If you specify this protector, users can access the encrypted drive as long as it is connected to the system board that hosts the TPM and the system boot integrity is intact. BitLocker uses the computer’s TPM to protect the encryption key. The list of protectors will be displayed as follows:ĭetailed information on each protector type, in accordance with Microsoft documentation, is provided below: ![]() (where C: is the name of the mounted BitLocker-encrypted volume) To list the protectors of a given BitLocker volume, type the following command in command-line prompt (cmd): manage-bde -protectors -get C:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |