![]() ![]() ![]() This option represents the type of encryption applied. AES_128 is ideal for fixed internal drives, and XTS_AES128 is ideal for removable drives like a flash drive. This is ideal for brand new computers that haven't had data stored yet.Ĥ) Finally, select the encryption standard. This is ideal for computers that are in active use on the other hand, selecting the 'Used Space Only' will be faster, but doesn't protect unused space. Selecting 'Full Disk' takes longer, but protects the complete disk (unused, and used). You will need to select the drives on the computer that you want to encrypt with BitLocker.ģ) Select the encryption method you want to apply. Once there, you can find the Disk Encryption action on the right-hand action bar.Ģ) Click on the action's button to begin the process. To turn on BitLocker:ġ) Find a compatible Windows device on your Prey control panel, and access its individual view by clicking it on the device list. This action will be available on any Windows 10 device using a Windows Pro, Enterprise, or Education version and with hardware that possesses the TPM (Trusted Platform Module). Encryption is a key risk mitigator! Data theft, data breaches, or device loss won't result in compromised data if said information is encrypted. This new tool has been added to our Enterprise plan, and it is the next step into better helping organizations secure their data. This tool allows you to easily activate BitLocker's disk encryption remotely on compatible devices (Windows 10 Pro, Enterprise, or Education) and protect the data on their hard drives!īitLocker is a native encryption tool that comes with Windows 10 Pro, Enterprise, or Education and doesn't need to be installed or bought separately. ![]() Use our new Disk Encryption tool to easily encrypt data on compatible Windows devices remotely using Windows' native BitLocker tool.Įnterprises with fleets using Windows as an operating system can now take advantage of Microsoft's native BitLocker disk encryption tool using Prey! Let us introduce you to our new Disk Encryption action. Prey can check its current version and automagically fetch and update itself, so you don't need to manually reinstall each time. Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff. Prey has very few dependencies and doesn't even leave a memory footprint until activated. Get a complete list of your PC's CPU, motherboard, RAM, and BIOS information. Grab a screenshot of the active session * if you're lucky you may catch the guy logged into his email or Facebook account! If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found. Powerful evidence.įully lock down your PC, making it unusable unless a specific password is entered. Take a picture of the thief with your laptop's webcam so you know what he looks like and where he's hiding. Prey uses either the device's GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it. And it just works.īasically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. It's lightweight, open source software, and free for anyone to use. ![]()
0 Comments
Leave a Reply. |