VMP73 Network Media Player

Total Page:16

File Type:pdf, Size:1020Kb

VMP73 Network Media Player VMP73 Network media player - User Guide - Guide de l’utilisateur - Guía del usuario - Bedienungsanleitung - Guida dell’utente 3RGUĊF]QLNXĪ\WNRZQLND 3\ɤɨɜɨɞɫɬɜɨɩɨɥɶɡɨɜɚɬɟɥɹ - Användarhandbok ҢЙыٺ - Model No.: VS13410 &RPSOLDQFH,QIRUPDWLRQ &(&RQIRUPLW\IRU(XURSHDQ&RXQWULHV The device complies with the EMC Directive 2004/108/EC and Low Voltage Directive 2006/95/EC. )ROORZLQJLQIRUPDWLRQLVRQO\IRU(8PHPEHUVWDWHV The mark is in compliance with the Waste Electrical and Electronic Equipment Directive 2002/96/EC (WEEE). The mark indicates the requirement NOT to dispose the equipment including any spent or discarded batteries or accumulators as unsorted municipal waste, but use the return and collection systems available. If the batteries, accumulators and button cells included with this equipment, display the chemical symbol Hg, Cd, or Pb, then it means that the battery has a heavy metal content of more than 0.0005% Mercury or more than, 0.002% Cadmium, or more than 0.004% Lead. 9LHZ6RQLF i VMP73 'HFODUDWLRQRI5R+6&RPSOLDQFH This product has been designed and manufactured in compliance with Directive 2002/95/ EC of the European Parliament and the Council on restriction of the use of certain hazardous substances in electrical and electronic equipment (RoHS Directive) and is deemed to comply with the maximum concentration values issued by the European Technical Adaptation Committee (TAC) as shown below: Proposed Maximum Substance Actual Concentration Concentration Lead (Pb) 0.1% < 0.1% Mercury (Hg) 0.1% < 0.1% Cadmium (Cd) 0.01% < 0.01% Hexavalent Chromium (Cr6+) 0.1% < 0.1% Polybrominated biphenyls (PBB) 0.1% < 0.1% Polybrominated diphenyl ethers (PBDE) 0.1% < 0.1% Certain components of products as stated above are exempted under the Annex of the RoHS Directives as noted below: Examples of exempted components are: 0HUFXU\LQFRPSDFWÀXRUHVFHQWODPSVQRWH[FHHGLQJPJSHUODPSDQGLQRWKHUODPSV QRWVSHFL¿FDOO\PHQWLRQHGLQWKH$QQH[RI5R+6'LUHFWLYH /HDGLQJODVVRIFDWKRGHUD\WXEHVHOHFWURQLFFRPSRQHQWVÀXRUHVFHQWWXEHVDQG electronic ceramic parts (e.g. piezoelectronic devices). 3. Lead in high temperature type solders (i.e. lead-based alloys containing 85% by weight or more lead). 4. Lead as an allotting element in steel containing up to 0.35% lead by weight, aluminium containing up to 0.4% lead by weight and as a cooper alloy containing up to 4% lead by weight. 9LHZ6RQLF ii VMP73 &RS\ULJKW,QIRUPDWLRQ Copyright© ViewSonic Corporation, 2010. All rights reserved. ViewSonic, the three birds logo, OnView, ViewMatch, and ViewMeter are registered trademarks of ViewSonic Corporation. Disclaimer:ViewSonic Corporation shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages resulting from furnishing this material, or the performance or use of this product. In the interest of continuing product improvement, ViewSonic Corporation reserves the right WRFKDQJHSURGXFWVSHFL¿FDWLRQVZLWKRXWQRWLFH,QIRUPDWLRQLQWKLVGRFXPHQWPD\FKDQJH without notice. No part of this document may be copied, reproduced, or transmitted by any means, for any purpose without prior written permission from ViewSonic Corporation. )RU<RXU5HFRUGV Product Name: VMP73 ViewSonic Network Media Player Model Number: VS13410 Document Number: VMP73_UG_ENG Rev. 1A 02-02-10 Serial Number: _____________________________ Purchase Date: _____________________________ 3URGXFWGLVSRVDODWHQGRISURGXFWOLIH ViewSonic is concerned about the preservation of our environment. Please dispose of this product properly at the end of its useful life. Your local waste disposal company may provide information about proper disposal. 9LHZ6RQLF iii VMP73 Safety Instructions This product has been engineered and manufactured to assure your personal safety. However, improper use can result in potential electric shock or fire hazards. In order not to defeat the safe-guards incorporated in this instrument and its accessories, please adhere to the following instructions when installing, operating and servicing. Power Source Warning A marking label attached on the rear side of the adapter (supplied) indicates the correct power source for this equipment. Operate this product only from an electrical outlet with the voltage and frequency indicated on the product label. Incorrect power source may result in a risk of electric shock or fire. If you are uncertain of the type of power supplied to your home, consult your local power company or appliance dealer. Only use the power cord and adapter provided by the manufacturer. Internal component may be damaged if you use a different adapter to power this product. To avoid electric shock and fire hazard, match the plug and outlet connections carefully, then fully insert. If the plug fails to fit the outlet, please contact an electrician to update your power outlets. Do not overload electrical outlets, extension cords, or integral convenience receptacles as this can result in a risk of fire or electric shock. And to prevent power cord damage, arrange all power cords so that people cannot walk on the cords. Do not place objects on the cords. Place this product in a location that is close enough to an electrical outlet and where the power cord is easily accessible to be disconnected from the wall outlet. 