Enabling Full Disk Encryption | Information Security Office (2024)

Overview

Full disk encryption protects the data on your device in the event it is lost or stolen. Without full disk encryption, if the data drive in the computer is removed, the data can be easily read and accessed. When correctly deployed, full disk encryption requires unauthorized users to have both physical access to your device as well as the password in order to decrypt the data on your device.

However, if both the password and the recovery key are unknown or lost, the device cannot be decrypted and the data will be unrecoverable. It is strongly recommended that you store your passwords and recovery keys in a password manager app like LastPass to avoid this issue.

Full disk encryption should be implemented for all portable devices when:

  • Storing or processing Institutional Information classified at P3 or higher

  • External requirements mandate the use of full disk encryption (such as research Data Use Agreements with third-party data providers).

University-Managed Computers

If you have a University-managed device and do not have administrator privileges on your device, utilize the BigFix Self Service offer for encryption (using instructions for Windows or instructions for macOS). If you encounter any difficulties with the self-service offer or these instructions, contact IT Client Services or your departmental IT support for assistance.

Personally-Managed Computers

For personally-managed computers, see the instructions below for enabling full disk encryption on Windows and Mac computers.

Enable Full Disk Encryption on Microsoft Windows

BitLocker

Microsoft includes a full disk encryption feature built into Windows called BitLocker.

BitLocker is available on supported devices running Windows 10/11 Pro, Enterprise, or Education edition. It is not available on Home edition. Students, faculty and staff can upgrade their Windows 10 system to the Education edition.

User Experience

Many newer computers have a built-in encryption chip that unlocks your encrypted files when you log on.

If your computer does not have an encryption chip, you will have an extra verification step on startup before you can log on. This verification step is only required on startup; once verified, you can log on and out of your user account as normal.

Once logged on, navigating folders and saving files will remain the same.

collapse allexpand all

Enable BitLocker

Enabling BitLocker will require administrator privileges. If you have a university-managed device and do not have administrator privileges on your device, utilize the BigFix Self Service offer for encryption. If you encounter any difficulties with the self-service offer or these instructions, contact IT Client Services or your departmental IT support for assistance.

ISO recommends that you use a standard user account for all day-to-day activities and elevate to admin privileges only when needed. This process can be performed from a standard user account and will prompt for privilege elevation when needed.

You can use your computer while the drive is being encrypted, but you will need to reboot the computer once the encryption process is complete.

Instructions to turn on device encryption for Windows 10 and 11.

If an error message is displayed (No TPM chip error):

Your computer may display an error message that says "This device can’t use a Trusted Platform Module. Your administrator must set the “Allow BitLocker without a compatible TPM” option in the ‘Require additional authentication at startup’ policy for OS volumes."

Enabling Full Disk Encryption | Information Security Office (2)

The TPM is the encryption chip that allows user accounts to unlock the drive upon startup.

If you get the error message, your computer was made without an encryption chip and you can use a USB or PIN as a substitute.

Steps

This process will require logging onto an administrator account.

Log on with an administrator account > Start > Windows System > Run > gpedit.msc > navigate to Computer Configuration/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drives > Require additional authentication at startup (right click/edit or double click) > Enable > Check Allow BitLocker without a compatible TPM > Apply

  1. Go to Start > Windows System > Run

Enabling Full Disk Encryption | Information Security Office (3)

  1. Rungpedit.msc

Enabling Full Disk Encryption | Information Security Office (4)

  1. Navigate to Computer Configuration/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drives > Require additional authentication at startup (right click/edit or double click)

Enabling Full Disk Encryption | Information Security Office (5)

  1. Enable > Check Allow BitLocker without a compatible TPM > Apply

Enabling Full Disk Encryption | Information Security Office (6)

Once these steps are complete, try again to turn on BitLocker by following the earlier steps:

Open File Explorer > This PC > Local Disk (C:) > Manage [Drive Tools] > BitLocker > Manage BitLocker > Turn on BitLocker

You will be able to choose between creating a PIN or USB flash drive to unlock your drive at startup. Once you have picked an option, there is no way to switch without decrypting then re-encrypting the drive.

Enabling Full Disk Encryption | Information Security Office (7)

Every person that uses the computer will need to know the PIN or have a copy of the USB flash drive.

