{"id":65906,"date":"2022-05-02T12:00:00","date_gmt":"2022-05-02T16:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/"},"modified":"2026-01-29T14:52:15","modified_gmt":"2026-01-29T19:52:15","slug":"48-igel-weekly-how-to-use-igel-os-drive-encryption","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/","title":{"rendered":"48: IGEL Weekly: How to Use IGEL OS Drive Encryption"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1555814\/episodes\/10541765-igel-weekly-how-to-use-igel-os-drive-encryption?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, manage lost devices, enhance the chain of trust, and deal with legal compliance.\u00a0<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092a\u0948\u091f\u094d\u0930\u093f\u0915 \u091f\u094b\u0928\u0930<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0938\u0947\u092c\u0947\u0938\u094d\u091f\u093f\u092f\u0928 \u092a\u0947\u0930\u0941\u0938\u0948\u091f<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.190 &#8211;&gt; 00:00:09.389<br \/>Andy Whiteside: hi everyone and welcome to episode 48 of idle weekly, this is one of our Community edition podcast with said.<\/p>\n<p>2<br \/>00:00:10.800 &#8211;&gt; 00:00:19.890<br \/>Andy Whiteside: You know one thing I learned going back and listen to the last one that Patrick hosted was it said, I never said, your last name I always kind of pronounce it English wise pretty shots.<\/p>\n<p>3<br \/>00:00:21.030 &#8211;&gt; 00:00:26.460<br \/>Andy Whiteside: say it in French, the way I would say it and i&#8217;ll try to practice it.<\/p>\n<p>4<br \/>00:00:27.450 &#8211;&gt; 00:00:31.680<br \/>Sebastien Perusat: Honestly it&#8217;s extremely Jennifer here but you&#8217;re definitely not the best with pedroza.<\/p>\n<p>5<br \/>00:00:32.010 &#8211;&gt; 00:00:32.880<br \/>Andy Whiteside: The resume.<\/p>\n<p>6<br \/>00:00:33.210 &#8211;&gt; 00:00:33.990<br \/>Sebastien Perusat: ever so who&#8217;s.<\/p>\n<p>7<br \/>00:00:35.520 &#8211;&gt; 00:00:36.180<br \/>Sebastien Perusat: It who&#8217;s up.<\/p>\n<p>8<br \/>00:00:36.540 &#8211;&gt; 00:00:37.350<br \/>Andy Whiteside: hey Russa.<\/p>\n<p>9<br \/>00:00:37.950 &#8211;&gt; 00:00:44.880<br \/>Sebastien Perusat: Think about the root directory Peruvian enzyme like satellite that&#8217;s what season yeah.<\/p>\n<p>10<br \/>00:00:44.970 &#8211;&gt; 00:00:45.990<br \/>Sebastien Perusat: yeah that&#8217;s good.<\/p>\n<p>11<br \/>00:00:46.230 &#8211;&gt; 00:00:47.400<br \/>Andy Whiteside: Well that&#8217;s how I do a pair of.<\/p>\n<p>12<br \/>00:00:47.430 &#8211;&gt; 00:00:48.510<br \/>Andy Whiteside: pair of pair of socks.<\/p>\n<p>13<br \/>00:00:48.600 &#8211;&gt; 00:00:50.220<br \/>Sebastien Perusat: that&#8217;s how i&#8217;ve done in Nice and then.<\/p>\n<p>14<br \/>00:00:50.880 &#8211;&gt; 00:00:57.990<br \/>Andy Whiteside: After we kind of just kind of roll it roll it out very fringe sounding and I was like man, but the most I just call you said because everybody in the ideal world knows.<\/p>\n<p>15<br \/>00:00:58.230 &#8211;&gt; 00:00:58.680<br \/>perfect.<\/p>\n<p>16<br \/>00:01:00.600 &#8211;&gt; 00:01:08.010<br \/>Andy Whiteside: So, Patrick toner is with us on this INTEGRA side, Patrick is one of our solutions architect former employee and knows it inside now it&#8217;s.<\/p>\n<p>17<br \/>00:01:08.670 &#8211;&gt; 00:01:18.570<br \/>Andy Whiteside: kind of our secret weapon whole company is INTEGRA is big I Joe fans, we know a lot about it but patrick&#8217;s are our top secret weapon when it comes to idle related discussions.<\/p>\n<p>18<br \/>00:01:18.960 &#8211;&gt; 00:01:29.790<br \/>Andy Whiteside: Chris isn&#8217;t with us, I think, maybe first one is ever miss but criticism with us he had something else to do day totally understandable heck i&#8217;ve missed any of these things, but we, the show must go on is the idea.