9LHZ6RQLF ix VMP73 Usage Warning To reduce the risk of electric shock, do not remove the cover or attempt to disassemble this product. There are no user-serviceable parts inside. Please refer all servicing to qualified service personnel. Protect this product from foreign objects. Never push object of any kind into this product through openings as they may touch dangerous voltage points or short-out parts that could result in a fire or electric shock. Do not expose this product to liquids, rain or moisture. This product has ventilation openings that protect it from overheating. Never block or cover these openings. And do not place this product near heat sources such as radiators, heat registers, stoves or other products producing heat. Before cleaning or wiping this product, make sure your power cord is already unplugged from the electrical outlet. Only use damp cloth to clean this product, and never use a liquid cleaner or an aerosol cleaner. During a thunderstorm, or when this product is unused for long periods of time, unplug power cord from the wall outlet. This will prevent damage to the product due to lightning and power-line surges. Service Warning Refer all servicing to qualified service personnel. For damage that requires service, please unplug your power cord from the AC outlet first, and contact your dealer or servicing personnel to obtain service for the following conditions. z If there is damage to the adapter, power cord or plug. z If liquid enters this product. z If you drop this product, a heavy object falls on this product, or damage occurs to the cover of this product. z If you expose this product to rain or water. z If this product does not operate normally by following the operating instructions. z If this product exhibits a distinct change in performance. 9LHZ6RQLF x VMP73 Caution Risk of explosion if battery is replaced by an incorrect type. Dispose of used batteries according to the instructions. Copyright Notice z No part of this user’s manual may be copied, translated, or reproduced including electronic form without permission from the copyright owner. We have made effort to ensure the accuracy and completeness of this document. However, as ongoing development is continually improving the capabilities of our products and the content described in this manual may be changed at any time, we cannot guarantee the accuracy of the content of this document. We disclaim liability for errors, omissions, or future changes. The information of this document is subject to change without notice. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any interferences received, including interference that may cause undesired operation. License Notice and Trademark Acknowledgement Dolby Digital: Manufactured under license from Dolby Laboratories. Dolby and the double-D symbol are trademarks of Dolby Laboratories. “HDMI, the HDMI logo and High-Definition Multimedia Interface are trademarks or registered trademarks of HDMI Licensing LLC." 9LHZ6RQLF xi VMP73 Table of Contents 1 Introduction ........................................................................ 1 Package Content ...................................................................... 1 Specification ............................................................................ 2 Front View ............................................................................... 3 Back View ................................................................................ 3 Remote Control ........................................................................ 4 2 Installation.......................................................................... 5 Cable Connections .................................................................... 5 Internet Connections................................................................ 5 Connect USB Devices................................................................ 6 Power Cord Connection ............................................................ 7 Switch your TV Input/Source ................................................... 7 3 Network Connections .........................................................
