📜 ⬆️ ⬇️

Enabling BitLocker on Exchange Servers

The optimal security architecture for Exchange for both Exchange Server 2013 and Exchange Server 2016 recommends enabling BitLocker on fixed data drives that store Exchange database files. In order to configure disk encryption, we first define:

What is BitLocker?

BitLocker is a built-in volume encryption solution for Microsoft Windows that provides enhanced protection against data theft, for example, in cases of theft or loss of computers or hard drives.
BitLocker was first introduced in Windows Vista and Windows Server 2008. Since the first release of BitLocker, several improvements have been made, including data volume encryption, encryption of only disk space used, and redundancy flexibility.
By default, BitLocker uses AES encryption in cipher block chaining mode (CBC) with a 128-bit (default) or 256-bit key.
')
For more information, see BitLocker Overview on Microsoft TechNet .

How can BitLocker be deployed?

There are several ways to deploy BitLocker on Exchange servers.
1. Encrypt the operating system volume and Exchange data volumes using either network unlock, Data Recovery agents and PKI infrastructure or using TPM (the recommended approach).
2. Encrypt only Exchange data volumes.

To use BitLocker for FIPS compliance, keep in mind:


Volume Encryption Method

There are two ways to encrypt a volume:
1. Encryption of the entire volume. Use this option if you need to encrypt volumes that already contain existing messaging data. For example, to encrypt an entire 3 TB disk, this will take more than 8 hours.
2. Encrypt only used space. Use this option for new installations or new disks on which data is not yet available.

Before you begin encrypting the entire volume, make sure that the servers are in maintenance mode to prevent exposure to end users. You can note a significant decrease in performance (~ 90% of processor usage) and a decrease in the free space of the volume with the OS (~ 2 GB) while the volume is encrypted. In addition, ensure that BitLocker is deployed at the same time on no more than one DAG server to maintain availability.

Encryption script volume from OS and Exchange data volumes

BitLocker provides maximum protection when used with the TPM module. The TPM is a hardware component installed on the server, and we recommend using TPM chip version 2.0. It works with BitLocker, helping to protect user data, as well as ensuring that the server was not tampered with while it was not available.

In particular, BitLocker can use TPM to verify the integrity of early boot components and boot configuration data. This helps ensure that BitLocker makes the encrypted disk available only if these components have not been tampered with and the encrypted disk resides in the source server.

BitLocker helps ensure the integrity of the startup process by following these steps:

Important: TPM can only be used on physical servers. Virtual servers are not able to use TPM. If you have encrypted the guest operating system volume, then without fail, use a password or USB key to boot the guest operating system.


Environment setup

The steps below assume that Exchange Server is running Windows Server 2012 R2 or later.

Important: When BitLocker is enabled on existing Exchange servers, it is important to place the servers in maintenance mode to avoid the impact of the encryption process on end users.

1. Create an organizational unit (OU) containing the Exchange servers, if one does not exist.
Start PowerShell with the appropriate Active Directory permissions.

New-ADOrganizationalUnit "Exchange Servers" -path "dc=contoso,dc=com" $ExchangeOU = Get-ADOrganizationalUnit -Filter 'Name -like "Exchange Servers"' Get-ADComputer "Exchange Server" | Move-ADObject -TargetPath $ExchangeOU.DistinguishedName 


2. Create a GPO and link it to the OU that contains the Exchange servers.

 Import-Module grouppolicy #RSAT    New-GPO -Name "Exchange Server BitLocker Policy" -Domain contoso.com New-GPLink -Name "Exchange Server BitLocker Policy" -Enforced "yes" -Target $ExchangeOU.DistinguishedName 


3. Install the BitLocker module on Exchange servers.

4. Enable TPM on Exchange servers.

5. Enable the storage of TPM recovery information in Active Directory.

6. Configure Bitlocker settings in a GPO.


Exchange Data Encryption Script

In a situation where TPM cannot be used (for example, the server does not have TPM, or is virtualized), encrypting the OS system volume requires the use of a password or USB key to allow the operating system to boot correctly. Since this can negatively affect the Exchange services, you can refuse to encrypt the OS system volume. Instead, you can encrypt data volumes. Since the OS system volume is not encrypted, the OS cannot automatically unlock the encrypted volumes upon boot. Thus, one of two conditions must be met:
1. The administrator manually enters the recovery key and unlocks each disk after the OS boots.
2. A scheduled task is running to unlock encrypted volumes during OS boot.

The following steps describe how to set up a scheduled task and assume that Exchange Server is running Windows Server 2012 R2 or later.

Source: https://habr.com/ru/post/270015/


All Articles