<\/p>\n<p>19<br \/>00:01:30.990 &#8211;&gt; 00:01:33.780<br \/>Andy Whiteside: said that little pastry behind you is that a patient on the desk finding.<\/p>\n<p>20<br \/>00:01:34.800 &#8211;&gt; 00:01:35.250<br \/>Sebastien Perusat: What.<\/p>\n<p>21<br \/>00:01:35.550 &#8211;&gt; 00:01:37.200<br \/>Andy Whiteside: they&#8217;re pastry on the desk behind you.<\/p>\n<p>22<br \/>00:01:38.250 &#8211;&gt; 00:01:38.880<br \/>Sebastien Perusat: pastry.<\/p>\n<p>23<br \/>00:01:38.970 &#8211;&gt; 00:01:39.420<br \/>pastry.<\/p>\n<p>24<br \/>00:01:40.680 &#8211;&gt; 00:01:42.120<br \/>Andy Whiteside: Over there over there yeah.<\/p>\n<p>25<br \/>00:01:43.770 &#8211;&gt; 00:01:44.340<br \/>Sebastien Perusat: it&#8217;s a candle.<\/p>\n<p>26<br \/>00:01:44.850 &#8211;&gt; 00:01:45.720<br \/>Sebastien Perusat: candle at holder.<\/p>\n<p>27<br \/>00:01:46.980 &#8211;&gt; 00:01:48.090<br \/>Sebastien Perusat: Is from my wife, I mean.<\/p>\n<p>28<br \/>00:01:49.560 &#8211;&gt; 00:01:51.450<br \/>Sebastien Perusat: For me, as a racing car over there and that&#8217;s.<\/p>\n<p>29<br \/>00:01:52.020 &#8211;&gt; 00:01:56.250<br \/>Andy Whiteside: Obviously yeah i&#8217;m just giving you a hard time i&#8217;m hungry because i&#8217;m trying to say.<\/p>\n<p>30<br \/>00:01:58.770 &#8211;&gt; 00:01:59.250<br \/>Andy Whiteside: alright.<\/p>\n<p>31<br \/>00:01:59.520 &#8211;&gt; 00:02:08.130<br \/>Andy Whiteside: So let&#8217;s see so the topic this week and I literally guess maybe find this funny had to cut Patrick off because said posted the topic and Patrick got all excited and.<\/p>\n<p>32<br \/>00:02:08.430 &#8211;&gt; 00:02:11.460<br \/>Andy Whiteside: got ready to start talking about like, no, no, we didn&#8217;t hit the record button because.<\/p>\n<p>33<br \/>00:02:11.850 &#8211;&gt; 00:02:24.060<br \/>Andy Whiteside: that&#8217;s why we&#8217;re here take great topics that the group comes up with in this case the Community side so quite often has the idea because he&#8217;s been working on it and thinking about it, and so we jumped into it, we jump into it now, but.<\/p>\n<p>34<br \/>00:02:24.720 &#8211;&gt; 00:02:32.760<br \/>Andy Whiteside: We want to do this in front of you guys because it&#8217;s going to come off genuine and honest and real, but the blog which in most of the cases it&#8217;s a blog.<\/p>\n<p>35<br \/>00:02:33.360 &#8211;&gt; 00:02:41.280<br \/>Andy Whiteside: Which is how to use I Joe os disk encryption and it&#8217;s a video set, but together we&#8217;re going to talk through and go over the highlights of it.<\/p>\n<p>36<br \/>00:02:41.490 &#8211;&gt; 00:02:47.580<br \/>Andy Whiteside: And then, if you want to watch it just do what I just said, and you will find it in the ideal Community or just go look and I joke many blogs, but.<\/p>\n<p>37<br \/>00:02:48.240 &#8211;&gt; 00:03:01.080<br \/>Andy Whiteside: said, this is a really good topic for me because I often wonder and i&#8217;m often pleasantly surprised, maybe 100% pleasantly surprised when I start thinking about you know mainstream enterprise.<\/p>\n<p>38<br \/>00:03:01.950 &#8211;&gt; 00:03:07.890<br \/>Andy Whiteside: endpoint operating systems and what they have in them that I gel, and by that I mean windows.<\/p>\n<p>39<br \/>00:03:08.580 &#8211;&gt; 00:03:17.730<br \/>Andy Whiteside: Almost omniscient windows and what I do has done to make sure those features in this case a security feature shows up in the eye gel product in the form of.<\/p>\n<p>40<br \/>00:03:18.150 &#8211;&gt; 00:03:25.020<br \/>Andy Whiteside: idle taking making Linux do the same things which Linux has it in there, without a doubt Nigel brings it to the surface, makes it easy to manage.<\/p>\n<p>41<br \/>00:03:25.350 &#8211;&gt; 00:03:33.090<br \/>Andy Whiteside: And disk encryption for the operating system drive is one of those things i&#8217;ve often wondered, but never asked about so it&#8217;s really good that you&#8217;re bringing this one forward.<\/p>\n<p>42<br \/>00:03:34.620 &#8211;&gt; 00:03:42.000<br \/>Sebastien Perusat: To do so, and by the way, it&#8217;s really hot off the press doctors or it&#8217;s a video, I would say 20 minutes ago, so we&#8217;re just right on time.<\/p>\n<p>43<br \/>00:03:42.390 &#8211;&gt; 00:03:54.990<br \/>Sebastien Perusat: So it&#8217;s a really good tutorial recorded last Thursday or last one, the same because of some interest in their community and asking how to deal with that specific topic so it&#8217;s really quite new and renew, not to say.<\/p>\n<p>44<br \/>00:03:55.320 &#8211;&gt; 00:04:02.160<br \/>Andy Whiteside: So before we jump into the meat of it let&#8217;s go to Patrick first Patrick Why is this important.<\/p>\n<p>45<br \/>00:04:03.360 &#8211;&gt; 00:04:21.030<br \/>Patrick Toner: Well, you know it&#8217;s I think it&#8217;s important for a few reasons, you know we talked about admin passwords I think it was last podcast or the one before you want you want to you know you want to have a layer of security around you know users being able to access things so this obviously.<\/p>\n<p>46<br \/>00:04:21.120 &#8211;&gt; 00:04:24.570<br \/>Patrick Toner: takes it a step further, where you&#8217;re able to set a.<\/p>\n<p>47<br \/>00:04:25.200 &#8211;&gt; 00:04:32.310<br \/>Patrick Toner: password of some sort of encryption on the device itself you don&#8217;t have to worry about you know it says here on the screen actually has a sneaking.<\/p>\n<p>48<br \/>00:04:32.610 &#8211;&gt; 00:04:40.380<br \/>Patrick Toner: Something like a ut pocket go missing well it&#8217;s fully encrypted it&#8217;s got a password set somebody can&#8217;t just walk away with it and then use it, so you know.<\/p>\n<p>49<br \/>00:04:41.040 &#8211;&gt; 00:04:47.220<br \/>Patrick Toner: And I was funny I was about to say that said before the start of this was a feature that was on the roadmap for.<\/p>\n<p>50<br \/>00:04:47.610 &#8211;&gt; 00:04:52.650<br \/>Patrick Toner: quite a while, and then, when I moved over my job as INTEGRA I think was around that time that this.<\/p>\n<p>51<br \/>00:04:53.220 &#8211;&gt; 00:05:04.890<br \/>Patrick Toner: released, so this is going to be kind of new to me this feature I haven&#8217;t had an opportunity to configure this for the customer, so I dig it looks like i&#8217;m i&#8217;m excited to kind of see how this works and and learn from set here.<\/p>\n<p>52<br \/>00:05:05.730 &#8211;&gt; 00:05:20.250<br \/>Andy Whiteside: So, I guess, my comment of does, I just have this that you&#8217;re you know windows mainstream operating system, I guess that&#8217;s timely because it didn&#8217;t but, as with many things you guys recognize needs that need to happen and you put it in the product.<\/p>\n<p>53<br \/>00:05:21.180 &#8211;&gt; 00:05:30.120<br \/>Sebastien Perusat: that&#8217;s what sometimes in the quiet good old German way so between the time where we see a need and stangl implemented, we are thinking about the topic 10,000 times.<\/p>\n<p>54<br \/>00:05:30.480 &#8211;&gt; 00:05:40.440<br \/>Sebastien Perusat: But, finally, the original product, and I must say I was asked a couple of times in enterprise product, especially can use tpm which kind of encryption are using locally.<\/p>\n<p>55<br \/>00:05:40.800 &#8211;&gt; 00:05:48.060<br \/>Sebastien Perusat: Can we encrypt the operating system partition in general, what happened to the user data if the ud pocket gets stolen.<\/p>\n<p>56<br \/>00:05:48.570 &#8211;&gt; 00:05:52.560<br \/>Sebastien Perusat: And all that stuff brought together finally brought that feature coming up.<\/p>\n<p>57<br \/>00:05:53.340 &#8211;&gt; 00:06:01.830<br \/>Sebastien Perusat: I mean it&#8217;s I would say the first version of that feature and i&#8217;m pretty sure we might expect some bigger change in next year&#8217;s regarding that topic because you know, obviously.<\/p>\n<p>58<br \/>00:06:02.280 &#8211;&gt; 00:06:13.860<br \/>Sebastien Perusat: We are moving away from this hardware when there was a little bit of software aspect to a full blown software product wonder and that&#8217;s where I would say, we still have a bit of homework to do.<\/p>\n<p>59<br \/>00:06:14.430 &#8211;&gt; 00:06:24.480<br \/>Sebastien Perusat: What happened to the device gets gets ripped off and or maybe got stolen, how can we wipe that device remotely or that small stuff.<\/p>\n<p>60<br \/>00:06:24.990 &#8211;&gt; 00:06:34.500<br \/>Sebastien Perusat: We are already aware how to do that, we can do that there were specific ways to address this summer to do so that&#8217;s definitely a huge step in the right direction for sure for sure.<\/p>\n<p>61<br \/>00:06:35.850 &#8211;&gt; 00:06:41.520<br \/>Andy Whiteside: Okay, so i&#8217;ll just hit these real quick on the set them the escape corporate identity, I don&#8217;t think I ever.<\/p>\n<p>62<br \/>00:06:41.520 &#8211;&gt; 00:06:41.670<br \/>Sebastien Perusat: Had.<\/p>\n<p>63<br \/>00:06:41.730 &#8211;&gt; 00:06:49.290<br \/>Andy Whiteside: yeah that we&#8217;re just now active directory hiding those logins last devices, like a ut pocket or physical device, but those ud pockets right I.<\/p>\n<p>64<br \/>00:06:49.590 &#8211;&gt; 00:06:58.530<br \/>Andy Whiteside: I like the concept I don&#8217;t like the idea somebody could just take it, and do, maybe something with me keep in mind, I chose a read only operating system for the most part there&#8217;s not a lot of data on it.<\/p>\n<p>65<br \/>00:06:58.920 &#8211;&gt; 00:07:04.890<br \/>Andy Whiteside: But for some organizations, this is a security requirement that is a checkbox and if you don&#8217;t have it, you can&#8217;t play along.<\/p>\n<p>66<br \/>00:07:05.550 &#8211;&gt; 00:07:13.680<br \/>Andy Whiteside: extraction of local data just talking about interaction with the local os enhance chain of trust and the last one, maybe, most importantly, from a.<\/p>\n<p>67<br \/>00:07:14.610 &#8211;&gt; 00:07:23.100<br \/>Andy Whiteside: From a security team perspective and maybe from a cyber insurance perspective compliance and that last one is becoming more and more common right if you can&#8217;t.<\/p>\n<p>68<br \/>00:07:23.370 &#8211;&gt; 00:07:29.400<br \/>Andy Whiteside: check all those cyber security boxes, then you can&#8217;t get insurance, you know, without insurance you can&#8217;t stay in business.<\/p>\n<p>69<br \/>00:07:31.590 &#8211;&gt; 00:07:31.890<br \/>So.<\/p>\n<p>70<br \/>00:07:33.330 &#8211;&gt; 00:07:39.630<br \/>Andy Whiteside: So, so you may not know the answer this question how often is an enhancement like this, something that.<\/p>\n<p>71<br \/>00:07:40.230 &#8211;&gt; 00:07:54.000<br \/>Andy Whiteside: You guys bring up and the team in Germany he puts into the product at some point, and how often is it that a big customer says, like you, but I can&#8217;t use you unless you do this, and the latter is the one that drives the drives the feature coming to market.