BitLocker Management in the DCC

In the DriveLock Control Center’s Helpdesk view, click Encrypted Disks to view all computers with encrypted and/or decrypted hard drives.

The following information, among others, is displayed here:

  • Algorithm: this column shows the algorithm used to encrypt the respective drive and which you set in the Harddisk encryption settings dialog.
  • Percentage of encryption: if the drive is completely encrypted, the percentage shows 100%. During the encryption or decryption process, you can see how much of the data is encrypted in percent.
  • State of encryption with the following values:

    • Fully Decrypted: the drive is decrypted. The data is not protected.
    • Fully Encrypted: the drive is encrypted.
    • Encryption In Progress: the drive is currently being encrypted. See how much of the drive is already encrypted in the Percentage of encryption column.
    • Decryption In Progress: the drive is currently being decrypted. The percentage refers to the portion that is still encrypted.
    • Locked: This state shows that a drive has already been encrypted with native BitLocker before being managed with DriveLock BitLocker Management (i.e. before the installation of the DriveLock Agent and before assigning a BitLocker policy).

      Please find more information in the topic Integrating existing BitLocker environments.

  • Managed by shows whether DriveLock is already managing the encryption or still native BitLocker.

    • DriveLock BitLocker: DriveLock BitLocker Management is already managing the drive.
    • BitLocker: Native BitLocker is still locking the drive (see above). The drive has to be unlocked so that it can be accessed by the DriveLock Agent, re-encrypted and managed by DriveLock BitLocker Management.
  • Protectors:

    • Passphrase: If the Trusted Platform Module (TPM) is missing or not enabled on the computer, a passphrase can be used for authentication. Users must enter this passphrase each time they start their computer in the Windows pre-boot environment.
    • Recovery Key (also Numerical Password): The recovery key is always used as a protector for encryption.

      Microsoft uses two protectors by default for the original encryption of a system or data partition with BitLocker. These are either TPM, TPM and PIN or Passphrase and Numerical Password.

    • TPM: This protector only works on drives with a built-in TPM (’TPM only’). Entering a PIN (BitLocker password) is not required.

    • TPM and PIN: A built-in TPM is also required in this case. Here the TPM and a PIN (BitLocker password) are used for authentication. Users must enter this password each time they start their computer in the Windows pre-boot environment.
    • External Key: DriveLock uses this protector if the auto-unlock option is specified for the drive (Automatically unlock all data partitions in the Authentication type dialog).

      DriveLock also provides the recovery key for data partitions. Even without the auto-unlock option, this external key allows you to access a data partition that is not protected with a password. This ensures that data partitions can also be unlocked using the recovery key, even if TPM is used as the protector.