{"id":853,"date":"2011-11-07T17:20:36","date_gmt":"2011-11-07T22:20:36","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=853"},"modified":"2011-11-07T17:20:36","modified_gmt":"2011-11-07T22:20:36","slug":"how-to-encrypt-backups-and-optionally-the-system-disks-on-windows-server-2008-and-sbs-2008-and-windows-vista-too","status":"publish","type":"post","link":"https:\/\/www.wildow.com\/blog\/?p=853","title":{"rendered":"How to encrypt backups and optionally the system disks on Windows Server 2008 and SBS 2008 and Windows Vista too"},"content":{"rendered":"<p><a href=\"http:\/\/uksbsguy.com\/blogs\/doverton\/archive\/2009\/04\/26\/how-to-encrypt-backups-and-optionally-the-system-disks-on-windows-server-2008-and-sbs-2008.aspx\">http:\/\/uksbsguy.com\/blogs\/doverton\/archive\/2009\/04\/26\/how-to-encrypt-backups-and-optionally-the-system-disks-on-windows-server-2008-and-sbs-2008.aspx<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Hi,<\/p>\n<p>someone asked in the forums how if the backups on SBS 2008 and Windows Server 2008 were encrypted and the answer is no, even if the drives being backed up are BitLocker protected (<a href=\"http:\/\/blogs.technet.com\/filecab\/archive\/2008\/04\/29\/complete-pc-backup-vista-and-vista-sp1-windows-server-backup-longhorn-server-and-bitlocker-faq.aspx\" target=\"_blank\">more details here<\/a>).\u00a0 However you can get encrypted backups with a bit of effort.\u00a0 To do this you will need to at least BitLocker enable your removable drives and optionally your system disk.\u00a0 I used the information at<a title=\"http:\/\/blogs.msdn.com\/askdavid\/archive\/2007\/06\/08\/enabling-bitlocker-on-removable-drives-usb-flash-drives-usb-hard-drives.aspx\" href=\"http:\/\/blogs.msdn.com\/askdavid\/archive\/2007\/06\/08\/enabling-bitlocker-on-removable-drives-usb-flash-drives-usb-hard-drives.aspx\">http:\/\/blogs.msdn.com\/askdavid\/archive\/2007\/06\/08\/enabling-bitlocker-on-removable-drives-usb-flash-drives-usb-hard-drives.aspx<\/a>\u00a0as a guide to putting together what I needed to do, so many thanks David Chandra for this.\u00a0 This same process can also be used on Windows Vista<\/p>\n<p><!--more--><\/p>\n<p>There are a couple of snags however and you need to work out which scenario you wish to have (if you have a TPM chip then option 2 &amp; 3 can be replaced with entering a key into the TPM prompt:<\/p>\n<ol>\n<li>encrypt just the backup disks you will need to run a script each time a volume is added back to the system<\/li>\n<li>encrypt the system disk and the backup disks and you will need a USB key or key information to be entered every time you reboot the server<\/li>\n<li>encrypt the system disk and the backup disks, but store the system unlock information unencrypted on the server so you do not have to enter decryption information every time.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Given the choices above the steps are as follows (they build from option 1 through to option 3):<\/p>\n<ol>\n<li>Option 1\n<ol>\n<li>Add BitLocker to the server<\/li>\n<li>Encrypt the Backup Hard Disks<\/li>\n<li>Add an unlock script<\/li>\n<\/ol>\n<\/li>\n<li>Option 2\n<ol>\n<li>Prepare the system disk for BitLocker encryption<\/li>\n<li>Encrypt the system<\/li>\n<\/ol>\n<\/li>\n<li>Option 3\n<ol>\n<li>Store the unlock key on the boot partition for automatic use<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2>\u00a0Option 1 (encrypting the backup disks)<\/h2>\n<p>You will need to repeat the steps below (excluding adding Bitlocker to the system) for each disk you want to encrypt.\u00a0 You can do this to an existing disk or a new disk.<\/p>\n<table width=\"679\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0000FindAddRoles_5F00_0C907C67.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0000 - Find Add Roles\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0000FindAddRoles_5F00_thumb_5F00_64EA003C.png\" alt=\"0000 - Find Add Roles\" width=\"304\" height=\"140\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\"><strong>Add Bitlocker role<\/strong><\/p>\n<p>To start this task we need to add the BitLocker role to SBS 2008.\u00a0 While BitLocker is built into Windows Server 2008 it is not installed.\u00a0 To install it start\u00a0<strong>Server Manager\u00a0<\/strong>from the\u00a0<strong>Start Menu<\/strong>\u00a0and then scroll the right hand window down until you can find<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0001EnableFeatureinSBS2008_5F00_40C4A5AD.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0001 - Enable Feature in SBS 2008\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0001EnableFeatureinSBS2008_5F00_thumb_5F00_20A998F0.png\" alt=\"0001 - Enable Feature in SBS 2008\" width=\"244\" height=\"185\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">In the list of roles that can be added, select the BitLocker role and continue through the wizard until BitLocker is available<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0002givethebackupdrivealetter_5F00_52A1397A.