{"id":46234,"date":"2020-12-03T16:11:29","date_gmt":"2020-12-03T12:11:29","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=46234"},"modified":"2020-12-09T20:34:49","modified_gmt":"2020-12-09T16:34:49","slug":"introduction-to-bitlocker-for-msps","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/introduction-to-bitlocker-for-msps\/","title":{"rendered":"Introduction to BitLocker for MSPs"},"content":{"rendered":"<p>It's no secret that data security is vitally important for every organization: by protecting customers\u2019 data, MSPs will safeguard both their client\u2019s businesses and their reputations.<br \/>\nThe protection of customer data today goes beyond using anti-malware and firewall software. It also goes beyond using a secure password on every device.<!--more--> If a physical device falls into the wrong hands, what is stopping someone from removing the data storage component and accessing any privileged data that it holds using a docking station or a data transfer cable?<\/p>\n<p>For this reason, all devices which store private data require encryption. There are many different options out there for encrypting data - but there may not be anything currently as popular as BitLocker.<\/p>\n<div class=\"table-of-content \">\n\t\t\t\t<p>Table of Contents<\/p>\n\t\t\t\t<ul><\/ul>\n\t\t\t\t<\/div>\n<h2>Why BitLocker?<\/h2>\n<p>BitLocker is full-disk encryption software. It all begins with the fact that it comes for free in the professional and enterprise versions of the Windows operating system.<\/p>\n<h3>It's Widely Used and Easily Supported<\/h3>\n<p>The popularity among MSPs makes it much easier to support, thanks to the availability of user forums and records of known issues and fixes.<\/p>\n<h3>It's Been Tried and Tested<\/h3>\n<p>BitLocker has been tried and tested, so users get a straightforward and secure solution thanks to the popularity of this solution across the industry.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/full-disk-encryption-approaches-and-solutions-for-msps\/\">Full Disk Encryption: BitLocker and Alternatives<\/a><\/p>\n<h2>Preparing your Organization for BitLocker<\/h2>\n<p>Implementing BitLocker to encrypt devices on your network involves overcoming several different challenges. Prepare your plan of attack in advance and communicate it to all your staff and end-users who will be affected.<\/p>\n<h3>Create an SOP for your Encryption Policy<\/h3>\n<p>Developing a <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-create-standard-operating-procedures\/\">standard operating procedure (SOP)<\/a> will help to establish an understanding of the actions that need to be taken and the impact these will have. This SOP should include both the industry standards procedures and any specific procedures that relate to your company\u2019s practices. This SOP requires review by everyone involved in the process, including each end-user, before starting the rollout.<\/p>\n<h3>Phase Out of Outdated Operating Systems<\/h3>\n<p>If possible, upgrade all your devices to the latest standard of the operating system before rolling out the BitLocker implementation. While Windows 7 supports BitLocker, as of January 2020, Microsoft no longer supports this version. Although Windows 7 remains a popular operating system, the loss of official support for bug-fixes makes it an unacceptable security risk that businesses should eliminate.<\/p>\n<h3>Confirm Solid Data Backups<\/h3>\n<p>Encrypting drives brings the inherent risk that you may lose access to your data if the password is lost or the drive fails. Because of this, it's imperative to verify that every backup has completed successfully, and data is recoverable before the BitLocker implementation.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">Full System Backup and Recovery<\/div>\n<div class=\"call-to-action__text\">Check out our comprehensive guide covering system state, system image, and application-aware backup and recovery, as well as bare-metal recovery:<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-64dcb3ac-a304-4fdc-a704-c1242185e7c4\" data-portal=\"5442029\" data-id=\"64dcb3ac-a304-4fdc-a704-c1242185e7c4\"><span class=\"hs-cta-node hs-cta-64dcb3ac-a304-4fdc-a704-c1242185e7c4\" id=\"hs-cta-64dcb3ac-a304-4fdc-a704-c1242185e7c4\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/64dcb3ac-a304-4fdc-a704-c1242185e7c4\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-64dcb3ac-a304-4fdc-a704-c1242185e7c4\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/64dcb3ac-a304-4fdc-a704-c1242185e7c4.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 200px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2018\/02\/Full-System-Backup-WP-icon.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h2>Determining Specific Requirements<\/h2>\n<p>Encrypting devices throughout a network can be a significant project. The following steps will let you know what to expect during your specific implementation.<\/p>\n<h3>Find Out Which Devices Need Encryption<\/h3>\n<p>In many cases, businesses need every device on their network to be encrypted. There may be cases where it may be better to identify a list of the devices where encryption is required and only configure BitLocker on these specified devices. Determine the total number of devices that need to be encrypted depending on your specific situation.