Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to perform DriveLock quick setup

How to perform DriveLock quick setup

Posted on 06/04/202010/09/2023 Christian By Christian No Comments on How to perform DriveLock quick setup
DriveLock quick setup

Encryption is another main feature of DriveLock that can help you secure sensitive information by enforcing encryption when data is copied to removable drives. You can use the DriveLock Full Disk Encryption option to encrypt hard disks, including the system partition, and to perform pre-boot authentication with a single sign-on to Windows. DriveLock can also erase sensitive data permanently and securely by overwriting data multiple times using one of several industry-standard algorithms. Please see the how-to install DriveLock Encryption software (Standalone Installation) and also see how to perform DriveLock quick setup. See more on Important DriveLock components to master. I have broken this installation into Guide into two in order not to have lengthy documentation. Please see the how-to install DriveLock Encryption software (Standalone Installation) and also see DriveLock with a focus on Encryption.

Prerequisites: It is recommended to have the DriveLock Enterprise Service and DriveLock (components) installed or else, this step will not work. 
- Click on The DriveLock QuickSetup Wizard as shown in the image below
DriveLock setup

This will open the DriveLock Setup wizard. Ensure the Server-name is entered correctly and resolvable


– Enter the ports (most times, these are populated automatically).
– Enter the credentials to connect to the server when the server is on another or no domain
– Click on “verify Server”

quick setup guide

As we can see below, the server has been verified correctly
– Since this is a test environment, I will select the Try DriveLock for 30 days.

DriveLock configuration

This will communicate with the server and the license will be applied

DriveLock quick setup

The next step here will be deployed through the DriveLock Enterprise Service using the push installation.
– For this to work, the software packages must be uploaded to DriveLock Enterprise Service as shown below.

Furthermore, Create a default DriveLock policy that will deploy the DriveLock agent as a company policy. This default policy needs to be created now so the agent can retrieve the settings.
– Click on create policy as shown below

This will open the Default company policy – Centrally stored DriveLock Policy as shown below.


– Click on Publish and use by agent
– This will open up a publishing comment window as shown below
– Enter a comment and click on ok.

Additionally, This will let you know with a prompt as shown below that the policy was published and can be used by the agents.
– Click on ok.

Note: Therefore, Ensure the Default company policy – Centrally stored DriveLock Policy window is closed, or else you cannot proceed with the quick setup.

Similarly, Select the Organisation Unit or Active Directory Group and
– Click on next.

Nevertheless, This will ensure the agents are automatically installed on the given Active Directory groups or organization units.

Nonetheless, I will select the Active Directory Organisation Unit
– I will select Employee PC and
– Click on Ok

This will display the Distinguish name this policy will be applied to as shown below.
– Click on Next

In addition, Next, enter the user account and password with administrative permission on the computers to be installed.
– Click on Next

Click on Finish. Moreover, You can optionally click to Launch DriveLock Control Center as shown below.

Note: The DriveLock Control Center (DCC) lets you create dynamic reports and forensic analysis reports from events that were reported by DriveLock Agents data to a central server running the DriveLock Enterprise Service (DES). However, You can use the DCC to monitor the use of mobile drives, devices and data transfers in aggregate or in detail.

I hope you found this blog post helpful. Furthermore, Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:DriveLock, harddrive, Microsoft Windows

Post navigation

Previous Post: How to install a standalone DriveLock Encryption software on Windows
Next Post: How to locate and edit the host file on Windows

Related Posts

  • Feature image LSA
    How to configure additional LSA Protection Security | Vulnerability Scans and Assessment
  • drivelock 1280x720 1
    The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
  • updates
    Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability Security | Vulnerability Scans and Assessment
  • ePO PIA Tool
    Fixes to Trellix ePolicy Orchestrator Installation Errors Security | Vulnerability Scans and Assessment
  • DUE Deligence vs Due Care
    Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
  • VMware Aria
    VMSA-2022-0026: An arbitrary file read vulnerability in VMware Aria Operations Security | Vulnerability Scans and Assessment

More Related Articles

Feature image LSA How to configure additional LSA Protection Security | Vulnerability Scans and Assessment
drivelock 1280x720 1 The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
updates Out-of-Band Security Update for PrintNightmare: Patch released for Windows Print Spooler Remote Code Execution Vulnerability Security | Vulnerability Scans and Assessment
ePO PIA Tool Fixes to Trellix ePolicy Orchestrator Installation Errors Security | Vulnerability Scans and Assessment
DUE Deligence vs Due Care Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
VMware Aria VMSA-2022-0026: An arbitrary file read vulnerability in VMware Aria Operations Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • windows 10 creators update wallpaper
    Run or Edit and Delete Tasks via Windows Task Scheduler Windows
  • find my device banner
    How to Enable Find My Device on Windows 11 Windows
  • Step to migrate from microsft SQl to PostgreSQL
    Migrate Veeam Configuration Database to PostgreSQL Server Backup
  • Auto Update Upgrade issues
    Fix Microsoft Office Showing “Upgrade Required” in AutoUpdate JIRA|Confluence|Apps
  • Featured Image Windows Security
    How to protect your Windows PC from potentially unwanted applications Security | Vulnerability Scans and Assessment
  • dns
    How to setup a cache-only DNS server Linux
  • linux tux minimalism 4k 42 2560x1700 1 1
    Warning useradd: the home directory already exists. Not copying any file from skel director into it Linux
  • Fix Boot Failed UEFI SCSI Device on HyperV
    How to Fix Boot Failed UEFI SCSI Device on HyperV Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,814 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.