You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The **xBitlocker** module is a part of the Windows PowerShell Desired State Configuration (DSC) Resource Kit, which is a collection of DSC Resources produced by the PowerShell Team.
3
+
The **xBitlocker** module is a part of the Windows PowerShell Desired State
4
+
Configuration (DSC) Resource Kit, which is a collection of DSC Resources
5
+
produced by the PowerShell Team.
4
6
This module contains the **xBLAutoBitlocker, xBLBitlocker, xBLTpm** resources.
5
-
This DSC Module allows you to configure Bitlocker on a single disk, configure a TPM chip, or automatically enable Bitlocker on multiple disks.
7
+
This DSC Module allows you to configure Bitlocker on a single disk, configure a
8
+
TPM chip, or automatically enable Bitlocker on multiple disks.
6
9
7
-
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
8
-
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
10
+
This project has adopted the
11
+
[Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/)
12
+
. For more information see the
13
+
[Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or
@@ -38,143 +47,125 @@ To install **xBitlocker** module
38
47
39
48
To confirm installation:
40
49
41
-
* Run **Get-DSCResource** to see that **xBLAutoBitlocker, xBLBitlocker, xBLTpm** are among the DSC Resources listed
50
+
* Run **Get-DSCResource** to see that **xBLAutoBitlocker**, **xBLBitlocker**,
51
+
**xBLTpm** are among the DSC Resources listed.
42
52
43
53
## Requirements
44
54
45
-
This module requires that both the 'Bitlocker' and 'RSAT-Feature-Tools-Bitlocker' features are installed.
46
-
It also requires the latest version of PowerShell (v4.0, which ships in Windows 8.1 or Windows Server 2012R2).
47
-
To easily use PowerShell 4.0 on older operating systems, [<spanstyle="color:#0000ff">install WMF 4.0](http://www.microsoft.com/en-us/download/details.aspx?id=40855).
48
-
Please read the installation instructions that are present on both the download page and the release notes for WMF 4.0.
55
+
This module requires that both the **Bitlocker** and
56
+
**RSAT-Feature-Tools-Bitlocker** features are installed.
57
+
It also requires the latest version of PowerShell (v4.0, which ships in Windows
58
+
8.1 or Windows Server 2012R2).
59
+
To easily use PowerShell 4.0 on older operating systems,
. Please read the installation instructions that are present on both the
62
+
download page and the release notes for WMF 4.0.
49
63
50
64
## Description
51
65
52
-
The **xBitlocker ** module contains the **xBLAutoBitlocker, xBLBitlocker, xBLTpm** DSC Resources.
53
-
This DSC Module allows you to configure Bitlocker on a single disk, configure a TPM chip, or automatically enable Bitlocker on multiple disks.
66
+
The **xBitlocker** module contains the **xBLAutoBitlocker, xBLBitlocker,
67
+
xBLTpm** DSC Resources.
68
+
This DSC Module allows you to configure Bitlocker on a single disk, configure a
69
+
TPM chip, or automatically enable Bitlocker on multiple disks.
54
70
55
71
## Resources
56
72
57
-
**xBLAutoBitlocker** is used to automatically enable Bitlocker on drives of type Fixed or Removable.
73
+
**xBLAutoBitlocker** is used to automatically enable Bitlocker on drives of
74
+
type Fixed or Removable.
58
75
It does not work on Operating System drives.
59
76
**xBLAutoBitlocker** has the following properties.
60
-
Where no description is listed, properties correspond directly to [Enable-Bitlocker](http://technet.microsoft.com/en-us/library/jj649837.aspx) parameters.
61
-
62
-
**DriveType:The type of volume to auto apply Bitlocker to. Valid values are "Fixed" or "Removable"
63
-
**PrimaryProtector:The primary protector type to be used for AutoBitlocker.
* MinDiskCapacityGB: If specified, only disks this size or greater will auto
88
+
apply Bitlocker
89
+
* AutoUnlock: Whether volumes should be enabled for auto unlock using
90
+
Enable-BitlockerAutoUnlock
91
+
* AdAccountOrGroup
92
+
* AdAccountOrGroupProtector
93
+
* EncryptionMethod
94
+
* HardwareEncryption
95
+
* Password
96
+
* PasswordProtector
97
+
* Pin
98
+
* RecoveryKeyPath
99
+
* RecoveryKeyProtector
100
+
* RecoveryPasswordProtector
101
+
* Service
102
+
* SkipHardwareTest
103
+
* StartupKeyPath
104
+
* StartupKeyProtector
105
+
* TpmProtector
106
+
* UsedSpaceOnly
83
107
84
108
**xBLBitlocker** has the following properties.
85
-
Where no description is listed, properties correspond directly to [Enable-Bitlocker](http://technet.microsoft.com/en-us/library/jj649837.aspx) parameters.
