This policy setting controls whether a BitLocker-protected computer that is connected to a trusted wired Local Area Network (LAN) and joined to a domain can create and use Network Key Protectors on TPM-enabled computers to automatically unlock the operating system drive when the computer is started. If you enable this policy, clients configured with a BitLocker Network Unlock certificate will be able to create and use Network Key Protectors. To use a Network Key Protector to unlock the computer, both the computer and the BitLocker Drive Encryption Network Unlock server must be provisioned with a Network Unlock certificate. The Network Unlock certificate is used to create Network Key Protectors, and protects the information exchanged with the server to unlock the computer. You can use the group policy setting "Computer Configuration\Windows Settings\Security Settings\Public Key Policies\BitLocker Drive Encryption Network Unlock Certificate" on the domain controller to distribute this certificate to computers in your organization. This unlock method uses the TPM on the computer, so computers that do not have a TPM cannot create Network Key Protectors to automatically unlock with Network Unlock. If you disable or do not configure this policy setting, BitLocker clients will not be able to create and use Network Key Protectors. Note: For reliability and security, computers should also have a TPM startup PIN that can be used when the computer is disconnected from the wired network or the server at startup.
This policy setting controls the Suggested Sites feature, which recommends websites based on the user's browsing activity. ...
This policy setting controls the use of BitLocker on removable data drives. This policy setting is applied when you turn ...
This policy setting controls the use of fast startup. If you enable this policy setting, the system requires hibernate to ...
This policy setting controls when background synchronization occurs while operating in slow-link mode, and applies to any ...
This policy setting controls whether a BitLocker-protected computer that is connected to a trusted wired Local Area Network ...
This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with ...
This policy setting controls whether a device always sends a compound authentication request when the resource domain requests ...
This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts ...
This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control ...