Skip to main content

43 docs tagged with "Encryption"

Documents discussing encryption technologies for data protection

View all tags

Bitlocker

This document provides a comprehensive guide on managing Bitlocker protection on endpoints, including updates on auditing scripts, implementation steps, and optional configurations for automatic encryption and Active Directory backups.

Bitlocker - AD Key Protector - Audit

This document provides a detailed guide on auditing existing backup BitLocker key protectors from an Active Directory server. It includes sample runs, dependencies, process explanations, and a step-by-step guide to configuring Group Policy for automatic backup of BitLocker recovery keys to Active Directory.

Bitlocker - Audit

This document provides a comprehensive overview of the Bitlocker Audit script, detailing its functionality in gathering Bitlocker and TPM information from target endpoints, storing it in custom tables, and creating backup files for recovery passwords.

Bitlocker - Backup Recovery Key to AD

This document provides a detailed overview of a script that automates the process of backing up the existing BitLocker recovery key to a joined Active Directory domain, saving significant time in the process. It includes sample runs, dependencies, variables, and the overall process involved in executing the script.

Bitlocker - Enable TPM

This document details the implementation of the agnostic script SEC - Encryption - Agnostic - Enable-TPM within Automate. It covers the initialization of the Trusted Platform Module (TPM) as part of the provisioning process, including necessary parameters and expected outputs.

Bitlocker - Encryption Type Incorrect

This document provides an overview of a Bitlocker monitoring script that identifies target machines based on specific conditions related to Bitlocker settings and client configurations. It includes SQL queries, dependencies, and guidelines for targeting the Bitlocker solution.

Bitlocker - Initialize Volume Deployment

This document outlines an internal monitor designed to detect unsupported Windows workstation operating systems that have not been updated regarding BitLocker encryption status. It checks for specific conditions related to the key protector ID, protection status, and configuration settings, ensuring compliance and proper execution of the associated BitLocker initialization script.

Bitlocker - Key Retrieval

This document details a script that audits the recovery keys for each encrypted drive on an agent and adds the information to a custom table, saving time and improving efficiency in managing BitLocker encryption.

Bitlocker - Missing Key Protectors

This document outlines a monitor set that detects computers where Bitlocker is enabled and the drive is fully encrypted but lacks any key protectors. It utilizes data from the Bitlocker Audit script and provides guidance on scheduling and dependencies for effective monitoring.

Bitlocker - OS Volume Encryption Disabled

This document outlines a monitoring solution for identifying target machines with specific Bitlocker settings, ensuring that only compliant machines are flagged for further action. It includes SQL queries and dependencies for effective implementation.

Bitlocker - Recovery Password Automate Backup Missing

This document provides a comprehensive overview of a monitoring script designed to identify target machines with specific Bitlocker monitoring criteria. It includes dependencies, target recommendations, translated SQL queries, and a visual representation of ticketing processes.

Bitlocker - Remove Volume

This document provides a comprehensive guide on how to disable BitLocker protection on one or all volumes using a PowerShell script. It includes sample runs, user parameters, and dependencies required for execution.

Bitlocker - Volume - Add Recovery Password Autofix

This document describes a script designed to add a recovery password to a BitLocker-enabled drive that lacks a key protector. The script disables the current BitLocker protection, initializes the TPM if necessary, and re-enables the protection with a Recovery Password protector. It is intended for execution as an Autofix script and not for manual use.

Bitlocker - Volume - Initialize

This document provides a detailed guide on how to encrypt a drive using Bitlocker disk encryption. It includes sample runs, global and user parameters, and the process for selecting key protector types. Important dependencies and prerequisites are also outlined to ensure successful encryption.

Bitlocker - Volume - Initialize

This document provides a detailed guide on implementing the BitLocker Volume Initialization script within ConnectWise RMM. It covers requirements, user parameters, task creation, and execution steps for encrypting a drive using BitLocker disk encryption.

Bitlocker - Volume - Initialize Autofix,Param - Wrapper

This document provides details on a script designed for the automatic deployment of BitLocker initialization to agents detected by the Internal Monitor for BitLocker. It includes sample runs, dependencies, user parameters, and output details.

Bitlocker and FileVault Status

This document provides a detailed overview of the encryption status of endpoints in ConnectWise Automate, focusing on BitLocker for Windows systems and FileVault for Mac systems. It includes dependencies, columns, and descriptions relevant to monitoring encryption status.

BitLocker Auditing

This document provides a comprehensive guide to creating device groups for the BitLocker drive encryption auditing solution in ConnectWise RMM. It details the necessary dependencies and outlines the criteria for four specific device groups: BitLocker - Audit Required, BitLocker - Enabled, BitLocker - Disabled, and BitLocker - Regular Auditing.

BitLocker Initialization

This document outlines a suite of 9 agent procedures designed for the initialization of BitLocker volumes using various protection methods. Each procedure is detailed with examples and logs to illustrate functionality and outcomes during execution.

Bitlocker Initialize C Volume

This document outlines a solution for enabling BitLocker on endpoints, including options for encryption methods and TPM control. It includes associated content such as scripts, custom fields, and monitors to ensure effective deployment and management of BitLocker encryption.