86
-
87
-
**MountPoint:The MountPoint name as reported in Get-BitLockerVolume
88
-
**PrimaryProtector:The primary protector type to be used for AutoBitlocker.
**Identity:Not actually used, so could be anything
115
-
* AllowClear:Indicates that the provisioning process clears the TPM, if necessary, to move the TPM closer to complying with Windows Server 2012 standards
116
-
* AllowPhysicalPresence:Indicates that the provisioning process may send physical presence commands that require a user to be present in order to continue.
117
-
* AllowImmediateReboot:Whether the computer can rebooted immediately after initializing the TPM
118
-
119
-
## Versions
120
-
121
-
### Unreleased
122
-
123
-
* Update appveyor.yml to use the default template.
124
-
* Added default template files .gitattributes, and .vscode settings.
125
-
* Fixes most PSScriptAnalyzer issues.
126
-
* Fix issue where AutoUnlock is not set if requested, if the disk was
127
-
originally encrypted and AutoUnlock was not used.
128
-
* Add remaining Unit Tests for xBitlockerCommon.
129
-
* Add Unit tests for MSFT_xBLTpm
130
-
* Add remaining Unit Tests for xBLAutoBitlocker
131
-
* Add Unit tests for MSFT_xBLBitlocker
132
-
133
-
### 1.2.0.0
134
-
135
-
* Converted appveyor.yml to install Pester from PSGallery instead of from Chocolatey.
136
-
* Added Codecov support.
137
-
* Updated appveyor.yml to use the one in template.
138
-
* Added folders for future unit and integration tests.
139
-
* Added Visual Studio Code formatting settings.
140
-
* Added .gitignore file.
141
-
* Added markdown lint rules.
142
-
* Fixed encoding on README.md.
143
-
* Added `PowerShellVersion = '4.0'`, and updated copyright information, in the
144
-
module manifest.
145
-
* Fixed issue which caused Test to incorrectly succeed on fully decrypted volumes when correct Key Protectors were present ([issue #13](https://github.com/PowerShell/xBitlocker/issues/13))
146
-
* Fixed issue which caused xBLAutoBitlocker to incorrectly detect Fixed vs Removable volumes. ([issue #11](https://github.com/PowerShell/xBitlocker/issues/11))
147
-
* Fixed issue which made xBLAutoBitlocker unable to encrypt volumes with drive letters assigned. ([issue #10](https://github.com/PowerShell/xBitlocker/issues/10))
148
-
* Fixed an issue in CheckForPreReqs function where on Server Core the installation of the non existing Windows Feature 'RSAT-Feature-Tools-BitLocker-RemoteAdminTool' was erroneously checked. ([issue #8](https://github.com/PowerShell/xBitlocker/issues/8))
149
-
150
-
151
-
### 1.1.0.0
152
-
153
-
* Versioning updates
154
-
155
-
### 1.0.1.1
156
-
157
-
* Reduced the number of acceptable values for PrimaryProtector in xBLAutoBitlocker and xBLBitlocker.
158
-
* Changed the properties that are returned by Get-TargetResource in xBLAutoBitlocker, xBLBitlocker, and xBLTpm.
159
-
* Fixed issue which caused protectors to be continually re-added.
160
-
161
-
162
-
### 1.0.0.0
163
-
164
-
* Initial release with the following resources
165
-
* xBLAutoBitlocker
166
-
* xBLBitlocker
167
-
* xBLTpm
146
+
* Identity: Not actually used, so could be anything
147
+
* AllowClear: Indicates that the provisioning process clears the TPM, if
148
+
necessary, to move the TPM closer to complying with Windows Server 2012
149
+
standards
150
+
* AllowPhysicalPresence: Indicates that the provisioning process may send
151
+
physical presence commands that require a user to be present in order to
152
+
continue.
153
+
* AllowImmediateReboot: Whether the computer can rebooted immediately after
This example enables Bitlocker on an Operating System drive.
174
-
The example code for ConfigureBitlockerOnOSDrive is located in [`ConfigureBitlockerOnOSDrive.ps1`](Examples/ConfigureBitlockerOnOSDrive/ConfigureBitlockerOnOSDrive.ps1).
161
+
The example code for ConfigureBitlockerOnOSDrive is located in
Enables Bitlocker on an Operating System drive, and automatically enables Bitlocker on all drives of type 'Fixed'.
179
-
The example code for ConfigureBitlockerAndAutoBitlocker is located in [`ConfigureBitlockerAndAutoBitlocker.ps1`](Examples/ConfigureBitlockerAndAutoBitlocker/ConfigureBitlockerAndAutoBitlocker.ps1).
180
-
167
+
Enables Bitlocker on an Operating System drive, and automatically enables
168
+
Bitlocker on all drives of type 'Fixed'. The example code for
0 commit comments