<\/p>\n<p>72<br \/>00:07:54.810 &#8211;&gt; 00:08:01.770<br \/>Sebastien Perusat: So the most honest answer I could give us, it depends on the size of the project know size of the customer.<\/p>\n<p>73<br \/>00:08:02.370 &#8211;&gt; 00:08:17.070<br \/>Sebastien Perusat: If the huge amount of licenses will be sort I don&#8217;t know 1000 less license and one step will will consider more or less every feature questions saying we will implement it or implement them in general, but we will definitely try to do whatever we can.<\/p>\n<p>74<br \/>00:08:18.150 &#8211;&gt; 00:08:27.570<br \/>Sebastien Perusat: On the other hand, if we stay realistic, and we know that the amount of work, we have to put into the development platform is really limited that the.<\/p>\n<p>75<br \/>00:08:28.290 &#8211;&gt; 00:08:34.530<br \/>Sebastien Perusat: impact on the market is high, we can do that, even without a feature request and that&#8217;s where the power of community.<\/p>\n<p>76<br \/>00:08:35.010 &#8211;&gt; 00:08:43.110<br \/>Sebastien Perusat: is coming up, we have a tool there, which is called nodes where we can propose features which is not a feature request process.<\/p>\n<p>77<br \/>00:08:43.470 &#8211;&gt; 00:08:48.210<br \/>Sebastien Perusat: But people can say hey this future would be cool and people can upload and download that.<\/p>\n<p>78<br \/>00:08:48.720 &#8211;&gt; 00:08:58.050<br \/>Sebastien Perusat: And that&#8217;s also an approach, where we are getting feedback from the market and see okay this feature is extremely needed and coming back to your questions device encryption like an example.<\/p>\n<p>79<br \/>00:08:58.530 &#8211;&gt; 00:09:12.000<br \/>Sebastien Perusat: came from myrtle at the press projects, whether it local encryption was mandatory there was no way around, and I must say that that the discussion that we have and it gets Patrick had.<\/p>\n<p>80<br \/>00:09:12.630 &#8211;&gt; 00:09:22.410<br \/>Sebastien Perusat: 10 times is what about antivirus locally, what about encryption locally and that&#8217;s a discussion which is quite difficult to to bring up because we&#8217;re still.<\/p>\n<p>81<br \/>00:09:23.040 &#8211;&gt; 00:09:29.160<br \/>Sebastien Perusat: An edge operating system, but we have also the ability to store local data So where are the difference between.<\/p>\n<p>82<br \/>00:09:29.550 &#8211;&gt; 00:09:45.030<br \/>Sebastien Perusat: A standard workstation and I think an operating system that&#8217;s a move, where we are let&#8217;s say going through the last five to eight years and that&#8217;s one of the aspects where i&#8217;m saying we are becoming an operating system windows and the management platform opposite and.<\/p>\n<p>83<br \/>00:09:46.050 &#8211;&gt; 00:09:52.230<br \/>Andy Whiteside: that&#8217;s and that&#8217;s good that I gel is customer friendly and under get understands that and to be quite frank.<\/p>\n<p>84<br \/>00:09:52.620 &#8211;&gt; 00:09:59.190<br \/>Andy Whiteside: When you compare microsoft&#8217;s development of their operating system, the idea, you can be much more agile and nimble.<\/p>\n<p>85<br \/>00:10:00.060 &#8211;&gt; 00:10:14.580<br \/>Andy Whiteside: I would say the same thing about like a Dell wyse and HP and others too, I mean you know you guys are big with the features, you need, but still a small enough company that can understand customer and vendor and bar partnerships yeah.<\/p>\n<p>86<br \/>00:10:15.870 &#8211;&gt; 00:10:17.430<br \/>Andy Whiteside: Alright, so let&#8217;s kind of walk through this.<\/p>\n<p>87<br \/>00:10:18.570 &#8211;&gt; 00:10:26.820<br \/>Andy Whiteside: said we start off talking about the need and i&#8217;m going to fast for this, so I can stop it when I need to what&#8217;s next in the conversation in the video.