BitLocker Initialize C Volume

This document provides detailed information about the custom fields associated with the Bitlocker Initialize Volume solution, including their types, levels, default values, and descriptions.

BitLocker Initialize C Volume

This document outlines the procedure for enabling BitLocker on the system volume, detailing the encryption methods used, dependencies, and step-by-step implementation instructions for creating a task in ConnectWise RMM.

Bitlocker Recovery Password - AD Backup

This document provides a detailed guide on executing a script to back up BitLocker recovery keys to Active Directory. It covers requirements, dependencies, sample runs, and a step-by-step GPO creation process to ensure proper configuration for successful backups.

Bitlocker Recovery Password - AD Backup

This document provides a detailed implementation guide for the BitLocker Recovery Password backup to Active Directory using a ConnectWise RMM script. It includes requirements, sample runs, task creation steps, and troubleshooting tips.

Bitlocker Status

This document provides a comprehensive overview of the Bitlocker audit dataview, detailing the Bitlocker status of machine drives, key protectors, TPM status, and backup status in Active Directory for all audited computers.

Bitlocker Status - Retired Computers

This document provides a comprehensive overview of the Bitlocker information displayed in the dataview for all retired computers that have executed the Bitlocker Audit script. It details the Bitlocker status of machine drives, key protectors, TPM status, and backup status in Active Directory, along with the necessary dependencies and column explanations.

BitLocker Status and Recovery Key Audit

This document details a script that audits endpoints for BitLocker status, checking if drives are BitLocker-enabled, ensuring encryption is complete, and retrieving any available recovery keys. It provides a comprehensive overview of the script’s functionality, dependencies, and expected output.

BitLocker Status and Recovery Key Audit

This document outlines the creation of a custom field used to display the BitLocker encryption status of drives. It includes details on how to set up the field, its properties, and how it integrates with the BitLocker Status and Recovery Key Audit task, providing recovery keys when available.

BitLocker Status and Recovery Key Audit

This document outlines the process to audit the BitLocker status of endpoints. It details how to gather recovery keys for encrypted drives and store the results in a custom field, along with instructions for manual and scheduled script execution.

Disable BitLocker

This document provides a script that disables BitLocker on all drives, ensuring that data encryption is turned off and allowing for easier access to the drives. It includes a reference to the content location for further details.

EDF-Based Stolen Systems Monitor

This document outlines the execution of the Lock Stolen System script against machines marked with the Mark System As Stolen EDF, along with the process of monitoring these systems through Automate.

Enable Bitlocker

This document provides instructions for enabling Bitlocker on Windows endpoints that meet specific requirements such as running Pro or Premium versions of the Windows OS, having hardware TPM, and adhering to group policy settings. It also outlines the email notification process for failures and informs about the script location in ProVal VSA.

Enable Bitlocker Feature

This document outlines the process to enable various BitLocker features on Windows servers, including the necessary utilities and tools for drive encryption. It provides detailed instructions for setting up a monitor to ensure these features are installed and functioning correctly.

Enforce Bitlocker Encryption Method

Enforces Bitlocker encryption method. If a machine is found to be out of compliance, this task will decrypt the drive and re-encrypt it with the target method using a recovery password as the key protector. If a previous recovery password is detected, it will be used for the new encryption.

Lock Stolen System

This document provides a detailed overview of a script designed to track and lock down stolen systems. It outlines the script functionality, sample runs, variables, global parameters, and the ticketing process for reporting stolen devices.

OSX - File Vault Audit

This document provides a comprehensive overview of the FileVault Status dataview for MAC computers, including requirements, dependencies, and detailed column descriptions to help monitor the encryption status of devices in your environment.

plugin_proval_bitlocker_audit

This document provides details on how to store and audit BitLocker configuration information on target machines, including the various parameters and statuses related to BitLocker encryption.

plugin_proval_tpm_audit

This document provides a detailed overview of the Bitlocker TPM Audit Table populated by the SEC - Encryption - Script - Bitlocker - Audit script. It outlines the structure and dependencies of the table, including the various properties captured from the Get-TPM command related to TPM management.

pvl_wifi_profiles

This document outlines the purpose and structure of a custom table designed to store WiFi Profiles information for each computer, including dependencies and detailed column explanations.

Security - Stale Bitlocker Data

This document outlines a method to detect Windows computers where the BitLocker audit script has not executed in the past month and initiates its execution. It also details the necessary roles for Windows servers to support BitLocker and provides links to related SQL scripts for role import in Automate.

Stale Bitlocker Data

This document outlines a monitor designed to track Windows agents with Bitlocker enabled, specifically focusing on those where key data has not been gathered for over 30 days. It includes dependencies for script execution and custom table integration for effective key retrieval.

Unprotect Bitlocker Volume

This document provides detailed instructions on how to disable Bitlocker protection on one or all volumes. It includes sample runs, dependencies, user parameters, task creation steps, and script execution details.

Windows - Bitlocker Eligibility

This document outlines a dataview that displays the eligibility status of machines for implementing Bitlocker, including whether it is enabled and the necessary dependencies for proper functionality.