Recommended publications
  • NTFS • Windows Reinstallation – Bypass ACL • Administrators Privilege – Bypass Ownership
    Windows Encrypting File System Motivation • Laptops are very integrated in enterprises… • Stolen/lost computers loaded with confidential/business data • Data Privacy Issues • Offline Access – Bypass NTFS • Windows reinstallation – Bypass ACL • Administrators privilege – Bypass Ownership www.winitor.com 01 March 2010 Windows Encrypting File System Mechanism • Principle • A random - unique - symmetric key encrypts the data • An asymmetric key encrypts the symmetric key used to encrypt the data • Combination of two algorithms • Use their strengths • Minimize their weaknesses • Results • Increased performance • Increased security Asymetric Symetric Data www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Confortable • Applying encryption is just a matter of assigning a file attribute www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Transparent • Integrated into the operating system • Transparent to (valid) users/applications Application Win32 Crypto Engine NTFS EFS &.[ßl}d.,*.c§4 $5%2=h#<.. www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Flexible • Supported at different scopes • File, Directory, Drive (Vista?) • Files can be shared between any number of users • Files can be stored anywhere • local, remote, WebDav • Files can be offline • Secure • Encryption and Decryption occur in kernel mode • Keys are never paged • Usage of standardized cryptography services www.winitor.com 01 March 2010 Windows Encrypting File System Availibility • At the GUI, the availibility
    [Show full text]
  • Minimum Hardware and Operating System
    Hardware and OS Specifications File Stream Document Management Software – System Requirements for v4.5 NB: please read through carefully, as it contains 4 separate specifications for a Workstation PC, a Web PC, a Server and a Web Server. Further notes are at the foot of this document. If you are in any doubt as to which specification is applicable, please contact our Document Management Technical Support team – we will be pleased to help. www.filestreamsystems.co.uk T Support +44 (0) 118 989 3771 E Support [email protected] For an in-depth list of all our features and specifications, please visit: http://www.filestreamsystems.co.uk/document-management-specification.htm Workstation PC Processor (CPU) ⁴ Supported AMD/Intel x86 (32bit) or x64 (64bit) Compatible Minimum Intel Pentium IV single core 1.0 GHz Recommended Intel Core 2 Duo E8400 3.0 GHz or better Operating System ⁴ Supported Windows 8, Windows 8 Pro, Windows 8 Enterprise (32bit, 64bit) Windows 10 (32bit, 64bit) Memory (RAM) ⁵ Minimum 2.0 GB Recommended 4.0 GB Storage Space (Disk) Minimum 50 GB Recommended 100 GB Disk Format NTFS Format Recommended Graphics Card Minimum 128 MB DirectX 9 Compatible Recommended 128 MB DirectX 9 Compatible Display Minimum 1024 x 768 16bit colour Recommended 1280 x 1024 32bit colour Widescreen Format Yes (minimum vertical resolution 800) Dual Monitor Yes Font Settings Only 96 DPI font settings are supported Explorer Internet Minimum Microsoft Internet Explorer 11 Network (LAN) Minimum 100 MB Ethernet (not required on standalone PC) Recommended
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Mobility for the Masses Unleashing a World of Possibilities
    Mobility for the Masses Unleashing a World of Possibilities Uday Marty Director of Product Marketing Mobile Platforms Group Risk Factors Today’s presentations contain forward-looking statements. All statements made that are not historical facts are subject to a number of risks and uncertainties, and actual results may differ materially. Please refer to our most recent Earnings Release and our most recent Form 10-Q or 10-K filing available on our website for more information on the risk factors that could cause actual results to differ. Copyright © 2009 Intel Corporation Agenda • Today’s news • Current environment • The latest on Intel’s mobile platforms • Ultra-thin laptops come to the mainstream • Expanded wireless capability • Summary Copyright © 2009 Intel Corporation This presentation and materials related to it are