HP ProLiant DL360 G4 Server User Manual

Page 19

Advertising
background image

Post-installation tasks 19

o

Print the recovery key – Prints the password.

Use one or more of these options to preserve the recovery password. For each option, select the option
and follow the wizard steps to setup the location for saving or printing the recovery password.

11.

After saving the recovery password, click Next. The Encrypt the selected disk volume page is displayed.

IMPORTANT:

The recovery password is required in the event the encrypted disk is moved to

another computer, or changes are made to the system startup information. This password is so

important that HP recommends that you make additional copies of the password and store it in a
safe place apart from the computer to assure access to your data. Your recovery password is
needed to unlock the encrypted data on the volume if BitLocker enters a locked state. This recovery

password is unique to this particular BitLocker encryption. You cannot use it to recover encrypted
data from any other BitLocker encryption session.

12.

On Choose how much of your drive to encrypt page, select the Disk Encryption option, and click Next.

13.

Confirm that the Run Bitlocker System check box is selected, and then click Continue.

14.

Click Restart Now. The computer restarts and BitLocker verifies if the computer is BitLocker compatible,
and ready for encryption. If it is not, an error message alerting you to the problem is displayed.

15.

If it is ready for encryption, the Encryption in Progress status bar appears. You can monitor the ongoing
completion status of the disk volume encryption by dragging your mouse cursor over the BitLocker Drive

Encryption icon in the notification area at the bottom of your screen.

Completing this procedure ensures that you have encrypted the operating system volume, and have created
a recovery password unique to this volume. The next time you log in, you will see no change. If the TPM

changes or cannot be accessed, and if there are changes to key system files, or if someone tries to start the
computer from a product CD or DVD to circumvent the operating system, then the computer switches to

recovery mode until the recovery password is supplied.
For more information regarding BitLocker, see the Microsoft® website
(

http://technet.microsoft.com/en-us/library/cc732774.aspx

).

Advertising