Workstation hard drive encryption policies require all connected storage to be encrypted so that data cannot be accessed from a computer without the proper keys or user authentication. Encryption policies apply to both Windows and Mac computers and are managed by ITS.
Tip |
---|
Looking for help with a locked computer or encrypting an external/USB drive? |
Info |
---|
|
Expand | ||
---|---|---|
| ||
Encryption is the process of converting or scrambling data and information into an unreadable, encoded version that can only be read with authorized access. Encryption is a widely used security tool that can prevent the interception of sensitive data, either while stored in files or while in transit across networks. |
Expand | ||
---|---|---|
| ||
Encryption on Cal Poly devices is performed using native tools for each major operating system:
Each technology is managed by different external tools and controlled by ITS. For MacOS, JAMF Pro is the main centralized Mac management software and Windows devices are co-managed by both System Center Configuration Manager and Intune. |
Expand | ||
---|---|---|
| ||
Once a device is encrypted, it requires either an authenticated login or a recovery key. When a device is initially encrypted, a recovery key is created and saved to the management server. |
Expand | ||
---|---|---|
| ||
Please contact the Cal Poly service desk or create a ticket to have an administrator contact you for assistance |
Expand | ||
---|---|---|
| ||
|
Windows Encryption Resources
MacOS Encryption Resources
...
BitLocker Overview and Requirements FAQ
...