under embargo until June 1, 2009, 9 p.m. PDT Copyright © 2009 Intel Corporation Today’s News What’s launching today: – Three new Intel® Core®2 Duo processors (T9900, P9700, and P8800) – New ULV Intel® Pentium® processor (SU2700) – New Mobile Intel® GS40 Express Chipset Enabling significant improvements in the four vectors of mobility – Extended performance leadership – Enabling Ultra-thin systems at mainstream price points – Enhancing battery life – Expanded wireless capabilities For more information, go to – http://www.intel.com/pressroom/kits/events/computex2009 Copyright © 2009 Intel Corporation Worldwide Mobile Growth Continues Mobile Shift Strong Across Mature and Emerging Markets Source: IDC Worldwide Quarterly PC
    [Show full text]
  • Refs: Is It a Game Changer? Presented By: Rick Vanover, Director, Technical Product Marketing & Evangelism, Veeam
    Technical Brief ReFS: Is It a Game Changer? Presented by: Rick Vanover, Director, Technical Product Marketing & Evangelism, Veeam Sponsored by ReFS: Is It a Game Changer? OVERVIEW Backing up data is more important than ever, as data centers store larger volumes of information and organizations face various threats such as ransomware and other digital risks. Microsoft’s Resilient File System or ReFS offers a more robust solution than the old NT File System. In fact, Microsoft has stated that ReFS is the preferred data volume for Windows Server 2016. ReFS is an ideal solution for backup storage. By utilizing the ReFS BlockClone API, Veeam has developed Fast Clone, a fast, efficient storage backup solution. This solution offers organizations peace of mind through a more advanced approach to synthetic full backups. CONTEXT Rick Vanover discussed Microsoft’s Resilient File System (ReFS) and described how Veeam leverages this technology for its Fast Clone backup functionality. KEY TAKEAWAYS Resilient File System is a Microsoft storage technology that can transform the data center. Resilient File System or ReFS is a valuable Microsoft storage technology for data centers. Some of the key differences between ReFS and the NT File System (NTFS) are: ReFS provides many of the same limits as NTFS, but supports a larger maximum volume size. ReFS and NTFS support the same maximum file name length, maximum path name length, and maximum file size. However, ReFS can handle a maximum volume size of 4.7 zettabytes, compared to NTFS which can only support 256 terabytes. The most common functions are available on both ReFS and NTFS.
    [Show full text]
  • Module 12: Using Advanced Windows Powershell Techniques
    Module 12: Using advanced Windows PowerShell techniques Lab: Practicing advanced techniques Exercise 1: Creating a profile script Task 1: Create a profile script • A script that performs these tasks is located at: E:\Mod12\Labfiles\10961C_Mod12_LabA_Ex1_LAK.txt Results: After completing this exercise, you should have created a profile script. Exercise 2: Verifying the validity of an IP address Task 1: Verify the validity of an IP address • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex2_LAK.txt. Results: After completing this exercise, you should have created a script that verifies the validity of an IP address. Exercise 3: Reporting disk information Task 1: Report disk information • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex3_LAK.txt. Results: After completing this exercise, you should have created a script that reports disk space on a server. Exercise 4: Querying NTFS permissions Task 1: Query NTFS permissions • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex4_LAK.txt. Results: After completing this exercise, you will have created a module that you can use to query NTFS permissions. Exercise 5: Creating user accounts with passwords from a CSV file Task 1: Create user accounts with a password from a CSV file • A script that performs these tasks is located at: E:\Mod12\labfiles\10961C_Mod12_LabA_Ex5_LAK.txt. Results: After completing this exercise, you will have created a script that will create new user accounts from a CSV file. Task 2: Prepare for the end of the course When you have finished the lab, revert the virtual machines to their initial state.