<\/p>\n<h3>Develop Passphrase Standards<\/h3>\n<p id=\"last\">Each device will require an additional level of authentication in the form of a passphrase before it can be accessed. As each device has its passphrases added, it's essential to have a standard to ensure that all passphrases provide the appropriate level of security. It's up to the MSP and the client to, between them, determine the minimum standards to implement. Remember that a simple passphrase will be simple to bypass, defeating the whole point of making an effort to implement BitLocker in the first place.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-09b0265a-a5a1-41bd-9699-418982b48e90\" data-portal=\"5442029\" data-id=\"09b0265a-a5a1-41bd-9699-418982b48e90\"><span class=\"hs-cta-node hs-cta-09b0265a-a5a1-41bd-9699-418982b48e90\" id=\"hs-cta-09b0265a-a5a1-41bd-9699-418982b48e90\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/09b0265a-a5a1-41bd-9699-418982b48e90\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-09b0265a-a5a1-41bd-9699-418982b48e90\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/09b0265a-a5a1-41bd-9699-418982b48e90.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-management\/\">Password Management Best Practices for MSPs<\/a><\/p>\n<h3>Budget, Time, and Cost<\/h3>\n<p>Managed service providers need to work out how to budget the time and resources necessary to complete the implementation, and client businesses need to understand the financial investment that they are willing to make.<\/p>\n<h2>Deployment<\/h2>\n<p>Proper preparation is vitally important - but it all goes to waste if the deployment fails. The swift and successful execution of your deployment plan is the entire point of this process. Here are a few suggestions to help make this happen.<\/p>\n<h3>Coordinate a Rolling Deployment<\/h3>\n<p>To verify that the rollout has a minimal effect on business productivity, coordinate a rolling deployment. Implementing BitLocker on a device will make that device unavailable while the initial encryption is in progress. For devices with large storage capacity, this may be some time. These constraints may mean rather than taking an entire department down at any one time, pick just one or two devices from that department for deployment. If this is not possible, or if it will still negatively affect productivity, you may need to plan upgrades for implementation during off-hours.<\/p>\n<h3>Educate End Users on Appropriate Use<\/h3>\n<p>End-users need to understand the importance of this new encryption process and how to use it appropriately. Most importantly, users must not share their encryption keys with anyone else, no matter what the situation may be. If a user believes that their key has fallen into the wrong hands, they must notify the managed service provider immediately.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/end-user-training-guide-for-msps\/\">End-User Training Guide for MSPs<\/a><\/p>\n<h2>Additional Considerations<\/h2>\n<p>There are a few other factors to consider, including mobile devices and recovery processes.<\/p>\n<h3>Mobile Devices<\/h3>\n<p>Mobile devices running iOS or Android may require additional considerations. Both operating systems have native options for data encryption. Managed service providers should assist the businesses by supporting encryption for these devices, too.<\/p>\n<h3>Recovery Processes<\/h3>\n<p>If a device fails, BitLocker can make recovery just a little bit harder to achieve. You can recover failed devices from their data backup but, if that data needs to be pulled directly from an encrypted drive, the managed service provider will need to be prepared to take the necessary actions to achieve this.<\/p>\n<h2>Conclusion<\/h2>\n<p>BitLocker is an excellent tool for taking the next step in protecting user data, but its implementation needs careful planning and decisive execution. Doing it the right way will ensure the maximization of business productivity throughout the deployment process, leaving the customer with a smile on their face after the rollout is complete.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s no secret that data security is vitally important for every organization: by protecting customers\u2019 data, MSPs will safeguard both their client\u2019s businesses and their reputations. The protection of customer data today goes beyond using anti-malware and firewall software. It also goes beyond using a secure password on every device.<\/p>\n","protected":false},"author":59,"featured_media":46225,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-46234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/46234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=46234"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/46234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/46225"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=46234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=46234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=46234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}