Bitlocker Encryption

Tags Software

Description

Software package for encrypting an individual Windows computer's hard drive.

Access

To access Bitlocker Encryption, follow these instructions:

  1. Go to your Start Menu.

  2. Type Bitlockerand select Manage Bitlocker.

  3. Follow the steps in the Bitlocker dialog to encrypt your hard drive and generate your key.

Who can access

  • All faculty, staff, and students with a licensed copy of Windows

How to request access

  • No request is needed if you follow the access instructions above. If you're having trouble, visit the  Technology Help Center  to submit a ticket.

Features

  • Full volume encryption feature included with Microsoft Windows

  • Uses AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key

Additional resources

Service support

Get help

  • Visit the Technology Help Center ( help.ohio.edu ) to get live support, view outages, and browse trainings.

Accessibility

Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end-users, those steps must be taken. 

If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know
For further information about OHIO's digital accessibility resources, see:

Security

For sensitive data or for cases where you need to be able to recover a lost or forgotten encryption key, you should use PGP Encryption instead of Bitlocker.

The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, and information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the University community can teach, learn, and conduct research. 

For additional information about OHIO’s security resources, see: