HCL Connections
  • 主页
  • 个人档案 ▼
  • 社区 ▼
  • 应用程序 ▼
  • 统计
  • 审核
  • ▼
  • 登录
  • 共享
  • ?
  • HCLHCL

博客

  • 我的博客
  • 公共博客
  • 我的更新
  • 管理
  • 登录以进行参与

▼ 标签

 

▼ 归档

  • 2021年3月
  • 2020年10月

▼ 博客作者

Brad Sexton

查看所有条目
单击此按钮可以刷新整个页面。 用户可以转至“条目列表”区域查看新内容。) 条目列表

-BigFix - Encryption with Bitlocker is easier now!

Brad Sexton 64576A77-B31D-BF00-0025-86070027DBEC bsexton@hcltechsw.com | ‎ | 2,898 次访问

 

 

Many organizations use Bitlocker to encrypt the hard drives of computers. This is typically done through a group policy requiring drive encryption and backing up the key to the Active Directory object. However, often times group policy is not available for remote users or unreliable due to the involvement of a VPN connection. With BigFix however, you can use Bitlocker with a series of steps to help you manage these remote workers and ensure that they are compliant with their drive encryption. Bitlocker requires you to have your TPM chip enabled and activated. Using a series of properties created by Strawgate, you can find candidates that have these settings enabled in the BIOS and encrypt the drive from BigFix. Strawgate also creates a method to store the Bitlocker key as a BigFix Property and view that data within the Console. 

  1. Go to Bigfix.me and download the TPM – Status: https://bigfix.me/analysis/details/2998637
  1. Activate the analysis 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This activates the TPM Analysis that provides valuable information.

image

 

 

 

 

 Strawgate has created great content for Bitlocker for Windows 10:

  • https://github.com/strawgate/C3-Protect/wiki/Bitlocker
  • https://github.com/strawgate/C3-Protect/wiki/Bitlocker
  1. Open the zip file it creates and open the analyses folder.
  1. Import the following into BigFix Console.
  • Bitlocker - Audit - Windows.bes
  • Bitlocker - Recovery Password - Windows.bes

 

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Go to the Fixlets section and import the following Fixlets into BigFix Console.
  • Invoke - Bitlocker Configuration Probe - Windows.bes
  • Invoke - Bitlocker Encrypt Secondary Volume - Windows.bes
  • Invoke - Bitlocker Encrypt System Volume - Windows.bes
  • Invoke - Bitlocker Recovery Password Backup to Active Directory - Windows.bes
  • Invoke - Bitlocker Recovery Password Probe - Windows.bes
  • Invoke - Bitlocker Refresh System Drive Encryption - Windows.bes
  • Invoke - Bitlocker Resume System Drive Encryption - Windows.bes
  • Invoke - Bitlocker Suspend System Drive Encryption - Windows.bes

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

You now have the content you need for gathering information about what PC’s are ready for encryption. The machines that can be encrypted are the ones that have their TPM chip enabled and activated. 

  1. Check the TPM – Status and then correlate that data with the machines that are still fully Decrypted.

image

 

 

 

 

  1. In the Computers view in BigFix Console, add the properties:
  • TPM – Activated in OS
  • TPM – Visible to OS – Windows
  • Bitlocker – Status - Windows

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Filter to display the PCs that are ready to be encrypted.
  • TPM – Visible to OS – True
  • TPM – Activated in OS – Activated
  • Bitlocker – Status – Windows – Fully Decrypted

image

 

 

 

 

 

 

 

 

 

 

 

  1. Take action on the task Invoke – Bitlocker Encrypt System Volume – Windows on these PCs.

Note :Verify and test the action within your environment before deploying to multiple machines.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This encrypts the system drive of PCs.

  1. Ensure that the key is backed up by creating a policy action for the task Invoke – Bitlocker Recovery Password Probe – Windows.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Once this probe runs, add your bitlocker key as a property in BigFix.

image

 

 

 

For machines that do not have TPM enabled or activated, enable each of these items by creating a package in BigFix. For instance Dell has a utility called Dell Command Configure that allows you to create packages to update the BIOS. Other manufactures have similar utilities. Following is a procedure that explains how to enable TPM chips and activate it on Dell machines.