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0002 - give the backup drive a letter\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0002givethebackupdrivealetter_5F00_thumb_5F00_0498DA05.png\" alt=\"0002 - give the backup drive a letter\" width=\"244\" height=\"215\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">To be able to easily BitLocker the drive we need to add a drive letter.\u00a0 Run the command\u00a0<strong>diskmgmt.msc<\/strong>\u00a0to start the Disk Management tool.\u00a0 Find the Backup disk and right click on it and select\u00a0<strong>Change Drive Letter and Paths<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0003assignadriveletterstep1_5F00_32862CBD.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0003 - assign a drive letter - step 1\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0003assignadriveletterstep1_5F00_thumb_5F00_796F4FBA.png\" alt=\"0003 - assign a drive letter - step 1\" width=\"244\" height=\"159\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">You will notice that the disk, which present and used does not have a drive letter, so we need to change this.\u00a0 Press the\u00a0<strong>Add<\/strong>button to add a drive letter that we can easily refer to in the command lines.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0003assignadriveletterstep2_5F00_647DCD47.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0003 - assign a drive letter - step 2\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0003assignadriveletterstep2_5F00_thumb_5F00_126B2000.png\" alt=\"0003 - assign a drive letter - step 2\" width=\"244\" height=\"118\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">Pick the next available drive letter and press OK.\u00a0 In my example the drive letter is &#8220;<strong>E:<\/strong>&#8220;.\u00a0 In all the command lines below replace\u00a0<strong>E:<\/strong>with the right drive letter for your system.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0004getstatusandthenbitlockerbackupdrive_5F00_2B66F045.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0004 - get status and then bitlocker backup drive\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0004getstatusandthenbitlockerbackupdrive_5F00_thumb_5F00_595442FD.png\" alt=\"0004 - get status and then bitlocker backup drive\" width=\"244\" height=\"88\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">Open and administrative Command Prompt from the start menu and check the title bar says\u00a0<strong>Administrator Command Prompt<\/strong>.\u00a0 Check that the disk is ready for encrypting with the command<strong>script manage-bde.wsf -status<\/strong>. Note this has to be run from<strong>\\Windows\\System32<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0005encryptednotekeyinfo_5F00_72501342.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0005 - encrypted - note key info\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0005encryptednotekeyinfo_5F00_thumb_5F00_0B4BE388.png\" alt=\"0005 - encrypted - note key info\" width=\"244\" height=\"163\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">Time to encrypt the disk and save the recovery keys.\u00a0 I&#8217;m going to save them to C:, but they can be saved to any disk in the system except the one being encrypted.<br \/>\nType\u00a0<strong>script manage-bde.wsf -on E: -recoverykey C: -recoverypassword<\/strong>.<br \/>\nYou will see several pieces of information including the disk ID, the file name for the\u00a0<strong><em>recovery key file<\/em><\/strong>\u00a0and the numeric password should you not have these to hand.\u00a0 You will need to make a note of this information, but do NOT store with the drive.<\/p>\n<p>To create an unlock command, enter the command below replacing\u00a0<strong><em>&lt;recovery key file&gt;\u00a0<\/em><\/strong>with the filename from your output.\u00a0 The filename for the command in my example is<strong>c:\\unlock_backup_disk3.cmd<\/strong>\u00a0and you should change it to be appropriate to your system.<br \/>\n<strong>echo cscript c:\\windows\\system32\\manage-bde.wsf -unlock E: -recoverykey\u00a0<em>&lt;recovery key file&gt;<\/em><\/strong>\u00a0<strong>&gt; c:\\unlock_backup_disk3.cmd<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0006encryptedstatusat21and100percent_5F00_39393640.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0006 - encrypted - status at 21 and 100 percent\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0006encryptedstatusat21and100percent_5F00_thumb_5F00_52350685.png\" alt=\"0006 - encrypted - status at 21 and 100 percent\" width=\"244\" height=\"208\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">The disk will now begin encrypting and depending on how much data is stored on it, may take some time.\u00a0 You can check the status with the command\u00a0<strong>cscript c:\\windows\\system32\\manage-bde.wsf -status<\/strong>\u00a0as shows in the screen shot until the disk is 100% encrypted.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"300\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0006removeEdrive_5F00_0022593E.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0006 - remove E drive\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0006removeEdrive_5F00_thumb_5F00_6B30D6CA.png\" alt=\"0006 - remove E drive\" width=\"244\" height=\"160\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"374\">If you intend on encrypting the system disk then you can remove the drive letter.\u00a0 The backup will still work if the drive has a drive letter, but it will now show up in the SBS Console and Computer windows, but should not be modified in any way.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Option 2 &amp; 3 (encrypting the system disk and enabling automatic unlocking of the USB drives)<\/h2>\n<table width=\"676\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"302\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0007downloadthepreptool_5F00_3219F9C8.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0007 - download the prep tool\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0007downloadthepreptool_5F00_thumb_5F00_11FEED0B.png\" alt=\"0007 - download the prep tool\" width=\"237\" height=\"244\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"369\">Download preparation tool from Microsoft at<a title=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?displaylang=en&amp;FamilyID=320b9aa9-47e8-44f9-b8d0-4d7d6a75add0\" href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?displaylang=en&amp;FamilyID=320b9aa9-47e8-44f9-b8d0-4d7d6a75add0\">http:\/\/www.microsoft.com\/downloads\/details.aspx?displaylang=en&amp;FamilyID=320b9aa9-47e8-44f9-b8d0-4d7d6a75add0<\/a>\u00a0and then install the tool.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"305\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0007encryptmaindrive_5F00_2AFABD50.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0007 - encrypt main drive\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0007encryptmaindrive_5F00_thumb_5F00_58E81008.png\" alt=\"0007 - encrypt main drive\" width=\"220\" height=\"244\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"367\">Start the tool from the\u00a0<strong>Start Menu<\/strong>\u00a0&#8211; it is under\u00a0<strong>Accessories<\/strong>,<strong>System Tools<\/strong>,\u00a0<strong>BitLocker<\/strong>\u00a0and is called\u00a0<strong>BitLocker Drive Preparation Tool<\/strong>.<\/p>\n<p>As is always the case when making major changes to a system ensure you have a backup of the system.<\/p>\n<p>Press\u00a0<strong>Continue<\/strong>\u00a0to start the tool.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"307\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0009prepcompleted_5F00_43F68D95.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0009 - prep completed\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0009prepcompleted_5F00_thumb_5F00_1FD13306.png\" alt=\"0009 - prep completed\" width=\"220\" height=\"244\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"365\">The tool will shrink your system drive and create a small S: drive which will contain the boot files.\u00a0 Once it is complete, press<strong>Finish<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"309\">\u00a0<a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0010restart_5F00_0ADFB093.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0010 - restart\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0010restart_5F00_thumb_5F00_38CD034B.png\" alt=\"0010 - restart\" width=\"244\" height=\"106\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"364\">You will need to restart your computer to continue the preparation.\u00a0 Press\u00a0<strong>Restart Now<\/strong>\u00a0to do so.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"310\">\u00a0<a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0012enabled_5F00_23DB80D8.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0012 - enabled\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0012enabled_5F00_thumb_5F00_51C8D390.png\" alt=\"0012 - enabled\" width=\"244\" height=\"185\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"363\">Once you have rebooted and logged back in the tool will continue.\u00a0 Once it is finished, press\u00a0<strong>Close<\/strong>\u00a0to exit the tool.