You will of course need your clients also prepared for BitLocker, including ensuring that a TPM chip is available, cleared and activated, with the preferred BIOS mode being UEFI using Secure Boot. In order to successfully escrow the recovery key through to the MBAM database you will need to do one of two things depending on your roll-out of MBAM. Part 4: Validation of key storage and recovery tests Escrow recovery details Part 3: Configuration of GPO policies and client agent deployment Part 2: Validating IIS sites and customisation In this, the final part of this four-part series, we will look at how to validate MBAM is escrowing keys, they are retrievable through different methods.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |