I have read that many manufacturers will not enable this ability in the BIOS for fear that the customer will lock it and forget the password making the maching unless.Īnother solution to my problem would be to obtain custom files to unlock this ability in the BIOS, this is beyond my ability. MBAM 2.
To lock a SED one needs to set an authentication key. Part of the Microsoft Desktop Optimization Pack, Microsoft BitLocker Administration and Monitoring (MBAM) makes it easier to manage and support BitLocker and BitLocker To Go. I'll give them some credit that this was a custom set-up, and some blame should go to Microsoft for not allowing HP client security free reign. I am quite disappointed with HP for selling me a SED without the ability to lock it myself without additional software. To set an authentication key and lock my drive I have been forced to purchased Winmagic's SecurDoc, which is the only non-enterprise software I could find that will lock my drive. I refuse to do this because of the performance degradation (the whole reason I bought a hardware based SED). Bitlocker is a software based encryption service. HP technical support suggested I use Window's bitlocker to encrypt my drive. As the most powerful BitLocker solution in Linux, you can also use it to encrypt drives. BitLocker is able to pass those commands allowing for Security Protocol Discovery.
#BITLOCKER ON THE GO SUPPORT SED WINDOWS 10#
I have learned that HP Client Security is not supported on Windows 10 and will not lock my Samsung SED. Until recently only SATA/SCSI drives were supported by sedutil. Until recently only SATA/SCSI drives were supported by sedutil. Here is my final chapter in trying to lock my self-encrypting drive (SED):