Utilizing either of these options requires a person to be physically present for startup; if you are managing your system remotely (e.g. through RDP), a person with the PIN or USB must go in person to decrypt the drive before remote functions can be used.

If you have planned updates that require a reboot of the computer, you may follow the instructions below to suspend BitLocker. BitLocker will re-enable after the reboot.

ISO recommends the PIN option. The PIN can be stored in LastPass and shared securely to other users of the computer. The PIN is separate from a user account password. Follow ISO passphrase guidelines to create a long, secure PIN.

ISO does not recommend the USB option. The USB created should never be left in the computer once the drive has been unlocked and will need to be stored securely in a locked cabinet or drawer. The USB will also not show the file that unlocks the drive, so it will not appear to be different from other USBs and must be labelled.

Suspend BitLocker

For planned updates, hardware changes, or configuration changes, there is an option in the BitLocker menu to suspend BitLocker but not turn it off. Turning off BitLocker is not recommended for temporary situations, as it will decrypt the drive and require the entire process to be repeated to be turned back on.

Enabling Full Disk Encryption | Information Security Office (8)

Recovery Keys

When you set up BitLocker, you will need to choose a recovery option in the event you:

  1. With TPM chip: forget your user account password

  2. Without TPM chip: lose the USB startup key or forget the decryption PIN

  3. Upgrade the operating system

  4. Move the encrypted drive to a new computer

  5. Install a new motherboard

  6. Change the boot configuration settings

  7. Update the computer BIOS

Recovery options:

  1. Plaintext recovery key
    1. BitLocker can generate a plaintext recovery key that can be typed in manually during recovery.
    2. (ISO recommended) Copy into a LastPass entry.
    3. Save to a file and print out. Store the printout in a secure location, such as a locked drawer or cabinet.
    4. Save to a USB. Store the USB in a secure location, such as a locked drawer or cabinet.
    5. Every computer owner is responsible for the recovery key to their own device, including owners of campus managed devices. ITCS does not store recovery keys.
  2. Microsoft Account (personally-owned devices only)

You can access your recovery key options at any time through the BitLocker main menu.

If you ever regenerate the recovery key, make sure you update all of your recovery key backups.

Enable Full Disk Encryption on Apple macOS

FileVault

FileVault provides data and operating system protection for your Mac in the event the computer is stolen or lost. FileVault is available on all Mac computers.

Enabling FileVault will not affect the user experience. Logging in, navigating folders and saving files will all remain the same. Once FileVault is enabled, all data stored on the drive will be encrypted.

Enable FileVault

Enabling FileVault will require administrator privileges. If you do not have administrator privileges on your device, contactIT Client Servicesor your departmental IT support for assistance.

ISO recommends that you use a standard user account for all day-to-day activities and elevate to admin privileges only when needed. This process can be performed from a standard user account and will prompt for privilege elevation when needed.

Instructions to use FileVault to encrypt your Mac startup disk.

FileVault will encrypt the files for all users of the computer; each user will be prompted to enter their password during setup. If a user is not enabled in FileVault, they will not be able to log in or access their data. User accounts that you add after turning on FileVault are automatically enabled.

Recovery Keys

When you set up FileVault, you will need to choose a recovery option in the event you forget your account password.

Recovery options:

  1. Plaintext recovery key

    1. FileVault can generate a plaintext recovery key that can be typed in manually during recovery.

    2. ISO recommends creating a LastPass entry to store the recovery key. The key can also be copied into a file and printed out. Store the printout in a secure location, such as a locked drawer or cabinet.

    3. Every computer owner is responsible for the recovery key to their own device, including owners of campus managed devices. ITCS does not store recovery keys.

  2. iCloud (personally-owned devices only)
    1. If you store your recovery key in your iCloud account, there's no guarantee that Apple will be able to give you the key if you lose or forget it. Not all languages and regions are serviced by AppleCare or iCloud, and not all AppleCare-serviced regions offer support in every language.

If you want to change the recovery key used to encrypt your startup disk, turn off FileVault in Security & Privacy preferences. You can then turn it on again to generate a new key and disable all older keys. Make sure you update all your recovery key backups.

Enabling Full Disk Encryption | Information Security Office (2024)

FAQs

Is full disk encryption enough? ›

Invariably, entire disk encryption is the recommended way to go in order to enhance security. Here's why: Stronger Protection: A full disk encryption protects all the information that is stored on your hard drive such as mail, photos, videos, sensitive data, operating system, and even temporary files.

