Bitlocker
Purpose
To manage Bitlocker protection on endpoints.
Update Notice: 6-Sept-2024
-
The solution has been updated to store and display the data even if the computer is retired. However, the data cannot be displayed if the computer is also deleted from the retired assets.
-
Modified Content:
-
New Content:
-
Sync the modified scripts from the
Prosync
plugin and run the Bitlocker - Audit script against any online Windows computer with theSet_Environment
parameter set to1
to modify the custom tables.
Associated Content
Auditing Content
Content | Type | Function |
---|---|---|
Script - Bitlocker - Audit | Script | Gathers Bitlocker information from the target endpoint and stores it in the Custom Table - plugin_proval_bitlocker_audit. |
Script - Bitlocker - AD Key Protector - Audit | Script | Audits the existing backup Bitlocker key protectors from an Active Directory server. |
Script - Bitlocker Recovery Password - AD Backup | Script | This script backs up Bitlocker Recovery Passwords to the associated Active Directory instance. |
Dataview - Bitlocker Status | Dataview | Displays information from the Custom Table - plugin_proval_bitlocker_audit filled by the Script - Bitlocker - Audit. Additionally, it displays information about the Active Directory backup status of each key protector. |
Dataview - TPM Detailed Audit | Dataview | Displays information from the Custom Table - plugin_proval_tpm_audit filled by the Script - Bitlocker - Audit. Additionally, it displays information about the TPM detailed information of the Windows. |
Dataview - Bitlocker Status - Retired Computers | Dataview | Displays the Bitlocker data stored in the Custom Table - plugin_proval_bitlocker_audit for the retired computers. |
SEC - Encryption - Dataview - Bitlocker - AD Backup Audit | Dataview | Displays Bitlocker key protectors backed up to Active Directory. |
Internal Monitor - ProVal - Production - Security - Stale Bitlocker Data | Internal Monitor | Detects Windows computers where the Script - Bitlocker - Audit script has not executed within the last 30 days and triggers the audit script to run. |
CWM - Automate - Roles - Bitlocker | Role | These roles determine whether the Windows server is eligible for Bitlocker. They are also used in the Internal Monitor - ProVal - Production - Security - Stale Bitlocker Data. |
CWA Dataview - Bitlocker Initialize Failure Audit [Script] | Dataview (Optional) | This dataview contains records of computers where the BitLocker initialization failed twice due to the Autofix script "Script - Bitlocker - Volume - Initialize [Autofix, Param] - Wrapper". |
Automation
Content | Type | Function |
---|---|---|
Script - Bitlocker - Initialize Volume | Script | Encrypts a drive with Bitlocker disk encryption. |
Script - Bitlocker - Remove Volume | Script | Disables Bitlocker protection on one (or all) volumes. |
Internal Monitor - Bitlocker - Missing Key Protectors | Internal Monitor | Detects computers where Bitlocker is enabled, and the drive is fully encrypted but does not have any key protectors. |
Bitlocker - Volume - Add Recovery Password [Autofix] | Script | Adds a recovery password to the drive where BitLocker is enabled but a key protector is not found. It is an autofix script for the Internal Monitor - Bitlocker - Missing Key Protectors monitor set. |
△ Custom - Execute Script - Bitlocker - Volume - Add Recovery Password | Alert Template | This will be used with the Internal Monitor - Bitlocker - Missing Key Protectors and should execute the script Bitlocker - Volume - Add Recovery Password [Autofix]. |
Script - Bitlocker - Volume - Initialize [Autofix,Param] - Wrapper | Script (Optional) | This script runs as an autofix to deploy the BitLocker initialization to the agents detected by the monitor Internal Monitor - Bitlocker - Initialize Volume Deployment. |
Internal Monitor - Bitlocker - Initialize Volume Deployment | Internal Monitor (Optional) | This internal monitor detects online supported Windows OS (Windows 10/11, Windows Server 2016, 2019, and 2022) that have not been updated in the plugin_proval_bitlocker_audit table in the last 7 days and do not have the keyprotectorid and protectionstatus set. It also checks if the location-EDF 'BitLocker Enable List' is set to either "AllDrive" or "SystemDrive" from the dropdown option and the computer-EDF 'BitLocker Enable Exclude' is not checked. It ensures running the Script - Bitlocker - Volume - Initialize [Autofix,Param] - Wrapper once every 7 days on the detected agents to avoid multiple reiterate attempts. |
△ Custom - Execute Script - Bitlocker - Volume - Initialize [Autofix] - Wrapper | Alert Template (Optional) | This alert template needs to be applied to Internal Monitor - Bitlocker - Initialize Volume Deployment and should execute the Script - Bitlocker - Volume - Initialize [Autofix,Param] - Wrapper. |
