Configure use of hardware-based encryption for removable data drives

This policy setting allows you to manage BitLocker’s use of hardware-based encryption on removable data drives and specify which encryption algorithms it can use with hardware-based encryption. Using hardware-based encryption can improve performance of drive operations that involve frequent reading or writing of data to the drive. If you enable this policy setting you can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption and whether you want to restrict the encryption algorithms and cipher suites used with hardware-based encryption. If you disable this policy setting BitLocker cannot use hardware-based encryption with operating system drives and BitLocker software-based encryption will be used by default when the drive is encrypted. If you do not configure this policy setting BitLocker will use hardware-based encryption with the encryption algorithm set for the drive. If hardware-based encryption is not available BitLocker software-based encryption will be used instead. Note: The “Choose drive encryption method and cipher strength” policy setting does not apply to hardware-based encryption. The encryption algorithm used by hardware-based encryption is set when the drive is partitioned. By default BitLocker uses the algorithm configured on the drive to encrypt the drive. The “Restrict encryption algorithms and cipher suites allowed for hardware-based encryption” option enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm set for the drive is not available BitLocker will disable the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID). For example:- AES 128 in CBC mode OID: 2. 16. 840. 1. 101. 3. 4. 1. 2- AES 256 in CBC mode OID: 2. 16. 840. 1. 101. 3. 4. 1. 42

