EN 
09.12.2025 Vratislav WELCOME IN MY WORLD

This website is originally written in the Czech language. Most content is machine (AI) translated into English. The translation may not be exact and may contain errors.

Tento článek si můžete zobrazit v originální české verzi. You can view this article in the original Czech version.
BitLocker - šifrování externích disků

BitLocker - encrypting external drives

Edited 03.07.2018 13:24 | created | Petr Bouška - Samuraj |
From the user's point of view, using BitLocker should be just as easy for any type of disk. From an administrator's perspective, the most complex configuration is for system disks, which we covered last time. In this article, we'll take a brief look at encryption for removable drives, BitLocker To Go, which is very similar to BitLocker Drive Encryption for Fixed Data Drives.
displayed: 16 619x (15 574 CZ, 1 045 EN) | Comments [3]

This article follows up on the previous BitLocker - encryption of system disks, where BitLocker and management tools are described. The following chapters are also useful:

  • Additional BitLocker settings using policies
  • Storing BitLocker keys for recovery in Active Directory
  • Configuration using Group Policy

Managing BitLocker To Go

BitLocker To Go is referred to as BitLocker Drive Encryption (it's the same technology) designed for removable media (Removable Data Drives), which are USB flash drives, external hard drives, SD cards, and other disks formatted with NTFS, FAT16, FAT32, or exFAT. We can thus protect the data we carry with us. The encrypted disk can be opened on any computer that supports BitLocker technology. Alternatively, we can use the BitLocker To Go Reader application (for read-only access).

BitLocker To Go does not use a TPM chip, so a lot of the complexity is eliminated (we also don't have to deal with unlocking the disk at computer startup). To unlock the encrypted disk, we can use

  • password
  • certificate on a smart card
  • domain account or group (SID protector)
  • automatic unlock (using data stored on a specific computer account)
  • recovery key

Configuration using Group Policy

As we described earlier, we can configure many things using group policies. The settings are located in the path Computer Configuration - Administrative Templates - Windows Components - BitLocker Drive Encryption - Removable Data Drives. We can set how recovery information is handled and store it in AD DS again. Or we can define parameters for passwords to unlock the disk (requirement to use, complexity, length).

Unlocking with a smart card

If we want to use a certificate on a smart card, it must meet certain requirements or we must set a policy. If the certificate has the Key Usage attribute, it must have one of the values Data Encipherment, Key Agreement or Key Encipherment. If it has the Enhanced Key Usage (EKU) attribute, it must have the value OID 1.3.6.1.4.1.311.67.1.1 or a policy defined as Validate smart card certificate usage rule compliance in the path Computer Configuration - Administrative Templates - Windows Components - BitLocker Drive Encryption.

Group Policy pro BitLocker certifikát

Encryption usage from the user's perspective

Encrypting a removable disk

is very simple (some properties are set using policies in the following procedure):

  • connect the disk
  • launch the graphical tool BitLocker Drive Encryption (you can find it under Control Panel, for example)
  • expand the given external disk
BitLocker To Go
  • click on Turn on BitLocker (or we can use File Explorer and the option is in the context menu)
  • the wizard starts, where in the first step we choose the method we will use to unlock the disk

Note: It is safer to use a password. The second option is to use a smart card certificate. But we need to consider where we will need to use the external disk.

BitLocker To Go - odemykání
  • the last step is just to confirm the start of encryption
BitLocker To Go - zahájit šifrování
  • encryption takes a certain amount of time, and we can see the progress in the window
BitLocker To Go - průběh šifrování

Unlocking the disk

When we subsequently connect the disk to any computer (that supports BitLocker), we see it as locked and must enter the chosen password.

BitLocker To Go - odemknutí disku

Setting automatic unlock

If we connect the encrypted external disk and unlock it, we can set Auto-unlock in the BitLocker management BitLocker Drive Encryption. This will save the disk information to Windows (in the profile of the logged-in user) and it will automatically unlock when connected (on this computer, of course, slightly reducing the security). If we wanted to use this method for fixed disks (Fixed Data Drives), the system disk must be encrypted. For removable media (Removable Data Drives), this condition does not apply.

BitLocker To Go - auto-unlock

Setting unlock using a domain account or group

Within a domain, we can set a domain account or group (AD DS Account Key Protector / Security Identifier (SID)-based Identity Protector) to unlock the volume. We can configure this using the PowerShell cmdlet Add-BitLockerKeyProtector or the command-line tool manage-bde -protectors. Then, when the specified account is logged in to the computer, the volume will be automatically unlocked. If we are logged in with a different account, we cannot unlock the volume (unless we have set another unlock method).

Example of setting the account bouska to unlock the E drive (you can use the alias SID instead of the parameter ADAccountOrGroup).

PS C:\> Add-BitLockerKeyProtector -MountPoint E: -ADAccountOrGroupProtector -AdAccountOrGroup firma\bouska
   ComputerName: BITLOCKER-TEST

VolumeType      Mount CapacityGB VolumeStatus           Encryption KeyProtector              AutoUnlock Protection
                Point                                   Percentage                           Enabled    Status    
----------      ----- ---------- ------------           ---------- ------------              ---------- ----------
Data            E:          0,94 FullyEncrypted         100        {AdAccountOrGroup}        False      On        

C:\> manage-bde -protectors -add E: -ADAccountOrGroup firma\bouska
BitLocker Drive Encryption: Configuration Tool version 10.0.16299
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

Key Protectors Added:

    Identity:
      ID: {43DDD924-E476-4256-933D-75C7781E33CB}
      SID:
        S-1-5-21-2200562112-3866772066-1594429334-1123
      Account Name:
        FIRMA\bouska

Viewing the set methods (protectors). The PowerShell way may have another option, but the command-line tool shows me more in this simple way.

PS C:\> (Get-BitLockerVolume E:).KeyProtector

KeyProtectorId      : {43DDD924-E476-4256-933D-75C7781E33CB}
AutoUnlockProtector : 
KeyProtectorType    : AdAccountOrGroup
KeyFileName         : 
RecoveryPassword    : 
KeyCertificateType  : 
Thumbprint          : 

C:\> manage-bde -protectors -get E:
BitLocker Drive Encryption: Configuration Tool version 10.0.16299
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

Volume E: []
All Key Protectors

    Identity:
      ID: {43DDD924-E476-4256-933D-75C7781E33CB}
      SID:
        S-1-5-21-2200562112-3866772066-1594429334-1123
      Account Name:
        FIRMA\bouska

If we want to remove the method.

PS C:\> Remove-BitLockerKeyProtector -MountPoint E: -KeyProtectorId "{43DDD924-E476-4256-933D-75C7781E33CB}" 
Author:

Related articles:

Windows OS

Articles dedicated to Microsoft operating systems, both client and server.

If you want write something about this article use comments.

Comments
  1. [1] Michal Ryba

    Zdravím.

    Je nějaká možnost šifrovat USB disk jak na iOS tak na Windows, tak aby bylo šifrování použitelné a funkční na obou platformách?

    Děkuji

    Monday, 03.09.2018 13:32 | answer
  2. [2] Asha

    Dobrý den, líbí se mi disk Seagate Expansion 3TB odtud https://www.arecenze.cz/externi-disky/#nejlepsich10 jsem naprostý laik, půjde mi zašifrovat podle vašeho návodu?

    Saturday, 17.11.2018 18:19 | answer
  3. [3] garry

    respond to [2]Asha: půjde

    Friday, 29.11.2019 15:28 | answer
Add comment

Insert tag: strong em link

Help:
  • maximum length of comment is 2000 characters
  • HTML tags are not allowed (they will be removed), you can use only the special tags listed above the input field
  • new line (ENTER) ends paragraph and start new one
  • when you respond to a comment, put the original comment number in squar brackets at the beginning of the paragraph (line)