Remote Monitor - Enable Bitlocker Feature | Remote Monitor | Enables the following Bitlocker features on the Windows server if they are not already installed:
|
Other Content
Content | Type | Function |
---|---|---|
Agnostic - Initialize-BitLockerVolume | Agnostic | Encrypts a drive with Bitlocker disk encryption. |
Agnostic - Unprotect-BitLockerVolume | Agnostic | Disables Bitlocker protection on one (or all) volumes. |
Agnostic - Get-ADBitlockerStores | Agnostic | Returns objects from AD representing backed up Bitlocker key protectors. |
Custom Table - plugin_proval_bitlocker_audit | Custom Table | Stores information about Bitlocker configuration on target machines. |
Custom Table - plugin_proval_ad_bitlocker_keyprotectors | Custom Table | Stores information about Bitlocker key protectors backed up to Active Directory. |
Custom Table - plugin_proval_tpm_audit | Custom Table | This table will be populated by the Script - Bitlocker - Audit. It holds all data from the Get-TPM command. |
Implementation
-
Import the following scripts using the ProSync plugin:
-
Import the following Dataviews using the ProSync Plugin:
-
Import the following monitors using the ProSync Plugin:
-
Import the following Alert Templates using the ProSync plugin:
- △ Custom - Execute Script - Bitlocker - Audit
-
Import the following roles using the SQL provided in the CWM - Automate - Roles - Bitlocker:
- Windows Server Bitlocker
- Windows Server Bitlocker-Utilities
- Windows Server BitLocker-RemoteAdminTool
-
Reload the System Cache
-
Execute the Script - Bitlocker - Audit against any online Windows computer with the
Set_Environment
parameter set to1
to create the custom tables used by the solution.
-
Configure the solution as follows:
- Navigate to Automation --> Monitors within the CWA Control Center and set up the following:
- Internal Monitor - ProVal - Production - Security - Stale Bitlocker Data
- Configure with the alert template:
△ Custom - Execute Script - Bitlocker - Audit
- Right-click and Run Now to start the monitor
- Configure with the alert template:
- Internal Monitor - ProVal - Production - Security - Stale Bitlocker Data
- Use the implementation instructions in the document below to set up this remote monitor:
- Remote Monitor - Enable Bitlocker Feature
- Import this monitor to the Domain Controllers group
- Do NOT assign any alert template to the monitor.
- Remote Monitor - Enable Bitlocker Feature
- Navigate to Automation --> Monitors within the CWA Control Center and set up the following:
Optional
Auto Encryption
- If the partner would like to perform the auto-deployment of the Bitlocker - Initialize volume, then only get the document below imported and implemented as mentioned:
- Import the internal monitor:
Internal Monitor - Bitlocker - Initialize Volume Deployment - Import the dataview:
CWA Dataview - Bitlocker Initialize Failure Audit [Script] - Import the script:
Script - Bitlocker - Volume - Initialize [Autofix, Param] - Wrapper - Import the alert template:
△ Custom - Execute Script - Bitlocker - Volume - Initialize [Autofix] - Wrapper - Configure the monitor Internal Monitor - Bitlocker - Initialize Volume Deployment with the alert template:
△ Custom - Execute Script - Bitlocker - Volume - Initialize [Autofix] - Wrapper
- Right-click and Run Now to start the monitor.
- Import the internal monitor:
Bitlocker - AD Backup
- If the partner would like their recovery keys backed up into Active Directory, a GPO must be created to support this.
- Import the script:
Script - Bitlocker Recovery Password - AD Backup
Bitlocker - AD Key Protector - Audit - Import the Dataview:
Dataview - Bitlocker AD Backups - Use the following document to implement this:
- After the GPO has been created, run the Script - Bitlocker Recovery Password - AD Backup on a single domain-joined workstation at that client to validate the settings.
- Bitlocker - AD Key Protector - Audit (Tutorial at the bottom of the document)
- Import the script:
Missing Key Protectors
- If the partner would like to ensure the monitor set detects the computer where Bitlocker is enabled, and the drive is fully encrypted but does not have any key protectors, follow the steps below to set this up:
- Import the internal monitor:
Internal Monitor - Bitlocker - Missing Key Protectors - Import the script:
Bitlocker - Volume - Add Recovery Password [Autofix]. - Configure with the alert template:
△ Custom - Execute Script - Bitlocker - Volume - Add Recovery Password
- Right-click and Run Now to start the monitor.
- Import the internal monitor: