MBAM Beta Planning Deployment and Operations Guide
MBAM Beta Planning Deployment and Operations Guide
Beta Release
Copyright
This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference purposes. This document is confidential and proprietary to Microsoft. It is disclosed and can be used only pursuant to a non-disclosure agreement. 2011 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Bing, Internet Explorer, SQL Server, Visio, Win32, and Windows are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners. Portions of this documentation related to network monitoring are provided by EMC, and for those portions the following copyright notice applies 2010 EMC Corporation. All rights reserved.
Contents
Microsoft BitLocker Administration and Monitoring Planning, Deployment, and Operations Guide 5 In This Section ........................................................................................................................ 5 Related Sections ..................................................................................................................... 5 High-Level Architecture for MBAM .............................................................................................. 5 Architecture Overview ............................................................................................................. 6 About Microsoft BitLocker Administration and Monitoring ............................................................ 6 MBAM Supported Configurations ................................................................................................ 7 Server Operating System Requirements.................................................................................. 7 Prerequisites for BitLocker Administration and Monitoring Server Components ........................ 8 Prerequisites for Administration and Monitoring Server......................................................... 8 Prerequisites for the Compliance and Audit Reports Server.................................................. 8 Prerequisites for the Recovery and Hardware Database Server............................................ 9 Prerequisites for the Compliance Status Database Server .................................................... 9 MBAM Client Operating System Requirements........................................................................ 9 Planning for MBAM....................................................................................................................10 Planning and Configuring Group Policy for MBAM .....................................................................10 Group Policy Requirements ....................................................................................................10 Global Policy Definitions .........................................................................................................12 Data Recovery Policy Definitions.........................................................................................13 Operating System Drive Policy Definitions ...........................................................................13 Fixed Data Drive Policy Definitions ......................................................................................15 Removable Data Drive Policy Definitions.............................................................................17 Report Policy Definitions .....................................................................................................19 Client Management Policy Definition ...................................................................................20 User-Based Group Policy Definitions...................................................................................22 Planning Server Infrastructure for MBAM ...................................................................................22 Planning the Server Deployment ............................................................................................22 Planning for Administrator Roles.............................................................................................24 Planning Client Deployment for MBAM ......................................................................................25 Client System Requirements ..................................................................................................25 Computer Encryption before Distribution to the User...............................................................25 Computer Encryption after Distribution to the User .................................................................25 Planning Hardware Management for MBAM ..............................................................................26 Deploying MBAM.......................................................................................................................27
Deploying MBAM ...................................................................................................................27 Deploying MBAM Policies ..........................................................................................................27 How to Deploy MBAM Policy ..................................................................................................28 How to Deploy the MBAM Server Features ................................................................................29 Deploying the MBAM Server ..................................................................................................30 Validating the MBAM Server Feature Installations ..................................................................34 Deploying the MBAM Server......................................................................................................36 See Also ................................................................................................................................36 MBAM Supported Configurations ...............................................................................................36 Server Operating System Requirements.................................................................................36 Prerequisites for BitLocker Administration and Monitoring Server Components .......................37 Prerequisites for Administration and Monitoring Server........................................................37 Prerequisites for the Compliance and Audit Reports Server.................................................38 Prerequisites for the Recovery and Hardware Database Server...........................................38 Prerequisites for the Compliance Status Database Server ...................................................38 MBAM Client Operating System Requirements.......................................................................38 Deploying the MBAM Client .......................................................................................................39 How to Encrypt a Computer as part of Windows Deployment .....................................................40 Operations for MBAM ................................................................................................................42 In This Section .......................................................................................................................42 How to Determine the Compliance Status of the Enterprise and Computers...............................43 How to Determine BitLocker Encryption State of Lost Computers...............................................45 How to Recover an Encrypted Drive ..........................................................................................46 How to Manage Hardware Systems ...........................................................................................47 How to Manage Roles for MBAM ...............................................................................................47 How to Grant User Exemptions..................................................................................................48 Technical Reference for MBAM .................................................................................................49 MBAM Installation Checklists .....................................................................................................49 BitLocker Administration and Monitoring Installation Checklist ................................................49 List of Log Files for MBAM .........................................................................................................53 Setup .....................................................................................................................................53 Application and Monitoring .....................................................................................................53 Client .....................................................................................................................................53
Microsoft BitLocker Administration and Monitoring Planning, Deployment, and Operations Guide
Microsoft BitLocker Administration and Monitoring (MBAM) builds on BitLocker in Windows 7 and offers you an enterprise solution for BitLocker provisioning, monitoring and key recovery. MBAM will help you simplify BitLocker provisioning and deployment independent or as part of your Windows 7 migration, improving compliance and reporting of BitLocker, and reducing support costs. This document assumes that you already understand Bitlocker and group policies in general, and that you want a tool to more easily manage those security features. This guide provides background information about MBAM and describes how to install and use the product. The intended audience for the guide is MBAM administrators and IT personnel.
In This Section
This guide provides information on the following topics: Getting Started with MBAM About MBAM Planning for MBAM Deploying the MBAM Server Operations for MBAM Technical Reference for MBAM
Related Sections
For detailed information about Bitlocker, please see: BitLocker Drive Encryption.