  1. Download and install the Dell Command Configure from http://downloads.dell.com/FOLDER03164404M/1 

image

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Copy the files from C:\Program Files (x86)\Dell\Command Configure\X86_64 to a location from where you can upload them to BigFix

image

 

 

 

 

 

 

 

 

 

 

 

 

  1.  In BigFix Console, go to the System Lifecycle domain.

image

 

 

  1. Click Software Distribution > Manage Software Distribution.

image

 

 

 

 

  1.  Click New Package. Enter a name for the package.

image

 

 

 

 

  1. Add files to the package.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1.  Click Add to Package to add the folder you saved earlier with the Dell CCTK files.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Add the files.

 

  1. Add the command "cctk.exe" --setuppwd=Password1 and click Next.

image

 

 

 

 

 

 

 

 

 

 

 

  1.  Click Create Task

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Scroll down to line 51 and add two lines under the first command.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

"cctk.exe" --tpm=on --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

"cctk.exe" --setuppwd= --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

The action script should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Open the Relevance tab.

image

 

 

  1. Add the following statement to line 4:
(string value of select "Manufacturer from Win32_ComputerSystem" of wmi) contains "Dell"
  1. Add the following statement to line 5:
(not exists selects "* from Win32_Tpm" of wmis "root\CIMv2\Security\MicrosoftTpm") | true
  1. Save the task.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Create a copy of the task - click Copy.

image

 

 

 

 

 

  1. Scroll down to the action script and edit the line 52.

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Replace the text on line 52 with the following text:
"cctk.exe" --tpmactivation=activate --valsetuppwd=Password1 >> "{parameter "logFolder"}\{parameter "logFile"}" 2>&1

Your action script should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

  1. Open the Relevance tab.

image

 

 

  1. Add the statement to line 4.
(string value of select "Manufacturer from Win32_ComputerSystem" of wmi) contains "Dell"
  1. Add the statement to line 5.
(not (boolean value of select "IsActivated_InitialValue from Win32_Tpm" of wmi "root\CIMV2\Security\MicrosoftTpm")) 
  1. Enter a name for the task. For example, "Dell Activate TPM' and save the task.

The task should look like this:

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Create a baseline with the two newly created tasks and save it.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. Click set action settings for the baseline.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1.  Open the Execution tab and select the Reapply this action and whenever it becomes relevant again options.

image

 

 

 

 

 

  1.  Open the Post Action tab and select the Restart the computer after the action completes option.

image

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

You can apply this action to any PC that does not have TPM Enabled or TPM Activated. This will enable TPM and if TPM does not activate, it will activate and prompt for a second reboot. You can now encrypt the drive with Bitlocker.

Note: Users may receive a prompt outside of BigFix that might ask them to restart their machine.

image

 

 

 

 

 

 

If by chance the TPM chip does not activate, it could be that the ownership needs to be cleared. Due to the TPM standards, this might require manual intervention.

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Author

Brad Sexton is a BigFix technical advisor for the mid-Atlantic region. He was a BigFix administrator in a global enterprise for 7 years where he was using BigFix for OSD, Software Deployments, and patching. Brad joined the HCL BigFix team in 2018.

Review and editorial credits

Shivi Sivasubramanian is a senior-level technical author and editor with a demonstrated history of working in the technology industry. A firm believer in the magical power of words, she loves helping the community deliver expressive, minimalist, and user-friendly content. Shivi currently leads a team of information developers in BigFix.

 

 

 

由 Brad Sexton 64576A77-B31D-BF00-0025-86070027DBEC bsexton@hcltechsw.com 于 修改
  • 添加评论 添加评论
  • 编辑
  • 更多操作 v
  • 隔离此条目
通知其他人
notification

发送电子邮件通知

+

隔离此条目

deleteEntry
duplicateEntry

标记为重复项

  • 上一个条目
  • 主页
  • 下一个条目
“博客条目”的订阅源 | “博客评论”的订阅源 | 此条目评论的订阅源
  • 主页
  • 帮助
  • 书签工具
  • 服务器统计
  • 移动 UI
  • 关于
  • hcl.com 上的 HCL Connections
  • 提交反馈