![dell rapid recovery powershell scheduling report dell rapid recovery powershell scheduling report](https://www.veritas.com/content/dam/Veritas/images/product/backup-exec/veritas_backup_exec_global_deduplication.png)
$CIMVolumeC = Get-CimInstance -namespace "Root\cimv2\security\MicrosoftVolumeEncryption" -ClassName "Win32_Encryptablevolume" – Using Get-CimInstance will look like this (the results are shown in green in the following image): We can look into it by using the following command, and because we generally want to encrypt the system drive, we will filter on drive C. The Win32_EncryptableVolume class contains an instance for each of the volumes that are present on the computer (for example, hard drives and USB keys). But this time we will dive into the Win32_EncryptableVolume class. It lies in the same Root\cimv2\Security\ namespace hierarchy as the Win32_TPM. Ready? All right…let’s go!Įverything that relates to the proper encryption of the drive and that needs to be automated resides in the WMI (CIM) repository. But this is where I had the most fun in the scripting process.Īre you sitting comfortably? You might want to get a refill of coffee before we hit it. Without these steps, the drive encryption might not even happen.
![dell rapid recovery powershell scheduling report dell rapid recovery powershell scheduling report](https://1.bp.blogspot.com/-Yyr6AoVI9c8/YTwUtyqwR7I/AAAAAAAADlA/rBWXztotxe0SXw27oLleRaldbXxOKdaXACLcBGAsYHQ/s0/p3-cover.jpg)
![dell rapid recovery powershell scheduling report dell rapid recovery powershell scheduling report](https://im4j1ner.com/wp-content/uploads/2019/01/images28129.jpeg)
Don’t get me wrong-the Trusted Platform Module (TPM) operations are extremely important in the process of automating the drive encryption. It is a tool written in Windows PowerShell that makes BitLocker tasks easier to automate.įinally, we arrive at the interesting part: the encryption of the drive. Encryption operationsĪ lot of the following script examples come from a function I wrote called BitLockerSAK. Be sure you read PowerShell and BitLocker: Part 1 first. Welcome back Stephane van Gulick for the final part of his two-part series. Microsoft Scripting Guy, Ed Wilson, is here.
DELL RAPID RECOVERY POWERSHELL SCHEDULING REPORT SERIES
Summary : Guest blogger, Stephane van Gulick, continues his series about using Windows PowerShell and BitLocker together.