[This document is pre-release documentation and is subject to change in future releases. Blank sections are included as placeholders.]
y y y
Compliance and audit reports Policy template BitLocker Administration and Monitoring client agent
Architecture Overview
The BitLocker Administration and Monitoring client agent performs the following tasks: y y y Uses Group Policy to enforce the BitLocker encryption of client computers in the enterprise Gathers the recovery key for the three BitLocker data drive types, operating system drives, fixed data drives, and removable data drives (that is, USB drives) Gathers compliance data for computer and passes the data to the reporting system
Administration and Monitoring Server Hosts the Management Console and monitoring web services. The Management Console is used to determine Enterprise Compliance status and audit activity, manage Hardware Capability, and access recovery data (for example, BitLocker Recovery Keys). Compliance and Audit Database Stores compliance data for BitLocker Administration and Monitoring client computers. Recovery and Hardware Database Stores recovery data that is collected from BitLocker Administration and Monitoring client computers Compliance and Audit Reports Uses SQL Server Reporting Services (SRS) to provide BitLocker Administration and Monitoring reports. These reports can be access from the Management Console or directly from the SRS server. Policy Template The Group Policy template that specifies the BitLocker Administration and Monitoring implementation of BitLocker drive encryption.
architecture is provided in the MBAM Architecture Notes. The intended audience for the guide is MBAM administrators and technical personnel. For an overview of BitLocker, reference the BitLocker Drive Encryption article (http://technet.microsoft.com/en-us/library/cc731549(WS.10).aspx) on TechNet.
Standard, Enterprise, SP2 only Data Center, or Web Server Standard, Enterprise, Data Center or Web Server
64-bit
This section contains configuration information that is specific to the website requirements for this release.
[This document is pre-release documentation and is subject to change in future releases. Blank sections are included as placeholders.]
Application Development:
Security:
Windows Process Activation Service Process Model .NET Environment Configuration APIs
Note Note that SQL Reporting Service must be running during installation.
Windows 7 Windows 7 y y
Trusted Platform Module (TPM) v1.2 capability The TPM chip must be turned on in the BIOS and be resettable from the operating system. Look in the BIOS documentation for more information. Warning
[This document is pre-release documentation and is subject to change in future releases. Blank sections are included as placeholders.]
Make sure that the keyboard, mouse and video are directly connected and not managed through a keyboard, video, mouse (KVM) switch. A KVM switch may interfere with the ability of the computer to detect the physical presence of hardware. There are no special RAM requirements that are specific to BitLocker Administration and Monitoring.
How to Set up Group Policies for BitLocker Administration and Monitoring 1. Make sure that MBAM services are enabled on the BitLocker Group Policies computer. 2. Using the Group Policy Management Console (GPMC), the Advanced Group Policy Management (AGPM), or the Local Group Policy Editor on the BitLocker Group Policies computer, browse to Computer configuration, select Policies, select Administrative Templates, click Windows Components, and then select MDOP MBAM (BitLocker Management). 3. Select the Setting to edit. The settings for BitLocker Administration and Monitoring include the following: y y y y y y Client Management Data Recovery Fixed Drive Operating System Drive Removable Drive Reports
4. Edit the setting for your policy. Recommended policies for basic MBAM implementation include the following:
Policy Group Policy Setting
Data Recovery
Enabled. Set Key recovery service endpoint and Key recovery information to backup Enabled. Set Status reporting service endpoint and Enter frequency status in (minutes). Enabled. Set Select protector for operating system drive. Required to save operating system drive data to the MBAM Key Recovery server. Enabled. Required if MBAM will save removable drive
Reports
Removable Drive
[This document is pre-release documentation and is subject to change in future releases. Blank sections 11 are included as placeholders.]
data to the MBAM Key Recovery server. Fixed Drive Control Use of BitLocker on fixed drives Enabled. Required if MBAM will save fixed drive data to the MBAM Key Recovery server.
This policy setting is the same as the BitLocker policy. Configure this policy to improve restart performance without overwriting BitLocker secrets in memory on restart. Suggested Configuration: Not configured When the policy is not configured, BitLocker secrets are removed from memory when the computer restarts.
This policy setting is the same as the BitLocker policy. Configure this policy to use smartcard certificate-based BitLocker protection. Suggested Configuration: Not configured When policy is not configured, a default object identifier 1.3.6.1.4.1.311.67.1.1 is used to specify a certificate.
This policy setting is the same as the BitLocker policy. Configure this policy to use a certificate-based data recovery agent or the BitLocker To Go reader. Suggested Configuration: Not configured When policy is not configured, the
[This document is pre-release documentation and is subject to change in future releases. Blank sections 12 are included as placeholders.]
Policy Name
Identification field is not used. Choose drive encryption method and cipher strength This policy setting is the same as the BitLocker policy. Configure this policy to use a specific encryption method and cipher strength. Suggested Configuration: Not configured When policy is not configured, BitLocker will use the default encryption method of AES 128bit with Diffuser or the encryption method specified by the setup script.
This policy setting lets you manage the key recovery service to back up BitLocker recovery information. The setting provides an administrative method of recovering data encrypted by BitLocker to prevent data loss because of the lack of key information. Suggested Configuration: Enabled when Key recovery information to backup is set to Recovery Password and key package. When this policy setting is enabled, the recovery password and key package will be automatically and silently backed up to configured key recovery server location.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 13 are included as placeholders.]
Policy Name
This policy setting determines whether the operating system drive will be encrypted. Configure this policy to do the following: Enforce BitLocker protection for the operating system drive. Configure PIN usage to use a TPM PIN for operating system protection. Configure enhanced startup PINs to allow the use of characters including uppercase and lowercase letters, symbols, numbers, and spaces.
y y y
If you enable this policy setting, the user will have to secure the operating system drive using BitLocker. If you do not configure or if you disable the setting, the user will not have to secure the operating system drive with BitLocker. Suggested configuration: Enabled When enabled, this policy setting requires that the user secures the operating system by using BitLocker protection and drive is encrypted. Based on your encryption requirements, you may select the method of protection for the operating system drive. For higher security requirements, use TPM + PIN, allow enhanced PINs, and set the minimum PIN length to 8. Choose how BitLocker-protected operating system drives can be recovered This policy setting is the same as the BitLocker policy. Configure this policy to enable the BitLocker data recovery agent or to save BitLocker recovery information to Active Directory Domain Services (AD DS).
[This document is pre-release documentation and is subject to change in future releases. Blank sections 14 are included as placeholders.]
Policy Name
Suggested Configuration: Not configured When this policy is not configured, the data recovery agent is allowed, recovery information is not backed up to AD DS, and the recovery options, including the recovery password and recovery key, can be specified by the user. Configure TPM platform validation profile This policy setting is the same as the BitLocker policy. This policy setting lets you configure how the Trusted Platform Module (TPM) security hardware on a computer secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection. Suggested Configuration: Not configured When this policy is not configured, the TPM uses the default platform validation profile or the platform validation profile specified by the setup script.
This policy setting let you manage whether the fixed data drive must be encrypted or not. When enabling this policy, you must not disable the Configure use of password for fixed data drives policy. If the Enable auto-unlock fixed data drive option is checked, the OS volume must be encrypted If you enable this policy setting, the user will have to put all fixed data drives under BitLocker
[This document is pre-release documentation and is subject to change in future releases. Blank sections 15 are included as placeholders.]
Policy Name
protection and the drives will be encrypted. If you disable this policy setting, then it is not required to put fixed data drive under BitLocker protection. If you do not configure this policy setting, then it is not required to put fixed data drive under BitLocker protection. Suggested Configuration: Enabled; and check the Enable auto-unlock fixed data drive option. Deny write access to fixed drives not protected by BitLocker This policy setting is the same as the BitLocker policy. This policy setting determines whether BitLocker protection is required for fixed data drives to be writable on a computer. This policy setting is applied when you turn on BitLocker. Suggested Configuration: Not configured When the policy is not configured, all fixed data drives on the computer will be mounted with read and write access. Allow access to BitLocker-protected fixed data drive from earlier versions of Windows This policy setting is the same as the BitLocker policy. Enable this policy to allow fixed data drives with the FAT file system to be unlocked and viewed on Windows Server 2008 computers. Suggested configuration: Not configured When the policy is not configured, fixed data drives formatted with the FAT file system can be unlocked on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have read-only access to BitLocker-protected drives. Configure use of password for fixed data drives This policy setting is the same as the BitLocker
[This document is pre-release documentation and is subject to change in future releases. Blank sections 16 are included as placeholders.]
Policy Name
policy. Enable this policy to configure password protection on fixed data drives. Suggested configuration: Not configured When the policy is not configured, passwords will be supported with the default settings that do not include password complexity requirements and require only 8 characters. Choose how BitLocker-protected fixed drives can be recovered This policy setting is the same as the BitLocker policy. Configure this policy to enable the BitLocker data recovery agent or to save BitLocker recovery information to Active Directory Domain Services (AD DS). Suggested Configuration: Not configured When policy is not configured, the BitLocker data recovery agent is allowed, the recovery options, including the recovery password and recovery key, can be specified by the user, and recovery information is not backed up to AD DS
This policy setting is the same as the BitLocker policy. This policy controls the use of BitLocker on removable data drives. Check the Allow users to apply BitLocker protection on removable data drives option to let the user run the BitLocker setup wizard on a removable data drive. Choose Allow users to suspend and decrypt
[This document is pre-release documentation and is subject to change in future releases. Blank sections 17 are included as placeholders.]
Policy Name
BitLocker on removable data drives to permit the user to remove BitLocker drive encryption from the drive or suspend the encryption while maintenance is performed. Suggested configuration: Enabled Deny write access to removable drives not protected by BitLocker This policy setting is the same as the BitLocker policy. Enable this policy to only allow write access to BitLocker protected drives. Suggested Configuration: Not configured When this policy is not configured, all removable data drives on the computer will be mounted with read and writes access. Allow access to BitLocker-protected removable data drive from earlier versions of Windows This policy setting is the same as the BitLocker policy. Enable this policy to allow for fixed data drives with the FAT file system to be unlocked and viewed on Windows Server 2008 computers. Suggested Configuration: Not configured When this policy is not configured, removable data drives formatted with the FAT file system can be unlocked on computers that are running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have read-only access to BitLocker-protected drives. Configure use of password for removable data drives This policy setting is the same as the BitLocker policy Enable this policy to configure password protection on removable data drives. Suggested configuration: Not configured When this policy is not configured, passwords are supported with the default settings that do not include password complexity requirements
[This document is pre-release documentation and is subject to change in future releases. Blank sections 18 are included as placeholders.]
Policy Name
and require only 8 characters. Choose how BitLocker-protected removable drives can be recovered This policy setting is the same as the BitLocker policy. Configure this policy to enable the BitLocker data recovery agent or to save BitLocker recovery information to Active Directory Domain Services (AD DS). Suggested Configuration: Not configured When not configured, the data recovery agent is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information is not backed up to AD DS.
This policy setting establishes a location for collecting compliance status reports and sets the time between the generating of reports. If you enable this policy setting, status report and updated key recovery information will be automatically and silently send to configured report server location. If you do not configure or disable this policy setting, the status report and updated key recovery information will not be saved. Suggested Configuration: Enabled When it is enabled, this policy provides an administrative method of generating a compliance report. The default is set to every 720 minutes. Set this frequency based on the requirement
[This document is pre-release documentation and is subject to change in future releases. Blank sections 19 are included as placeholders.]
Policy Name
set by your company on how frequently to check the compliance status of the computer.
This policy setting manages how frequently the client checks the BitLocker protection policies and status on the client computer. If you enable this policy setting, the client will check the BitLocker protection policies and status on the client computer at the configured frequency. If you do not configure or disable this policy setting, the client checks the BitLocker protection policies and status on the client computer every 90 minutes. Suggested Configuration: Enabled The default is set to every 90 minutes. Set this frequency based on the requirement set by your company on how frequently to check the compliance status of the computer.
This policy setting allows you to manage the checking of hardware compatibility before enabling BitLocker protection on drives of a computer. When enabling this policy, the administrator has to make sure that Microsoft BitLocker Administering and Monitoring service is installed with the Hardware Capability subfeature. When enabling this policy you must enable the Configure Key Recovery service policy and
[This document is pre-release documentation and is subject to change in future releases. Blank sections 20 are included as placeholders.]
Policy Name
have it configured. If you enable this policy setting, the model of the computer will be validated against the hardware compatibility list before it enables BitLocker protection on drives of a computer to ensure the model is BitLocker-capable If you disable or do not configure this policy setting, the computer model will not be validated against the hardware compatibility list. Suggested Configuration: Enabled Enable this if your enterprise has older computer hardware or computers that do not support TPM. If this is the case, enable Hardware Compatibility checking to make sure that MBAM is only applied to computer models that support it. If all computers in your organization support BitLocker, you do not have to deploy the Hardware Compatibility, and you can set this policy to Not Configured. Configure user exemption policy This policy allows configuring a URL, email address, or telephone number that will instruct users how to request exemption from BitLocker protection. If you enable this policy setting and provide a URL, mailing address, or telephone number, the user will able to apply for exemption and see a dialog for instruction on how to apply exemption form the BitLocker protection. If you disable or do not configure this policy setting, the user will not see a message for instructions on how to apply for an exemption from BitLocker protection. The request exemption form will not be available to the user. Suggested Configuration: Not Configured Enable this policy if your organization wants to
[This document is pre-release documentation and is subject to change in future releases. Blank sections 21 are included as placeholders.]
Policy Name
This policy lets MBAM to be configured to exempt a user from BitLocker encryption. If you enable this policy setting, the specified user is exempted from BitLocker encryption. If you disable this policy setting, the specified user is denied exemption from BitLocker encryption. Also, the exemption is not available to the user. If you do not configure this policy setting, the user is not exempted from BitLocker encryption, and the exemption option is not available to the user. Suggested Configuration: Not configured
[This document is pre-release documentation and is subject to change in future releases. Blank sections 22 are included as placeholders.]
y y
These features can be installed on a single server or distributed across multiple servers. In addition to the server related BitLocker Administration and Monitoring features, the server setup application includes a MBAM Group Policy template feature. This feature can be installed on any client able to run the Group Policy Management Console (GPMC) or Advanced Group Policy Management (AGPM). BitLocker Administration and Monitoring server components can be installed in one of three server configurations. y Single computer configuration All BitLocker Administration and Monitoring features are installed on a single server. This configuration is supported, but only recommended for testing purposes. Three-computer configuration Server features are installed in the following configuration y y y y Recovery and Hardware Database, Compliance and Audit Reports, and Compliance and Audit Reports features are installed on a server Administration and Monitoring Server feature is installed on a server Group Policy template is installed on a server or client computer.
y
Five-computer configuration Each server feature is installed on dedicated computers: y y y y y Recovery and Hardware Database Compliance Status Database Compliance and Audit Reports Administration and Monitoring Server Group Policy Template is installed on a server or client computer
Note A 3 or 5 computer configuration is recommended for production environments. BitLocker Administration and Monitoring server components must be installed in the following order: Order of Deployment of BitLocker Administration and Monitoring Server Components 1. Recovery and Hardware Database 2. Compliance Status Database 3. Compliance Audit and Reports 4. Administration and Monitoring Server 5. Policy Template
[This document is pre-release documentation and is subject to change in future releases. Blank sections 23 are included as placeholders.]
Each BitLocker Administration and Monitoring feature has specific prerequisites. For a full list of server component prerequisites, see MBAM Supported Configurations.
y
y
y
[This document is pre-release documentation and is subject to change in future releases. Blank sections 24 are included as placeholders.]
You can use one or both methods in your organization. By using both methods, you can improve compliance, reporting, and key recovery support.