<\/p>\n<p>88<br \/>00:10:27.810 &#8211;&gt; 00:10:36.750<br \/>Sebastien Perusat: So next steps that were occurring is speaking about the general approach, how to deal with the the the feature itself.<\/p>\n<p>89<br \/>00:10:37.140 &#8211;&gt; 00:10:44.580<br \/>Sebastien Perusat: What is needed, so that&#8217;s where we are going through the process of speaking of the configuration method we have.<\/p>\n<p>90<br \/>00:10:45.060 &#8211;&gt; 00:10:54.840<br \/>Sebastien Perusat: So we have the encryption method which is like everything that we&#8217;re doing on the agile as operating platform, we are starting and the agile us, so the news amendments which, which is.<\/p>\n<p>91<br \/>00:10:55.410 &#8211;&gt; 00:10:59.370<br \/>Sebastien Perusat: The management platform for all the configuration that you want to deploy to the endpoint.<\/p>\n<p>92<br \/>00:10:59.910 &#8211;&gt; 00:11:08.580<br \/>Sebastien Perusat: And they are you could say it&#8217;s basically just wanted to check boxes that you need so quite a profile and then you have obviously that&#8217;s something that I.<\/p>\n<p>93<br \/>00:11:09.180 &#8211;&gt; 00:11:13.800<br \/>Sebastien Perusat: don&#8217;t mention every time that we have a podcast but I will just mention it here again.<\/p>\n<p>94<br \/>00:11:14.250 &#8211;&gt; 00:11:25.530<br \/>Sebastien Perusat: If you don&#8217;t see that feature in a profile, it might be that the profile you&#8217;re looking at as an older firmware or maybe you your message not able to handle that so we always been about the latest public versions.<\/p>\n<p>95<br \/>00:11:26.370 &#8211;&gt; 00:11:34.170<br \/>Sebastien Perusat: So from there, we have on a security already the ability to deliver administrator passports to use math and medication.<\/p>\n<p>96<br \/>00:11:34.560 &#8211;&gt; 00:11:43.770<br \/>Sebastien Perusat: But now, since this feature was introduced, there was a specific money which is called device encryption and that&#8217;s where i&#8217;m leading you the audience to how to configure it.<\/p>\n<p>97<br \/>00:11:46.050 &#8211;&gt; 00:11:54.510<br \/>Sebastien Perusat: that&#8217;s quite easy, I would say, so there was not a big amount of configuration that that you need to contact, if you do that.<\/p>\n<p>98<br \/>00:11:54.930 &#8211;&gt; 00:12:10.440<br \/>Sebastien Perusat: But there was still gives you some some hand so first of all the standards value that is pretty fun is called keep that doesn&#8217;t tell you that much, but what say that it will just keep the local configuration of the end part when it comes to improve.<\/p>\n<p>99<br \/>00:12:11.700 &#8211;&gt; 00:12:14.100<br \/>Sebastien Perusat: So, in a standard case disabled.<\/p>\n<p>100<br \/>00:12:15.510 &#8211;&gt; 00:12:26.730<br \/>Sebastien Perusat: or as a user enable it locally or site admin it was keep it activate but that&#8217;s obviously not what you want, you want to deploy that setting to order device and forth your user to use encryption.<\/p>\n<p>101<br \/>00:12:27.810 &#8211;&gt; 00:12:32.640<br \/>Andy Whiteside: conversation you&#8217;re going to talk about okay so keep means it&#8217;s already there, and you want to make sure it stays there.<\/p>\n<p>102<br \/>00:12:32.880 &#8211;&gt; 00:12:40.500<br \/>Andy Whiteside: activate means it wasn&#8217;t encrypted now you&#8217;re going to encrypt it at some point, this will you talk through you know what to be expected on the input in terms of how much.<\/p>\n<p>103<br \/>00:12:40.740 &#8211;&gt; 00:12:48.000<br \/>Andy Whiteside: overhead and time that this might take, is it is it happen in front of user does it happen in the background, just want to weave that in as you&#8217;re talking through this.<\/p>\n<p>104<br \/>00:12:48.540 &#8211;&gt; 00:12:57.630<br \/>Sebastien Perusat: sure that something was, I will you will you might see on the on the video in a bit later on, but yes so as soon as we deploy that setting to an endpoint.<\/p>\n<p>105<br \/>00:12:58.110 &#8211;&gt; 00:13:06.990<br \/>Sebastien Perusat: The endpoint would show up little pop up window, where the users asked to enter one time and then confirm a specific password.<\/p>\n<p>106<br \/>00:13:07.560 &#8211;&gt; 00:13:17.910<br \/>Sebastien Perusat: This battle has to match obviously some criteria that you are delivering in your profile saying that specific special characters allowed or not allowed.<\/p>\n<p>107<br \/>00:13:18.780 &#8211;&gt; 00:13:27.510<br \/>Sebastien Perusat: was saying that you must have a specific land or specific number of characters or numbers is something that was set up in the profile.<\/p>\n<p>108<br \/>00:13:28.110 &#8211;&gt; 00:13:37.410<br \/>Sebastien Perusat: And as soon as you create a profile and that profile to endpoints there will be a pop up so that&#8217;s something to consider, by the way, if you push the sitting right now already devices.<\/p>\n<p>109<br \/>00:13:37.950 &#8211;&gt; 00:13:47.400<br \/>Sebastien Perusat: Without saying on next reboot there will be a small pop up, which is called device encryption and from there on the user can say whatever he likes of whatever she likes.<\/p>\n<p>110<br \/>00:13:48.330 &#8211;&gt; 00:14:03.780<br \/>Sebastien Perusat: And like on most password configuration dialogues, you will also have a path of strength bar, which is changing from red to yellow to green saying that your password is strong enough or not to Mexico tears.<\/p>\n<p>111<br \/>00:14:04.830 &#8211;&gt; 00:14:19.920<br \/>Sebastien Perusat: And as soon as you click apply on that window the encryption step will start we do recommend obviously to not reboot the device during that time to power, the devaluing the time because then you development really got wrapped up.<\/p>\n<p>112<br \/>00:14:21.090 &#8211;&gt; 00:14:30.600<br \/>Sebastien Perusat: But if you stay there, almost hardware have seen it takes from two minutes to 15 or 20 minutes but not more than that.<\/p>\n<p>113<br \/>00:14:31.950 &#8211;&gt; 00:14:41.400<br \/>Sebastien Perusat: And since we are considering Nigel operating system we&#8217;re not speaking about an operating system which is 30 gigabyte big or 40 and hopefully it will stay at that stage, like that.<\/p>\n<p>114<br \/>00:14:42.120 &#8211;&gt; 00:14:52.080<br \/>Sebastien Perusat: But you have between I don&#8217;t know one dot five to four gigabyte approximately of disk space, you are using and the standout.<\/p>\n<p>115<br \/>00:14:52.740 &#8211;&gt; 00:14:58.590<br \/>Sebastien Perusat: petition size that we&#8217;re using is something between two and four gigabytes so it&#8217;s pretty fast for the equipment, sir.<\/p>\n<p>116<br \/>00:14:59.160 &#8211;&gt; 00:15:14.520<br \/>Sebastien Perusat: and obviously we didn&#8217;t mention it, but we&#8217;re not speaking about a full disk encryption, but only about an operating system partition so we&#8217;re not encrypting 500 gigabytes of data of sectors, but we need what we are needing for the operating system.<\/p>\n<p>117<br \/>00:15:18.300 &#8211;&gt; 00:15:21.540<br \/>Sebastien Perusat: that&#8217;s where we are on this on this configuration window.<\/p>\n<p>118<br \/>00:15:22.770 &#8211;&gt; 00:15:28.320<br \/>Sebastien Perusat: Obviously, like on every agile step, everything is described so you will never have something which is.