    [Show full text]
  • Using Windows Media Player Version 12 (Windows 7) from the Media Player Help System John Lortz ([email protected]) – Discoverskills (
    Using Windows Media Player Version 12 (Windows 7) From the Media Player Help System John Lortz ([email protected]) – DiscoverSkills (www.DiscoverSkills.com) You can use Windows Media Player to find and play digital media files on your computer or network, play CDs and DVDs, and stream media from the Internet. You can also rip music from audio CDs, burn CDs of your favorite music, sync media files to portable device, and find and purchase content on the Internet through online stores. Getting started with Windows Media Player Windows Media Player provides an intuitive, easy-to-use interface to play digital media files, organize your digital media collection, burn CDs of your favorite music, rip music from CDs, sync digital media files to a portable device, and shop for digital media content from online stores. Start Windows Media Player To start Windows Media Player, click the Start button , click All Programs, and then click Windows Media Player. Two ways to enjoy your media: the Player Library and Now Playing mode Windows Media Player allows you to toggle between two modes: the Player Library, which gives you comprehensive control over the Player's many features; and Now Playing mode, which gives you a simplified view of your media that's ideal for playback. From the Player Library, you can go to Now Playing mode by clicking the Switch to Now Playing button in the lower- right corner of the Player. To return to the Player Library, click the Switch to Library button in the upper-right corner of the Player. Player Library In the Player Library, you can access and organize your digital media collection.
    [Show full text]
  • Paragon NTFS for Linux
    PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com E-mail [email protected] Paragon NTFS for Linux #1 High-Performance Cross-platform Solution for PC, Key Features and Benefits NAS, Router, and HD Media Player OEMs/ODMs Full read/write access to Windows Network devices which can accommodate external storage are based upon (NTFS-formatted) HDDs under Linux kernels that do not support the file systems such external storage is normally formatted to. For example, Linux-based PCs, NAS devices, routers, and HD A pure kernel module –like native media players are incompatible with external HDDs formatted for NTFS Linux modules (*.o or *.ko) (Windows). To be competitive, OEMs/ODMs must find an effective bridge between the operating system or kernel their products are running and the Does not require additional libraries file systems that external storage is formatted to… High performance –better than FAT Over 10 years ago, Paragon Software Group recognized this need and developed a unique Universal File System Driver or UFSD™ technology which Low system requirements –16MB or provides full high-performance read/write access to file systems under less operating systems and kernels that do not support them, such as NTFS for Linux, Ext2/3FS for Mac OS X, HFS+ for Windows, etc. Small footprint <500KB Our most popular UFSD solution is Paragon NTFS for Linux, which enables Linux-based PCs and network devices to have full read/write access to NTFS- Short mount time formatted drives attached to them, with high performance as though they are native for Linux.
    [Show full text]
  • USB External Device Encryption Instructions Acceptable Use: HSC Security Practices Regarding the Encryption of External USB Devices
    USB External Device Encryption Instructions Acceptable Use: HSC Security Practices regarding the encryption of external USB devices • The Encrypted USB Storage Device may only be used for temporary storage and/or data transport of duplicate data. • A complex password must be used upon encryption, loss of the password will render the data on the USB unrecoverable. Further recovery safeguards are NOT APPLICABLE. Some things to note before getting started: • It is recommended that the USB device (Flash Drive/External HDD) be formatted to “NTFS” before saving data to the device and/or encrypting the device. Make sure that you have saved desired data from the USB Device before formatting the drive! There is no mechanism to restore the data from the USB Storage Device once it has been formatted. • The following steps must be performed on a Windows 10 [Ver. 1511] device or above that is connected to the Health domain for BitLocker encryption to work in our environment. Format the Device • Connect the USB device to the computer and locate the device in the File Explorer. • Right-click the external USB device, select “Format…”, and select the following options: o File system: NTFS o Volume label: *Something easily identifiable* o Format options: [Select] “Quick Format” Activate BitLocker • Locate the device in the File Explorer • Right-click the external USB device, select “Turn on BitLocker”, and select the following options: o Use a password to unlock the drive (This should be automatically selected if you are connected to the Health domain) o Enter a unique PIN, ensure that your new PIN meets the following requirements: .
    [Show full text]
  • Use Your PC for Music
    WINDOWS® GUIDE Use Your PC for Music IN THIS GUIDE Rip and Burn CDs Page 2 Play Music Page 10 Connect an MP3 Player Page 14 Use a Music Service Page 17 What You’ll Need n Windows Media® Player—available as a free download n Recordable or rewritable audio or data CDs n A CD Burner n A Windows Media-enabled media device, such as a Windows Mobile® device or Zune® n A computer running Windows Vista® Windows Guides is a library of easy-to-use guides that show you how to get more from your Windows experience. Share these guides with your friends and family. © 2008 Microsoft. All rights reserved. WINDOWS GUIDE Use Your PC for Music Rip and Burn CDs Nowadays, most of us don’t just own a handful of albums. Music is a way of life. We want to be able to buy, organize and play songs on a whim, and take them with us wherever we go. Well, Windows Media Player takes the work out of building and maintaining a music library, so your only worry is what to listen to first. RIP A CD Ripping, or encoding, your impressive CD library into a digital one with Windows Media Player is quick and simple. There are two things to consider before ripping a CD: n By default, ripped songs are stored as Windows Media Audio (WMA) files. WMA is the best format to use for playing on Windows Media Player, but if for some reason you’d like to choose a different format: 1.
    [Show full text]
  • Refs V2 Cloning, Projecting, and Moving Data
    ReFS v2 Cloning, projecting, and moving data J.R. Tipton [email protected] What are we talking about? • Two technical things we should talk about • Block cloning in ReFS • ReFS data movement & transformation • What I would love to talk about • Super fast storage (non-volatile memory) & file systems • What is hard about adding value in the file system • Technically • Socially/organizationally • Things we actually have to talk about • Context Agenda • ReFS v1 primer • ReFS v2 at a glance • Motivations for v2 • Cloning • Translation • Transformation ReFS v1 primer • Windows allocate-on-write file system • A lot of Windows compatibility • Merkel trees verify metadata integrity • Data integrity verification optional • Online data correction from alternate copies • Online chkdsk (AKA salvage AKA fsck) • Gets corruptions out of the namespace quickly ReFS v2 intro • Available in Windows Server Technical Preview 4 • Efficient, reliable storage for VMs: fast provisioning, fast diff merging, & tiering • Efficient erasure encoding / parity in mainline storage • Write tiering in the data path • Automatically redirect data to fastest tier • Data spills efficiently to slower tiers • Read caching • Block cloning • End-to-end optimizations for virtualization & more • File system-y optimizations • Redo log (for durable AKA O_SYNC/O_DSYNC/FUA/write-through) • B+ tree layout optimizations • Substantially more parallel • “Sparse VDL” – efficient uninitialized data tracking • Efficient handling of 4KB IO Why v2: motivations • Cheaper storage, but not
    [Show full text]
  • Bitlocker Management
    BitLocker Management Vista Full Volume Encryption Feature Overview BitLocker - Full Volume Encryption Vista Enterprise and Ultimate AD management & Key backup options Save recovery password to USB, Printer, or File Share TPM 1.2 – Enables Drive Tampering Protection WMI Interface Vista Tool compatibility MS Boot Loader, System Restore, Disk Management BitLocker Tools Manage-bde.wsf - RTM Add / Remove key protectors Tools from MS Premier Support Site: BitLocker Drive Preparation BitLocker Recovery Password Viewer BitLocker Repair Tool Searches HD for unlinked FVEKs BitLocker Group Policy Computer Config\Admin Templates\Windows Components\BitLocker Drive Encryption AD Key Backup Options Backup Recovery Password to AD Backup Key Package to AD Require Backup to AD before encryption is enabled Backup Recovery Password to Share Recovery Options Require Creation of Recovery Password - Default Require Creation of Recovery Key Package - Default BitLocker Group Policy Advanced Options Allow BitLocker without TPM Startup Key or Pin with TPM Encryption Method AES 128 Diffuser – Default Prevent Memory Overwrite on Restart – Disabled TPM Platform Validation –7 Default Metrics Rom Code MBR Code – not partition table Boot Manager TPM Group Policy Computer Config\Admin Templates\System\ Trusted Platform Module Backup TPM Owner information to AD Require backup 3 settings related to TPM blocked commands BDE Security and Compatibility BitLocker Tips AD Backup only occurs when BDE is enabled Or when TPM is initialized
    [Show full text]