Global Configuration Settings

This policy setting allows you to specify Clock discipline and General values for the Windows Time service (W32time) for domain controllers including RODCs. If you enable this policy setting you can specify the following Clock discipline General and RODC parameters for this service. If you disable or do not configure this policy setting Windows Time service uses the defaults of each of the following parameters. Several of the following values are scalar which means that they only have meaning in relation to one another and are not defined by specific unit measurements. FrequencyCorrectRateThis parameter controls the rate at which the W32time corrects the local clock’s frequency. Lower values cause slower corrections; larger values cause more frequent corrections. Values that are too low can lead to overcorrection and instability. Values that are too high can lead to slow synchronization. Default: 4 (scalar). HoldPeriodThis parameter indicates how many potentially accurate time samples the client computer must receive in a series before subsequent time samples are evaluated as potential spikes. After a period of not receiving any usable time samples a time client ceases to evaluate time samples for spikes as soon as the first potentially accurate time sample is received. When a series of time samples (as indicated by HoldPeriod) is received the time client evaluates subsequent time samples for spikes. A time sample is considered to be a spike when the time difference between a time sample and the client computer’s local clock is greater than that of the LargePhaseOffset value. Default: Five time samples. LargePhaseOffsetThis parameter specifies the time variation from the client computer’s local clock (phase offset) that a time sample must have to be considered a spike. Time samples that have time variations larger than the LargePhaseOffset value are considered spikes. Default: 50000000 100-nanosecond units (ns) which is five seconds. MaxAllowedPhaseOffsetThis parameter controls how W32time corrects the clock based on the size of the calculated time variation between the time sample and the client computer’s local clock. If a response is received that has a time variation that is larger than this value W32time sets the client computer’s local clock immediately to the time that is accepted as accurate from the Network Time Protocol (NTP) server. If the time variation is less than this value the client computer’s local clock is corrected gradually. Default: 300 seconds. MaxNegPhaseCorrectionThis parameter controls the maximum allowable clock correction that can be made in a reverse direction. If a time sample is received that indicates a time in the past (as compared to the client computer’s local clock) that has a time difference that is greater than the MaxNegPhaseCorrection value the time sample is discarded. If this happens the Windows Time source logs an event in the System log of Event Viewer. Default: 172800 seconds. MaxPosPhaseCorrectionThis parameter controls the maximum allowable clock correction that can be made in a forward direction. If a time sample is received that indicates a time in the future (as compared to the client computer’s local clock) that has a time difference greater than the MaxPosPhaseCorrection value the time sample is discarded. Default: 172800 seconds. PhaseCorrectRateThis parameter controls how quickly W32time corrects the client computer’s local clock difference to match time samples that are accepted as accurate from the NTP server. Lower values cause the clock to correct more slowly; larger values cause the clock to correct more quickly. Default: 7 (scalar). PollAdjustFactorThis parameter controls how quickly W32time changes polling intervals. When responses are considered to be accurate the polling interval lengthens automatically. When responses are considered to be inaccurate the polling interval shortens automatically. Default: 5 (scalar). SpikeWatchPeriodThis parameter specifies the amount of time that suspicious time samples are received from a time source before these time samples are accepted as accurate. Time samples are considered suspicious when the time difference between the time sample and the client computer’s local clock is larger than the value of LargePhaseOffset. SpikeWatchPeriod is used in conjunction with HoldPeriod to help eliminate sporadic inaccurate time samples that are returned from a peer. Default: 900 seconds. UpdateIntervalThis parameter specifies the amount of time that W32time waits between corrections when the clock is being corrected gradually. When it makes a gradual correction the service adjusts the clock slightly waits this amount of time and then checks to see if another adjustment is needed until the correction is finished. Default: 100 1/100th second units which is 1 second. General parameters:AnnounceFlagsThis parameter is a bitmask value that controls how time service availability is advertised through NetLogon. Default: 0x0a hexadecimal. See the NtpClient -> EventLogFlags Subkey documentation on Microsoft’s TechNet Library for possible values. EventLogFlagsThis parameter controls special events that may be logged to the Event Viewer System log. Default: 0x02 hexadecimal bitmask. See the NtpClient -> EventLogFlags Subkey documentation on Microsoft’s TechNet Library for possible values. LocalClockDispersionThis parameter indicates the maximum error in seconds that is reported by the NTP server to clients that are requesting a time sample. (Applies only when the NTP server is using the time of the local CMOS clock. ) Default: 10 seconds. MaxPollIntervalThis parameter controls the maximum polling interval which defines the maximum amount of time between polls of a peer. Default: 10 in log base-2 which is 1024 seconds. (Should not be set higher than 15. )MinPollIntervalThis parameter controls the minimum polling interval that defines the minimum amount of time between polls of a peer. Default: 6 in log base-2 which is 64 seconds. RequireSecureTimeSyncRequestsThis parameter controls whether or not the the DC will respond to time sync requests that use older authentication protocols. If enabled (set to 1) the DC will not respond to requests using such protocols. Default: 0 Boolean. RODC parameters:ChainEntryTimeoutThis parameter specifies the maximum amount of time that an entry can remain in the chaining table before the entry is considered to be expired. Expired entries may be removed when the next request or response is processed. Default: 16 seconds. ChainMaxEntriesThis parameter controls the maximum number of entries that are allowed in the chaining table. If the chaining table is full and no expired entries can be removed any incoming requests are discarded. Default: 128 entries. ChainMaxHostEntriesThis parameter controls the maximum number of entries that are allowed in the chaining table for a particular host. Default: 4 entries. ChainDisableThis parameter controls whether or not the chaining mechanism is disabled. If chaining is disabled (set to 0) the RODC can synchronize with any domain controller but hosts that do not have their passwords cached on the RODC will not be able to synchronize with the RODC. Default: 0 Boolean. ChainLoggingRateThis parameter controls the frequency at which an event that indicates the number of successful and unsuccessful chaining attempts is logged to the System log in Event Viewer. Default: 30 minutes.

Configure Windows NTP Client

This policy setting specifies a set of parameters for controlling the Windows NTP Client. If you enable this policy setting you can specify the following parameters for the Windows NTP Client. If you disable or do not configure this policy setting the WIndows NTP Client uses the defaults of each of the following parameters. NtpServerThe Domain Name System (DNS) name or IP address of an NTP time source. This value is in the form of “”dnsNameflags”” where “”flags”” is a hexadecimal bitmask of the flags for that host. For more information see the NTP Client Group Policy Settings Associated with Windows Time section of the Windows Time Service Group Policy Settings. The default value is “”time. windows. com0x09″”. TypeThis value controls the authentication that W32time uses. The default value is NT5DS. CrossSiteSyncFlagsThis value expressed as a bitmask controls how W32time chooses time sources outside its own site. The possible values are 0 1 and 2. Setting this value to 0 (None) indicates that the time client should not attempt to synchronize time outside its site. Setting this value to 1 (PdcOnly) indicates that only the computers that function as primary domain controller (PDC) emulator operations masters in other domains can be used as synchronization partners when the client has to synchronize time with a partner outside its own site. Setting a value of 2 (All) indicates that any synchronization partner can be used. This value is ignored if the NT5DS value is not set. The default value is 2 decimal (0x02 hexadecimal). ResolvePeerBackoffMinutesThis value expressed in minutes controls how long W32time waits before it attempts to resolve a DNS name when a previous attempt failed. The default value is 15 minutes. ResolvePeerBackoffMaxTimesThis value controls how many times W32time attempts to resolve a DNS name before the discovery process is restarted. Each time DNS name resolution fails the amount of time to wait before the next attempt will be twice the previous amount. The default value is seven attempts. SpecialPollIntervalThis NTP client value expressed in seconds controls how often a manually configured time source is polled when the time source is configured to use a special polling interval. If the SpecialInterval flag is enabled on the NTPServer setting the client uses the value that is set as the SpecialPollInterval instead of the MinPollInterval and MaxPollInterval values to determine how frequently to poll the time source. The default value is 3600 seconds (1 hour). EventLogFlagsThis value is a bitmask that controls events that may be logged to the System log in Event Viewer. Setting this value to 0x1 indicates that W32time will create an event whenever a time jump is detected. Setting this value to 0x2 indicates that W32time will create an event whenever a time source change is made. Because it is a bitmask value setting 0x3 (the addition of 0x1 and 0x2) indicates that both time jumps and time source changes will be logged.

Enable Windows NTP Client

This policy setting specifies whether the Windows NTP Client is enabled. Enabling the Windows NTP Client allows your computer to synchronize its computer clock with other NTP servers. You might want to disable this service if you decide to use a third-party time provider. If you enable this policy setting you can set the local computer clock to synchronize time with NTP servers. If you disable or do not configure this policy setting the local computer clock does not synchronize time with NTP servers.

Choose how BitLocker-protected removable drives can be recovered

This policy setting allows you to control how BitLocker-protected removable data drives are recovered in the absence of the required credentials. This policy setting is applied when you turn on BitLocker. The “Allow data recovery agent” check box is used to specify whether a data recovery agent can be used with BitLocker-protected removable data drives. Before a data recovery agent can be used it must be added from the Public Key Policies item in either the Group Policy Management Console or the Local Group Policy Editor. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information about adding data recovery agents. In “Configure user storage of BitLocker recovery information” select whether users are allowed required or not allowed to generate a 48-digit recovery password or a 256-bit recovery key. Select “Omit recovery options from the BitLocker setup wizard” to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker instead BitLocker recovery options for the drive are determined by the policy setting. In “Save BitLocker recovery information to Active Directory Domain Services” choose which BitLocker recovery information to store in AD DS for removable data drives. If you select “Backup recovery password and key package” both the BitLocker recovery password and key package are stored in AD DS. If you select “Backup recovery password only” only the recovery password is stored in AD DS. Select the “Do not enable BitLocker until recovery information is stored in AD DS for removable data drives” check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. Note: If the “Do not enable BitLocker until recovery information is stored in AD DS for fixed data drives” check box is selected a recovery password is automatically generated. If you enable this policy setting you can control the methods available to users to recover data from BitLocker-protected removable data drives. If this policy setting is not configured or disabled the default recovery options are supported for BitLocker recovery. By default a DRA is allowed the recovery options can be specified by the user including the recovery password and recovery key and recovery information is not backed up to AD DS

Control use of BitLocker on removable drives

This policy setting controls the use of BitLocker on removable data drives. This policy setting is applied when you turn on BitLocker. When this policy setting is enabled you can select property settings that control how users can configure BitLocker. Choose “Allow users to apply BitLocker protection on removable data drives” to permit the user to run the BitLocker setup wizard on a removable data drive. Choose “Allow users to suspend and decrypt BitLocker on removable data drives” to permit the user to remove BitLocker Drive encryption from the drive or suspend the encryption while maintenance is performed. Consult the BitLocker Drive Encryption Deployment Guide on Microsoft TechNet for more information on suspending BitLocker protection. If you do not configure this policy setting users can use BitLocker on removable disk drives. If you disable this policy setting users cannot use BitLocker on removable disk drives.

Configure use of passwords for removable data drives

This policy setting specifies whether a password is required to unlock BitLocker-protected removable data drives. If you choose to allow use of a password you can require a password to be used enforce complexity requirements and configure a minimum length. For the complexity requirement setting to be effective the Group Policy setting “Password must meet complexity requirements” located in Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> must be also enabled. Note: These settings are enforced when turning on BitLocker not when unlocking a volume. BitLocker will allow unlocking a drive with any of the protectors available on the drive. If you enable this policy setting users can configure a password that meets the requirements that you define. To require the use of a password select “Require password for removable data drive”. To enforce complexity requirements on the password select “Require complexity”. When set to “Require complexity” a connection to a domain controller is necessary when BitLocker is enabled to validate the complexity the password. When set to “Allow complexity” a connection to a domain controller will be attempted to validate the complexity adheres to the rules set by the policy but if no domain controllers are found the password will still be accepted regardless of actual password complexity and the drive will be encrypted using that password as a protector. When set to “Do not allow complexity” no password complexity validation will be done. Passwords must be at least 8 characters. To configure a greater minimum length for the password enter the desired number of characters in the “Minimum password length” box. If you disable this policy setting the user is not allowed to use a password. If you do not configure this policy setting passwords will be supported with the default settings which do not include password complexity requirements and require only 8 characters. Note: Passwords cannot be used if FIPS-compliance is enabled. The “System cryptography: Use FIPS-compliant algorithms for encryption hashing and signing” policy setting in Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options specifies whether FIPS-compliance is enabled.

Deny write access to removable drives not protected by BitLocker

This policy setting configures whether BitLocker protection is required for a computer to be able to write data to a removable data drive. If you enable this policy setting all removable data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker it will be mounted with read and write access. If the “Deny write access to devices configured in another organization” option is selected only drives with identification fields matching the computer’s identification fields will be given write access. When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields. These fields are defined by the “Provide the unique identifiers for your organization” policy setting. If you disable or do not configure this policy setting all removable data drives on the computer will be mounted with read and write access. Note: This policy setting can be overridden by the policy settings under User Configuration -> Administrative Templates -> System -> Removable Storage Access. If the “Removable Disks: Deny write access” policy setting is enabled this policy setting will be ignored.

Allow access to BitLocker-protected removable data drives from earlier versions of Windows

This policy setting configures whether or not removable data drives formatted with the FAT file system can be unlocked and viewed on computers running Windows Server 2008 Windows Vista Windows XP with Service Pack 3 (SP3) or Windows XP with Service Pack 2 (SP2) operating systems. If this policy setting is enabled or not configured removable data drives formatted with the FAT file system can be unlocked on computers running Windows Server 2008 Windows Vista Windows XP with SP3 or Windows XP with SP2 and their content can be viewed. These operating systems have read-only access to BitLocker-protected drives. When this policy setting is enabled select the “Do not install BitLocker To Go Reader on FAT formatted removable drives” check box to help prevent users from running BitLocker To Go Reader from their removable drives. If BitLocker To Go Reader (bitlockertogo. exe) is present on a drive that does not have an identification field specified or if the drive has the same identification field as specified in the “Provide unique identifiers for your organization” policy setting the user will be prompted to update BitLocker and BitLocker To Go Reader will be deleted from the drive. In this situation for the removable drive to be unlocked on computers running Windows Server 2008 Windows Vista Windows XP with SP3 or Windows XP with SP2 BitLocker To Go Reader must be installed on the computer. If this check box is not selected BitLocker To Go Reader will be installed on the removable drive to enable users to unlock the drive on computers running Windows Server 2008 Windows Vista Windows XP with SP3 or Windows XP with SP2 that do not have BitLocker To Go Reader installed. If this policy setting is disabled removable data drives formatted with the FAT file system that are BitLocker-protected cannot be unlocked on computers running Windows Server 2008 Windows Vista Windows XP with SP3 or Windows XP with SP2. Bitlockertogo. exe will not be installed. Note: This policy setting does not apply to drives that are formatted with the NTFS file system.

Configure use of smart cards on removable data drives

This policy setting allows you to specify whether smart cards can be used to authenticate user access to BitLocker-protected removable data drives on a computer. If you enable this policy setting smart cards can be used to authenticate user access to the drive. You can require a smart card authentication by selecting the “Require use of smart cards on removable data drives” check box. Note: These settings are enforced when turning on BitLocker not when unlocking a drive. BitLocker will allow unlocking a drive with any of the protectors available on the drive. If you disable this policy setting users are not allowed to use smart cards to authenticate their access to BitLocker-protected removable data drives. If you do not configure this policy setting smart cards are available to authenticate user access to a BitLocker-protected removable data drive.