How do you activate full disk encryption? ›

Turn on device encryption
  1. Sign in to Windows with an administrator account (you may have to sign out and back in to switch accounts). For more info, see Create a local or administrator account in Windows.
  2. Select Start > Settings > Privacy & security > Device encryption. ...
  3. If Device encryption is turned off, turn it On.

How do I know if my full disk encryption is enabled? ›

Check if your device is encrypted (Windows 10 Home edition)

Select the settings cogwheel icon. Select 'Update & Security'. In the left-hand column, select 'Device encryption'. If you see the message 'Device encryption is on' with the option to 'Turn off', your hard drive is encrypted.

What are the disadvantages of full disk encryption? ›

Drawbacks of full-disk encryption
  • The encryption and decryption process can slow down data access times, particularly when virtual memory is being heavily accessed.
  • If users forget their password and lose their recovery key, the device will be inaccessible to them, and they will be locked out just like an intruder.

Can full disk encryption be cracked? ›

So an encrypted hard disk could be cracked only if: the user has a weak enough password to brute force, or. the encryption uses a weak algorithm.

Is full disk encryption worth it on Reddit? ›

This is a perfect example of why you NEED full disk encryption to protect your data and prevent it from falling in the wrong hands. You never know where or when one of your drives will be lost or stolen, if it hasnt happened yet, IT WILL HAPPEN, it can happen to anyone.

Should I use disk encryption? ›

Basically, should your computer be lost or stolen, full-disk encryption will protect and secure any sensitive data, and keep any unauthorized persons from gaining access to it.

How much does full disk encryption cost? ›

While costs vary dramatically based on factors such as organization size and the industry involved, the most expensive aspect of full disk encryption is the "user time incurred operating computer" featuring the technology.

What is the full disk encryption security? ›

Full-disk encryption is the process of encoding all user data on an Android device using an encrypted key. Once a device is encrypted, all user-created data is automatically encrypted before committing it to disk and all reads automatically decrypt data before returning it to the calling process.

What is the difference between disk encryption and full disk encryption? ›

Disk encryption or full disk encryption (FDE), as the name suggests is a method in which the entire disk gets encrypted. It differs from file encryption in the aspect that instead of individual files, the whole disk is encrypted and decrypted at once, including the operating system and related files.

How do I decrypt a full disk encryption? ›

To access Recovery Console using Repair CD:
  1. Log into the Recovery Console CD. If the Device ID is editable, check the correct DeviceID from the PolicyServer.
  2. Click Recovery Console.
  3. In the left pane, click Decrypt Disk.
  4. Click Decrypt found on the bottom right. Wait until the decryption process completes.

How long does full disk encryption take? ›

How long will the encryption take? The length of time will depend on the size and speed of the hard drive in your computer. In our testing, the process has taken anywhere from 20 minutes to three hours.

What's the worst problem for encryption schemes? ›

Failure to handle key management properly is, hands down, the most common way that sensitive data ends up in the hands of hackers even if it was encrypted correctly.

Does encryption slow down your computer? ›

Over the years we have noticed Encryption adversely affecting system performance - primarily in the read and write speeds. With some hard drives, this has been up to a 70% drop in speed. We see this on SSD's and NVMEs'.

What is the risk of not having disk encryption? ›

Data Theft: Without encryption, sensitive information like passwords, financial data, or personal documents can be easily accessed by unauthorized individuals if the laptop is lost, stolen, or hacked.

Does full disk encryption protect against eavesdropping? ›

Encrypting the entire disk prevents unauthorized access to the data in case it's lost or stolen. It also protects against malicious tampering of the files contained on the disk.

Is full disk encryption better than secure boot? ›

Secure boot ensures the integrity of the boot process, preventing unauthorized software from running, while disk encryption safeguards the data stored on the disk, protecting it from unauthorized access.

Is 128 bit encryption good enough? ›

A 128-bit level of encryption has 2128 possible key combinations. AES is by far the most advanced encryption trusted by organizations worldwide. AES-128 is strong enough to meet future security needs.

Does full disk encryption affect performance? ›

Over the years we have noticed Encryption adversely affecting system performance - primarily in the read and write speeds. With some hard drives, this has been up to a 70% drop in speed.

Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6010

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.