relativi a questa voce
  • Home
  • Guida
  • Strumenti di segnalibri
  • Metriche server
  • IU mobile
  • Informazioni su
  • HCL Connections su hcl.com
  • Inoltra feedback