![]() You can use one of the following methods or combinations of methods for a key protector:īitLocker uses the computer's TPM to protect the encryption key. When a user accesses a drive protected by BitLocker, such as when starting a computer, BitLocker requests the relevant key protector.įor example, the user can enter a PIN or provide a USB drive that contains a key.īitLocker retrieves the encryption key and uses it to read data from the drive. ![]() ![]() The Add-BitLockerKeyProtector cmdlet adds a protector for the volume key of the volume protected with BitLocker Drive Encryption. In this article Syntax Add-Bit Locker Key Protector Adds a key protector for a BitLocker volume.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |