Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to perform DriveLock quick setup
  • RDP Certificate Issues
    Connecting to the RDP host: Fix the Certificate could not be verified back to the root certificate Mac
  • images 4
    How to set up WatchGuard Log Server Network | Monitoring
  • LOGIN EE Modal View 1 12
    Pleasant User Group Permission and User Access Password Manager
  • Azure Storage 1
    Azure CLI: How To Upload Batch Files to Azure Storage Account AWS/Azure/OpenShift
  • Task Scheduler Errors and Success Codes
    All Task Scheduler Errors and Success Codes Windows Server
  • adfs training
    Post-Deployment of Active Directory Federation Service (ADFS) Windows Server
  • speedtest
    How to set up a self-hosted speed test server on Ubuntu Linux Linux
  • EnableDisableTPMAutoProv
    Waiting for TPM Auto Provisioning: How to Enable or Disable TPM Auto-provisioning Windows

How to perform DriveLock quick setup

Posted on 06/04/202010/09/2023 Christian By Christian No Comments on How to perform DriveLock quick setup
DriveLock quick setup

Encryption is another main feature of DriveLock that can help you secure sensitive information by enforcing encryption when data is copied to removable drives. You can use the DriveLock Full Disk Encryption option to encrypt hard disks, including the system partition, and to perform pre-boot authentication with a single sign-on to Windows. DriveLock can also erase sensitive data permanently and securely by overwriting data multiple times using one of several industry-standard algorithms. Please see the how-to install DriveLock Encryption software (Standalone Installation) and also see how to perform DriveLock quick setup. See more on Important DriveLock components to master. I have broken this installation into Guide into two in order not to have lengthy documentation. Please see the how-to install DriveLock Encryption software (Standalone Installation) and also see DriveLock with a focus on Encryption.

Prerequisites: It is recommended to have the DriveLock Enterprise Service and DriveLock (components) installed or else, this step will not work. 
- Click on The DriveLock QuickSetup Wizard as shown in the image below
DriveLock setup

This will open the DriveLock Setup wizard. Ensure the Server-name is entered correctly and resolvable


– Enter the ports (most times, these are populated automatically).
– Enter the credentials to connect to the server when the server is on another or no domain
– Click on “verify Server”

quick setup guide

As we can see below, the server has been verified correctly
– Since this is a test environment, I will select the Try DriveLock for 30 days.

DriveLock configuration

This will communicate with the server and the license will be applied

DriveLock quick setup

The next step here will be deployed through the DriveLock Enterprise Service using the push installation.
– For this to work, the software packages must be uploaded to DriveLock Enterprise Service as shown below.

Furthermore, Create a default DriveLock policy that will deploy the DriveLock agent as a company policy. This default policy needs to be created now so the agent can retrieve the settings.
– Click on create policy as shown below

This will open the Default company policy – Centrally stored DriveLock Policy as shown below.


– Click on Publish and use by agent
– This will open up a publishing comment window as shown below
– Enter a comment and click on ok.

Additionally, This will let you know with a prompt as shown below that the policy was published and can be used by the agents.
– Click on ok.

Note: Therefore, Ensure the Default company policy – Centrally stored DriveLock Policy window is closed, or else you cannot proceed with the quick setup.

Similarly, Select the Organisation Unit or Active Directory Group and
– Click on next.

Nevertheless, This will ensure the agents are automatically installed on the given Active Directory groups or organization units.

Nonetheless, I will select the Active Directory Organisation Unit
– I will select Employee PC and
– Click on Ok

This will display the Distinguish name this policy will be applied to as shown below.
– Click on Next

In addition, Next, enter the user account and password with administrative permission on the computers to be installed.
– Click on Next

Click on Finish. Moreover, You can optionally click to Launch DriveLock Control Center as shown below.

Note: The DriveLock Control Center (DCC) lets you create dynamic reports and forensic analysis reports from events that were reported by DriveLock Agents data to a central server running the DriveLock Enterprise Service (DES). However, You can use the DCC to monitor the use of mobile drives, devices and data transfers in aggregate or in detail.

I hope you found this blog post helpful. Furthermore, Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:DriveLock, harddrive, Microsoft Windows

Post navigation

Previous Post: How to install a standalone DriveLock Encryption software on Windows
Next Post: How to locate and edit the host file on Windows

Related Posts

  • Complete Guide on TestRail as a Test Management Tool   banner
    Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment
  • encryption 04.05.32
    How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment
  • Set Microsoft Defender AV to Passive mode on a Windows Server
    Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment
  • PrintNightMare
    Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions Security | Vulnerability Scans and Assessment
  • drivelock 1280x720 1
    Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
  • Protech Synology NAS
    Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews

More Related Articles

Complete Guide on TestRail as a Test Management Tool   banner Complete Guide on TestRail as a Test Management Tool Security | Vulnerability Scans and Assessment
encryption 04.05.32 How to Enable BitLocker without Compatible TPM Security | Vulnerability Scans and Assessment
Set Microsoft Defender AV to Passive mode on a Windows Server Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment
PrintNightMare Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions Security | Vulnerability Scans and Assessment
drivelock 1280x720 1 Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
Protech Synology NAS Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • RDP Certificate Issues
    Connecting to the RDP host: Fix the Certificate could not be verified back to the root certificate Mac
  • images 4
    How to set up WatchGuard Log Server Network | Monitoring
  • LOGIN EE Modal View 1 12
    Pleasant User Group Permission and User Access Password Manager
  • Azure Storage 1
    Azure CLI: How To Upload Batch Files to Azure Storage Account AWS/Azure/OpenShift
  • Task Scheduler Errors and Success Codes
    All Task Scheduler Errors and Success Codes Windows Server
  • adfs training
    Post-Deployment of Active Directory Federation Service (ADFS) Windows Server
  • speedtest
    How to set up a self-hosted speed test server on Ubuntu Linux Linux
  • EnableDisableTPMAutoProv
    Waiting for TPM Auto Provisioning: How to Enable or Disable TPM Auto-provisioning Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.