Vulnerability   
Search   
    Search 210752 CVE descriptions
and 93608 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.109406
Category:Policy
Title:Microsoft Windows: Require additional authentication at startup (TPM startup PIN)
Summary:This policy setting allows you to configure whether BitLocker;requires additional authentication each time the computer starts and whether you are using BitLocker;with or without a Trusted Platform Module (TPM). This policy setting is applied when you turn on;BitLocker.;;Note: Only one of the additional authentication options can be required at startup, otherwise a;policy error occurs.;;If you want to use BitLocker on a computer without a TPM, select the 'Allow BitLocker without a;compatible TPM' check box. In this mode either a password or a USB drive is required for start-up.;When using a startup key, the key information used to encrypt the drive is stored on the USB drive,;creating a USB key. When the USB key is inserted the access to the drive is authenticated and the;drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password;then you will need to use one of the BitLocker recovery options to access the drive.;;On a computer with a compatible TPM, four types of authentication methods can be used at startup to;provide added protection for encrypted data. When the computer starts, it can use only the TPM for;authentication, or it can also require insertion of a USB flash drive containing a startup key, the;entry of a 6-digit to 20-digit personal identification number (PIN), or both.;;If you enable this policy setting, users can configure advanced startup options in the BitLocker;setup wizard.;;If you disable or do not configure this policy setting, users can configure only basic options on;computers with a TPM.;;Note: If you want to require the use of a startup PIN and a USB flash drive, you must configure;BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption;setup wizard.;;(C) Microsoft Corporation 2015.
Description:Summary:
This policy setting allows you to configure whether BitLocker
requires additional authentication each time the computer starts and whether you are using BitLocker
with or without a Trusted Platform Module (TPM). This policy setting is applied when you turn on
BitLocker.

Note: Only one of the additional authentication options can be required at startup, otherwise a
policy error occurs.

If you want to use BitLocker on a computer without a TPM, select the 'Allow BitLocker without a
compatible TPM' check box. In this mode either a password or a USB drive is required for start-up.
When using a startup key, the key information used to encrypt the drive is stored on the USB drive,
creating a USB key. When the USB key is inserted the access to the drive is authenticated and the
drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password
then you will need to use one of the BitLocker recovery options to access the drive.

On a computer with a compatible TPM, four types of authentication methods can be used at startup to
provide added protection for encrypted data. When the computer starts, it can use only the TPM for
authentication, or it can also require insertion of a USB flash drive containing a startup key, the
entry of a 6-digit to 20-digit personal identification number (PIN), or both.

If you enable this policy setting, users can configure advanced startup options in the BitLocker
setup wizard.

If you disable or do not configure this policy setting, users can configure only basic options on
computers with a TPM.

Note: If you want to require the use of a startup PIN and a USB flash drive, you must configure
BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption
setup wizard.

(C) Microsoft Corporation 2015.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (c) 2018 Greenbone Networks GmbH

This is only one of 93608 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.