<br \/>\nYour drives are now prepared to be encrypted.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"311\">\u00a0<a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0013startmainOSencryption_5F00_7FB62648.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0013 - start main OS encryption\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0013startmainOSencryption_5F00_thumb_5F00_18B1F68E.png\" alt=\"0013 - start main OS encryption\" width=\"244\" height=\"216\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"362\">To encrypt the system disk enter the command below.\u00a0 I put a recovery key on the backup disk (which is encrypted) and also onto another disk to enable system start up.<\/p>\n<p>For the system to start up it will need an unencrypted file system with the startup key present.\u00a0 You can either chose to put this onto the S: drive which is less secure as removing the boot disk will provide someone with all the encryption keys or if you wish for your system to be more secure you can put this onto a removable USB drive.<br \/>\nIf your only desire was to encrypt the backups and have them automatically available when plugged into the server then this is fine.\u00a0 If you want greater overall security then you should use the removable key method.\u00a0 Note that to reboot the server this will be required, so automatic updates could cause a problem.<br \/>\nLeaving this removable media in the system means that any would-be thief would still have the decryption means.<\/p>\n<p>The command you need is:<br \/>\n<strong>cscript manage-bde.wsf -on C: -recoverykey E: -recoverypassword -startupkey S:<\/p>\n<p>E:<\/strong>\u00a0is the removable media I&#8217;m backing the key up to and\u00a0<strong>S:<\/strong>\u00a0is the system disk.\u00a0 Change S: to the startup usb key you will user to reboot the system with greater security.<\/p>\n<p>Once again, mate a note of the key security information highlighted in the screen shot.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"312\">\u00a0<a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0014enableautounlock_5F00_03C0741B.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0014 - enable auto unlock\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0014enableautounlock_5F00_thumb_5F00_31ADC6D3.png\" alt=\"0014 - enable auto unlock\" width=\"240\" height=\"244\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"361\">You can once again see the progress being made by the encryption by using the\u00a0<strong>cscript manage-bde.wsf -status<\/strong>command.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"313\"><a href=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0015disableandreenablebackup_5F00_5F9B198B.png\"><img loading=\"lazy\" decoding=\"async\" title=\"0015 - disable and re-enable backup\" src=\"http:\/\/davidoverton.com\/cfs-file.ashx\/__key\/CommunityServer.Blogs.Components.WeblogFiles\/doverton\/0015disableandreenablebackup_5F00_thumb_5F00_63A5675D.png\" alt=\"0015 - disable and re-enable backup\" width=\"244\" height=\"171\" border=\"0\" \/><\/a><\/td>\n<td valign=\"top\" width=\"360\">Finally, your SBS backup will no longer function correctly as the S: drive is not included in the backup set, but is a crucial part of the system backup.\u00a0 You will need to\u00a0<strong>Disable Backup<\/strong>\u00a0and re-create it before the backup will work again.<\/p>\n<p>When you are re-creating the backup, when selecting the target device it will claim it is going to format the backup target, but for me it did not and previous backups were still available.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This whole process took a while as I had in total about 100GB to encrypt, between the system disk and backups, but I now have secure backups.<\/p>\n<p>&nbsp;<\/p>\n<p>Thanks<br \/>\nDavid<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/uksbsguy.com\/blogs\/doverton\/archive\/2009\/04\/26\/how-to-encrypt-backups-and-optionally-the-system-disks-on-windows-server-2008-and-sbs-2008.aspx &nbsp; Hi, someone asked in the forums how if the backups on SBS 2008 and Windows Server 2008 were encrypted and the answer is no, even if the drives being backed up are BitLocker protected (more details here).\u00a0 However &#8230; <a class=\"more-link\" href=\"https:\/\/www.wildow.com\/blog\/?p=853\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-853","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=853"}],"version-history":[{"count":2,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/853\/revisions"}],"predecessor-version":[{"id":855,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/853\/revisions\/855"}],"wp:attachment":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}