BitLocker Administration and Monitoring collect the data including the PIN and password and then begin the encryption process. Note In this approach, the user must accept the BIOS prompt to enable and initialize the TPM chip if it is required by the policy of the organization.
Deploying MBAM
The topics in this section help you deploy and manage your Microsoft BitLocker Administration and Monitoring (MBAM) install.
Deploying MBAM
Deploying MBAM Policies
Describes the Group Policies used by MBAM and how to configure them
[This document is pre-release documentation and is subject to change in future releases. Blank sections 27 are included as placeholders.]
Data Recovery
Enabled. Set Key recovery service endpoint and Key recovery information to backup Enabled. Set Status reporting service endpoint and Enter frequency status in (minutes). Enabled. Set Enter frequency in (minutes) Enabled. Set Select protector for operating
Reports
Client Management
Configure client checking status frequency (minutes) Enforce operating system drive encryption
[This document is pre-release documentation and is subject to change in future releases. Blank sections 28 are included as placeholders.]
system drive. Required to save operating system drive data to the BitLocker Administration and Monitoring Key Recovery server. 4. Browse to User configuration, click Policies, select Administrative Templates, and then click Control Panel. 5. Double-click Hide specified Control Panel items in the details pane, and then select Enabled. 6. Click Show, and then type Microsoft.BitLockerDriveEncryption. This policy hides the Windows BitLocker Management console from the Windows control panel and lets the user open the BitLocker Management console from the Windows control panel. How to Enforce BitLocker Protection on Operating System Drives 1. On a computer with the BitLocker Group Policies installed, ensure BitLocker Administration and Monitoring services are enabled. 2. Using the Group Policy Management Console (GPMC), the Advanced Group Policy Management (AGPM), or the Local Group Policy Editor on the BitLocker Group Policies computer click Computer configuration, select Policies, click Administrative Templates, click Windows Components, select MDOP MBAM (BitLocker Management), click Operating System Drive, and then double-click Enforce operating system drive encryption. 3. Select the Select protector for operating system drive option and Configure minimum PIN length for startup. Note If this policy is not enabled, the operating system drive will not be BitLocker protected. For a list of settings for BitLocker Group Policy for BitLocker Administration and Monitoring, see Planning and Configuring Group Policy for MBAM.
also have additional information that must be provided to successfully deploy the component for the enterprise.
For more information about how to plan the BitLocker Administration and Monitoring server infrastructure, see Planning Server Infrastructure for MBAM. For prerequisites of each MBAM server feature, see MBAM Supported Configurations. The installation wizard checks the prerequisites for your installation and displays prerequisites that are missing. If all the prerequisites are met, the installation continues. If a missing prerequisite is detected, you have to resolve the missing prerequisites, and then click Check prerequisites again. If all prerequisites are met this time, the installation will resume. 4. The BitLocker Administration and Monitoring Setup wizard will display installation pages for the selected features. The following sections describe installation procedures for each feature. Note The following instructions are based on the assumption that each feature will be installed on a separate server. If you are installing multiple features on a single server, some steps may be altered or eliminated. Recovery and Hardware Database Feature a. MBAM can optionally encrypt the communication between the Recovery and
[This document is pre-release documentation and is subject to change in future releases. Blank sections 30 are included as placeholders.]
Hardware Database and the Administration and Monitoring servers. If you choose to encrypt, you will be asked to select the Certificate Authority provisioned certificate that will be used for encryption. b. Click Next to continue. c. To configure access to the Recovery and Hardware Database, specify the names of the computers that will be running the Administration and Monitoring Server feature. Once the Administration and Monitoring Server feature is deployed it will connect to the database using its Network Service Account.
d. Click Next to continue. e. Specify the Database Configuration for the SQL Server database server instance that stores the recovery and hardware data. You must also specify both where the database will be located and where the log information will be located. f. Click Next to continue with the BitLocker Administration and Monitoring Setup wizard.
Compliance Status Database Feature a. MBAM can optionally encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose to encrypt you will be asked to select the Certificate Authority provisioned certificate that will be used for encryption. b. Click Next to continue. c. To configure access to the Compliance Status Database, specify the computer names of the machines that will be running the Administration and Monitoring Server and Compliance and Audit Reports features. Once the Administration and Monitoring and Compliance and Audit Reports Server features are deployed they will connect to the databases using their Network Service Accounts.
d. Specify the Database Configuration for the SQL Server database server instance that will store the compliance and audit data. You must also specify where the database will be located and where the log information will be located. e. Click Next to continue. f. Click Next to continue with the BitLocker Administration and Monitoring Setup wizard.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 31 are included as placeholders.]
Compliance and Audit Reports Feature a. Specify the remote SQL Server instance (for example: <ServerName\InstanceName>) where the Compliance Status Database was installed. b. Next specify where the name of the Compliance Status Database. By default the database name is MBAM Compliance Status however this can be altered when installing the Compliance Status Database feature. c. Click Next to continue. d. Select the SQL Server Reporting Services instance where the Compliance and Audit Reports will be installed. e. Click Next to continue with the BitLocker Administration and Monitoring Setup wizard.
