BitLocker is only available on Win7 Enterprise. Betcha they're using Win7 Pro.
On Thu, Jan 31, 2013 at 7:56 AM, John Cook <john.c...@pfsf.org> wrote: > Just curious as to why not Bitlocker? > > > > John W. Cook > > Network Operations Manager > > Partnership For Strong Families > > 5950 NW 1st Place > > Gainesville, Fl 32607 > > Office (352) 244-1610 > > Cell (352) 215-6944 > > MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 > > > > From: Chinnery, Paul [mailto:pa...@mmcwm.com] > Sent: Thursday, January 31, 2013 8:28 AM > To: NT System Admin Issues > Subject: RE: Mobile Device Management > > > > +1 on that. All of our laptops (even ones secured to Medsurg carts) are > encrypted with Truecrypt. > > > > From: Cameron Cooper [mailto:ccoo...@aurico.com] > Sent: Wednesday, January 30, 2013 6:02 PM > To: NT System Admin Issues > Subject: RE: Mobile Device Management > > > > Thanks for the info below. Since we’ve deployed more laptops recently, > we’ve encrypted the entire drive with TrueCrypt. > > > > Regards, > > > > Cameron > > > > ___________________________________________________ > > Cameron Cooper | IT Manager | Aurico > Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896 > ccoo...@aurico.com | www.aurico.com > > > > From: Angus Scott-Fleming [mailto:angu...@geoapps.com] > Sent: Wednesday, January 30, 2013 3:49 PM > To: NT System Admin Issues > Subject: Re: Mobile Device Management > > > > On 30 Jan 2013 at 20:24, Cameron Cooper wrote: > > > >> In light of one of our company laptops being stolen (from the user's car), > >> we've been tasked to look for a mobile solution that would allow us to >> track, > >> recover and remote wipe a laptop, tablet and smartphone and would like >> some > >> recommendations on what some are currently using. So far we've looked at > >> LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron > > > > Whole-disk-encryption on laptops is an absolute must IMHO. That way you're > only out hardware no matter what. > > > > The biggest problem with most tracking-and-wiping solutions like Prey is > that the laptop has to be booted and the OS loaded for them to work. Since I > use Truecrypt whole-disk-encryption and the password is required to boot or > to awake after hibernation I don't use Prey. > > > > LoJack has a version which installs in the BIOS (installed at the factory on > many bigger brands now, but you have to activate it $$$). This version > phones home if there is an active network connection no matter how the > computer is booted. But security flaws in the BIOS implementation of LoJack > for Laptops were documented at a 2009 BlackHat session. Don't know if > they're still there. > > > > This might be of interest: > > > > Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? > > http://www.intel.com/support/services/antitheft/sb/CS-030335.htm > > > > More info: > > > > LoJack - Wikipedia, the free encyclopedia > > https://en.wikipedia.org/wiki/LoJack#for_Laptops > > > > At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] > and Alfredo Ortega showed that the implementation of the Computrace/LoJack > agent embedded in the BIOS has vulnerabilities and that this "available > control of the anti-theft agent allows a highly dangerous form of > BIOS-enhanced rootkit that can bypass all chipset or installation > restrictions and reutilize many existing features offered in this kind of > software."[16][17] Absolute Software rejected the claims made in the > research, stating that "the presence of the Computrace module in no way > weakens the security of the BIOS". Another independent analyst confirmed the > flaws, noted that a malware hijacking attack would be a "highly exotic one", > and suggested that the larger concern was that savvy thieves could disable > the phone home feature.[18] > > > > Core Security Technologies > > http://www.coresecurity.com/content/Deactivate-the-Rootkit > > Deactivate the Rootkit - Black Hat USA 2009 > > Link to paper: > > http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf > > > > Share your findings back here please. > > > > HTH > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > > ________________________________ > > > > CONFIDENTIALITY NOTICE: This email message is intended only for the person > or entity to which it is addressed and may contain confidential material. > Any unauthorized review, use, disclosure, downloading, copying or > distribution is prohibited. If you are not the intended recipient, please > contact the sender by reply email and permanently delete all copies of the > original message. If you are the intended recipient but do not wish to > receive communications through this medium, please advise the sender > immediately. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > > > ________________________________ > > CONFIDENTIALITY STATEMENT: The information transmitted, or contained or > attached to or with this Notice is intended only for the person or entity to > which it is addressed and may contain Protected Health Information (PHI), > confidential and/or privileged material. Any review, transmission, > dissemination, or other use of, and taking any action in reliance upon this > information by persons or entities other than the intended recipient without > the express written consent of the sender are prohibited. This information > may be protected by the Health Insurance Portability and Accountability Act > of 1996 (HIPAA), and other Federal and Florida laws. Improper or > unauthorized use or disclosure of this information could result in civil > and/or criminal penalties. > Consider the environment. Please don't print this e-mail unless you really > need to. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin