Configuring a BitLocker Encryption Policy

To manage BitLocker encryption on Endpoint Security clients on Windows, configure the Full Disk EncryptionClosed A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. Policy. You can use the default Full Disk Encryption ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. Default Full Disk Encryption settings for the entire organization, change the action of the rule to Use BitLocker Management, and install the policy.

Alternatively, you can create a new rule and configure actions for a specific organizational unit.

Best Practices -

  1. When you change the encryption policy for clients from Check Point Full Disk Encryption to BitLocker Management, the disk on the client is decrypted and then encrypted. This causes the disk to be in an unencrypted state for some time during the process. We recommend that you do not change the encryption policy for entire organization in one operation. Make the change for one group of users at a time.

  2. Define the BitLocker policy before installing the Endpoint Security package on the client computers. This ensures that encryption will happen just one time, with BitLocker. It avoids Check Point FDE encryption followed by FDE decryption and BitLocker encryption.