Administration and Monitoring Server Feature a. MBAM can optionally encrypt the communication between the Recovery and Hardware Database and the Administration and Monitoring servers. If you choose to encrypt you will be asked to select the Certificate Authority provisioned certificate that will be used for encryption. b. Click Next to continue. c. Specify the remote SQL Server instance (for example: <ServerName\InstanceName>) where the Compliance Status Database was installed.
d. Next specify where the name of the Compliance Status Database. By default the database name is MBAM Compliance Status however this can be altered when installing the Compliance Status Database feature. e. Click Next to continue. f. Specify the remote SQL Server instance (for example: <ServerName\InstanceName>) where the Recovery and Hardware Database was installed.
g. Next, specify where the name of the Recovery and Hardware Database. By default the database name is MBAM Recovery and Hardware however this can be altered when installing the Recovery and Hardware Database feature. h. Click Next to continue. i. Specify the URL for the Home of the SQL Server Reporting Services (SRS) site. The Home location of a SQL Server Reporting Services site instance can be found at: http://<NameofMBAMReportsServer>/Reports
[This document is pre-release documentation and is subject to change in future releases. Blank sections 32 are included as placeholders.]
Note If SQL Server Reporting Services was configured as a named instance the URL will look like the following:http://<NameofMBAMReportsServer>/Reports_<SRSInstan ceName> j. k. Click Next to continue. Enter the Port Number, the Host Name (optional), and the Installation path for the MBAM Administration and Monitoring server Warning The port number that is specified must be an unused port number on the Web Sites and Services computer unless a unique host header name is specified. l. Click Next to continue with the BitLocker Administration and Monitoring Setup wizard.
5. Specify whether to use Microsoft Updates to help keep your computer secure, and then click Next. 6. Once the selected BitLocker Administration and Monitoring feature information is complete, the BitLocker Administration and Monitoring installation using the Setup wizard is ready to start. Click Back to navigate back through the wizard if you need to review or change your installation settings. Click Install to being the installation. Click Cancel to exit the Wizard. Setup installs the BitLocker Administration and Monitoring features that you have selected and notifies you that the installation is finished. 7. Click Finish to exit the wizard. 8. Although the BitLocker Administration and Monitoring server components have now been installed, users have to be added to the BitLocker Administration and Monitoring roles. For more information, see How to Manage Roles for MBAM. Post Installation Configuration 1. After setup completes, you must add users Roles before users will have access to features within the MBAM Management Console. On the Administration and Monitoring Server add users to the following local groups to enable them access the features in the Management Console. y MBAM Hardware Users Members of this local group will have access to the Hardware feature in the Management Console.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 33 are included as placeholders.]
y
MBAM Helpdesk Users Members of this local group will have access to the Drive Recovery and Manage TPM features in the Management Console.
y
MBAM Advanced Helpdesk Users Members of this local group will have advanced access to the Drive Recovery and Manage TPM features in the Management Console.
2. On the Administration and Monitoring, Compliance Status Database, Compliance and Audit Reports Server and add users to the following local group to enable them access the Reports feature in the Management Console. y MBAM Report Users: Members of this local group will have access to the Reports features in the Management Console. Note Identical user or group membership of the MBAM Report Users local group must be maintained on all machines where the MBAM Administration and Monitoring, Compliance Status Database, Compliance and Audit Reports Server feature are installed.
3. On the server where the Compliance Status Database feature is installed, open SQL Server Management Studio and verify that the MBAM Compliance Status Database is installed. 4. On the server where the Compliance and Audit Reports feature is installed, open a web browser with administrative privileges and browse to the Home of the SQL Server Reporting Services site. The Home location of a SQL Server Reporting Services site instance can be found at: http:// <NameofMBAMReportsServer>/Reports Confirm that a reports folder named Malta Compliance Reports is listed and that it contains five Reports and one Data Source. Note If SQL Server Reporting Services was configured as a named instance, the URL will look like the following:http://<NameofMBAMReportsServer>/Reports_<SRSInstanceName> 5. On the server where the Administration and Monitoring feature is installed, run Server Manager and browse to Roles, select Web Server (IIS), and click Internet Information Services (IIS) Manager. In Connections browse to <machinename>, select Sites, and select Microsoft BitLocker Administration and Monitoring. Verify that MBAMAdministrationService, MBAMComplianceStatusService, and MBAMRecoveryAndHardwareService are listed. 6. On the server where the Administration and Monitoring feature is installed, open a web browser with administrative privileges and browse to the following locations within the MBAM web site to verify they load successfully: y y y y http://<machinname>:<port>/default.aspx and confirm each of the links for navigation and reports http://<machinname>:<port>/MBAMAdministrationService/AdministrationService.svc http://localhost/MBAMComplianceStatusService/StatusReportingService.svc http://<machinename>:<port>/MBAMRecoveryAndHardwareService/CoreService.svc Note This list assumes the services are installed on the default port 80. If the services were installed on a different port, change the URLs to include the appropriate port. For example, http://<machinname>:<port>/default.aspx or http://<hostheadername>/default.aspx Verify that each web page loads successfully.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 35 are included as placeholders.]
See Also
Microsoft BitLocker Administration and Monitoring Planning, Deployment, and Operations Guide
[This document is pre-release documentation and is subject to change in future releases. Blank sections 36 are included as placeholders.]
Operating System
Editions
Service Pack
System Architecture
64-bit
This section contains configuration information that is specific to the website requirements for this release.
Application Development:
Security:
[This document is pre-release documentation and is subject to change in future releases. Blank sections 37 are included as placeholders.]
y y y y
HTTP Activation
Windows Process Activation Service Process Model .NET Environment Configuration APIs
[This document is pre-release documentation and is subject to change in future releases. Blank sections 38 are included as placeholders.]
Operating System
Edition
Service Pack
System Architecture
Windows 7 Windows 7 y y
Trusted Platform Module (TPM) v1.2 capability The TPM chip must be turned on in the BIOS and be resettable from the operating system. Look in the BIOS documentation for more information. Warning Make sure that the keyboard, mouse and video are directly connected and not managed through a keyboard, video, mouse (KVM) switch. A KVM switch may interfere with the ability of the computer to detect the physical presence of hardware.
There are no special RAM requirements that are specific to BitLocker Administration and Monitoring.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 39 are included as placeholders.]
y
4. Run the command prompt as administrator and stop the MBAM service and set to manual or on demand start by typing the following: a. b.
Net stop maltaagent Sc config maltaagent start= demand
5. Set the registry settings to allow the MBAM agent to ignore Group Policy and execute the TPM for operating system only encryption by running regedit and then importing the registry key template from C:\Program Files\Microsoft\MDOP MBAM\MBAMDeploymentKeyTemplate.reg 6. From regedit, go to HKLM\SOFTWARE\Microsoft\MBAM and configure the settings used the following table:
Registry Entry Configuration Settings
DeploymentTime
0 = OFF
[This document is pre-release documentation and is subject to change in future releases. Blank sections 40 are included as placeholders.]
1 = Use deployment time policy settings (default) UseKeyRecoveryServi ce 0 = Do not escrow key ( the next two registry entries are not needed in this case) 1 = Escrow in Key Recovery system (default) Recommended: the computer needs to be able to communicate with Key Recovery Service. Verify the computer can communicate with the service before proceeding. KeyRecoveryOptions 0 = Uploads Recovery Key Only 1 = Uploads Recovery Key and Key Recovery Package (default) KeyRecoveryServiceE ndPoint Set this value to the URL for Key Recovery web server (for example, http://<machinename>/MBAMRecoveryAndHardwareService/ CoreService.svc).
Note MBAM policy or registry values can be set here to override previously set values. 7. The MBAM agent will reboot the system during MBAM client deployment. When you are ready for this reboot, run the following from a Command Prompt as administrator: a.
Net start MaltaAgent
8. The system should reboot. On restart the BIOS will prompt to accept a TPM change. Accept this change. 9. During the Windows client operating system imaging process, when you are ready to start encryption, restart the MBAM agent service and set start to automatic by running a Command Prompt as administrator and typing the following: a. b.
sc config maltaagent start= auto net start maltaagent
10. Remove the bypass registry values by running regedit and going to the HKLM\SOFTWARE\Microsoft registry entry. Delete the MBAM node by right-clicking it and selecting Delete.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 41 are included as placeholders.]
In This Section
How to Determine the Compliance Status of the Enterprise and Computers
Describes how to generate reports on enterprise compliance, individual computers, key recovery activity, and hardware compatibility.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 42 are included as placeholders.]
2. Click View Report to display the selected report. 3. Results can be saved in a variety of formats, including HTML, Microsoft Word, and Microsoft Excel. 4. Select a computer name to view information about the computer in the Computer Compliance Report. 5. Select the plus sign (+) beside the computer name to view information about the volumes on the computer. Computer Compliance Report
[This document is pre-release documentation and is subject to change in future releases. Blank sections 43 are included as placeholders.]
1. In the Management Console, select the Report node from the left hand navigation pane, and then select the Computer Compliance Report. Use the Computer Compliance report to search for user name or computer name. 2. Click View Report to view the computer report. 3. Results can be saved in a variety of formats, including HTML, Microsoft Word, and Microsoft Excel. 4. Select a computer name to display the more information about the computer in the Computer Compliance Report. 5. Select the plus sign (+) beside the computer name to view information about the volumes on the computer. Recovery Key Audit Report 1. From the Management Console, select the Report node in the left hand navigation pane, and then select the Recovery Audit Report. Select the filters for your Recovery Key Audit report. The available filters for Recovery Key audits are the following: y y y Requestor This filter enables the user to specify the user name of the requestor. The requestor is the person in helpdesk who accessed the key on behalf of a user. Requestee This filter enables the user to specify the user name of the requestee. The requestee is the person who called helpdesk to acquire a recovery key. Request Result This filter enables the user to specify the request result types (for example: Success or Failed) that they want to base the report on. For instance the user may want to view failed key access attempts. Key Type This filter enables the user to specify the Key Type (for example: Recovery Key Password or TPM Password Hash) that they want to base the report on. Start Date This filter is used to define the Start Date part of the date range that they user want to report on. End Date This filter is used to define the End Date part of the date range that they user want to report on.
y
y y
2. Click View Report to view the report. 3. Results can be saved in a variety of formats, including HTML, Microsoft Word, and Microsoft Excel. Hardware Compatibility Audit Report 1. From the Management Console, select the Report node from the left navigation pane, and select the Hardware Audit Report. Select the appropriate filters for your Hardware Audit report. The available filters for Hardware Audits include the following: y User (Domain\User) This filter enables the user to specify the name of the user who made a change.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 44 are included as placeholders.]
y y y
Change Type This filter enables the user to specify the type of changes they are looking for. Start Date This filter is used to define the Start Date part of the date range that they user want to report on. End Date This filter is used to define the End Date part of the date range that they user want to report on.
2. Click View Report to view the report. 3. Results can be saved in a variety of formats, including HTML, Microsoft Word, and Microsoft Excel.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 45 are included as placeholders.]
[This document is pre-release documentation and is subject to change in future releases. Blank sections 46 are included as placeholders.]
[This document is pre-release documentation and is subject to change in future releases. Blank sections 47 are included as placeholders.]
y y y y
MBAM Hardware Users have access to some of the Hardware Capability features in the MBAM Management Console MBAM Helpdesk Users have access to some of the Helpdesk features in the MBAM Management Console MBAM Report Users have access to the Compliance and Audit reports in the MBAM Management Console MBAM Advanced Helpdesk Uses have increased access to the Helpdesk features in the MBAM Management Console
For more information about roles for BitLocker Administration and Monitoring, see Planning Server Infrastructure for MBAM.
BitLocker protection is not enforced on computer BitLocker protection is not enforced on computer
Note Shared computer scenarios require special consideration when using user exemption. If a non-exempt user logs on to a computer shared with an exempt user, the computer may be encrypted.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 48 are included as placeholders.]
[This document is pre-release documentation and is subject to change in future releases. Blank sections 49 are included as placeholders.]
server y MBAM Compliance and Audit Reports server BitLocker Administration and Monitoring Deployment Guide: MBAM Supported Configurations
Install the required Windows Server Roles, Role Services, and features to the Windows Servers that will be used to host the following BitLocker Administration and Monitoring features within your environment y MBAM Administration and Monitoring server
Install any critical Windows updates on the following servers: y y y y MBAM Administration and Monitoring server MBAM Recovery and Hardware Database server MBAM Compliance Status Database server MBAM Compliance and Audit Reports server
http://go.microsoft.com/fwlink/?LinkId=105851
Provision the SQL Server Database Engine and other SQL features to the Windows Servers that will be used to host the following BitLocker Administration and Monitoring features within your environment y y MBAM Recovery and Hardware Database server MBAM Compliance Status Database server
Provision the SQL Server Reporting Services to the Windows Servers that will be used to host the following BitLocker Administration and Monitoring features within your environment y MBAM Compliance and Audit Reports server
Configure the SQL Server Reporting Services instance on the MBAM Compliance and Audit
[This document is pre-release documentation and is subject to change in future releases. Blank sections 50 are included as placeholders.]
Reports server such that it is operational and in Configurations a running state. Install any critical Microsoft SQL Server updates on the following servers: y y y MBAM Recovery and Hardware Database server MBAM Compliance Status Database server MBAM Compliance and Audit Reports server BitLocker Administration and Monitoring Deployment Guide: Planning for MBAM http://go.microsoft.com/fwlink/?LinkId=105851
Decide if you will choose to encrypt communication between BitLocker Administration and Monitoring features. If so initiate any processes necessary to ensure that an appropriate certificate have been provisioned to each server via your Public Key Infrastructure (PKI). In this case certificates should be provisioned to the following servers. y y y MBAM Recovery and Hardware Database server MBAM Compliance Status Database server MBAM Compliance and Audit Reports server Important Certificates must be provisioned to each server in advance of installing BitLocker Administration and Monitoring features. Run the BitLocker Administration and Monitoring setup from the MDOP installation media, from a copy of the installation media located on a network shared folder, or other storage media. Important When installing BitLocker Administration and Monitoring features
[This document is pre-release documentation and is subject to change in future releases. Blank sections 51 are included as placeholders.]
across in multiple servers. Install the features in the following order: y y y y y MBAM Administration and Monitoring Server MBAM Recovery and Hardware Database server MBAM Compliance Status Database server MBAM Compliance and Audit Reports server MBAM Administration and Monitoring server BitLocker Administration and Monitoring Deployment Guide: How to Deploy the MBAM Server Features BitLocker Administration and Monitoring Deployment Guide: How to Deploy the MBAM Server Features BitLocker Administration and Monitoring Deployment Guide: How to Deploy the MBAM Server Features BitLocker Administration and Monitoring Deployment Guide: How to Deploy the MBAM Server Features
Verify that the BitLocker Administration and Monitoring features were successful deployed and are operational. Define and initiate a back-up policy for the MBAM Recovery & Hardware and Compliance Status databases. If you chose to encrypt the MBAM Recovery and Hardware Database feature create a backup the certificate that was used to encrypt the database. Add users to the BitLocker Administration and Monitoring Local Groups on the following servers: y y MBAM Administration and Monitoring server MBAM Compliance and Audit Reports server
Define the BitLocker Administration and Monitoring policies and provision them to Active Directory. Deploy the BitLocker Administration and Monitoring client to desktops on the network and any images that are used for provisioning new desktops.
BitLocker Administration and Monitoring Deployment Guide: How to Deploy the MBAM Server Features
[This document is pre-release documentation and is subject to change in future releases. Blank sections 52 are included as placeholders.]
Setup
In order to get setup log files, you must install BitLocker Administration and Monitoring using msiexec package with the /L <location> option. Log files will be created in the location specified.
Client
For the BitLocker client, the Admin and Operational log files are located in Event Viewer, under Application and Services Logs / Microsoft / Windows / BitLockerManagement.
[This document is pre-release documentation and is subject to change in future releases. Blank sections 53 are included as placeholders.]