<\/p>\n<p>119<br \/>00:15:28.920 &#8211;&gt; 00:15:46.470<br \/>Sebastien Perusat: disappearing or going to the background, you always have the ability to see where it happens, and if it takes too long you&#8217;re allowed to start a session and working para I just would have an eye on if you&#8217;re using a laptop that you have enough power supply to do that, during the step.<\/p>\n<p>120<br \/>00:15:46.980 &#8211;&gt; 00:15:53.550<br \/>Andy Whiteside: hey okay good really good point about the laptop so if it died in the middle of it that&#8217;d be really bad day I assume right yeah.<\/p>\n<p>121<br \/>00:15:54.240 &#8211;&gt; 00:16:00.930<br \/>Sebastien Perusat: I mean it&#8217;s Angeles right, so you can refresh it quite easily but still something that you have to keep in mind right.<\/p>\n<p>122<br \/>00:16:01.590 &#8211;&gt; 00:16:02.790<br \/>Andy Whiteside: And as far as.<\/p>\n<p>123<br \/>00:16:04.890 &#8211;&gt; 00:16:17.550<br \/>Andy Whiteside: All the passwords setting in Patrick I do want to chime in here, you probably have a lot of comments or questions is it up to the person sitting in front of screen to set that password or can you set that password systematically from the US.<\/p>\n<p>124<br \/>00:16:18.480 &#8211;&gt; 00:16:26.100<br \/>Sebastien Perusat: For the moment, it&#8217;s only user based, so the user has to set the password and that&#8217;s what I mentioned at the beginning.<\/p>\n<p>125<br \/>00:16:26.760 &#8211;&gt; 00:16:40.200<br \/>Sebastien Perusat: it&#8217;s a first step of that product right, so we might expect some changes like setting up a general password or maybe having a password which can be reset by the user them if you want to change encryption, but for the moment it&#8217;s really user based.<\/p>\n<p>126<br \/>00:16:41.220 &#8211;&gt; 00:16:50.700<br \/>Patrick Toner: yeah that was that was the one question I get it was already here to my head from customers, what if my employee forgets the password so it&#8217;s a total refresh at that point.<\/p>\n<p>127<br \/>00:16:51.990 &#8211;&gt; 00:16:53.520<br \/>Sebastien Perusat: that&#8217;s what we do recommend right now.<\/p>\n<p>128<br \/>00:16:53.550 &#8211;&gt; 00:16:54.480<br \/>Sebastien Perusat: yeah so.<\/p>\n<p>129<br \/>00:16:55.800 &#8211;&gt; 00:16:56.430<br \/>Andy Whiteside: That would be.<\/p>\n<p>130<br \/>00:16:56.460 &#8211;&gt; 00:16:58.140<br \/>Andy Whiteside: So guys have a question, so if you.<\/p>\n<p>131<br \/>00:16:58.140 &#8211;&gt; 00:17:09.480<br \/>Andy Whiteside: have to reset that they can said you alluded to it a minute ago if you had to re image it because it&#8217;s encrypted that&#8217;s okay we&#8217;re just going to overwrite the encryption at that point, or is it just unusable.<\/p>\n<p>132<br \/>00:17:10.500 &#8211;&gt; 00:17:25.530<br \/>Sebastien Perusat: No, no, you can definitely flesh it and that&#8217;s why I had to turn the situation in the last month as well happened, where the customer could recover the device obviously you don&#8217;t have to migrate, the old settings that gets it a specific.<\/p>\n<p>133<br \/>00:17:26.940 &#8211;&gt; 00:17:40.500<br \/>Sebastien Perusat: Specific switch that you have to switch on or off if you have to keep on or discard them and the os creator process of reimagine of the device but that&#8217;s something which was pretty funny.<\/p>\n<p>134<br \/>00:17:44.310 &#8211;&gt; 00:17:53.340<br \/>Patrick Toner: said, this is a, this is a one to one device type of configuration right, you know so customers who have shared devices, this is not not in play, unless they would.<\/p>\n<p>135<br \/>00:17:53.370 &#8211;&gt; 00:17:53.850<br \/>Sebastien Perusat: Get you know.<\/p>\n<p>136<br \/>00:17:54.000 &#8211;&gt; 00:17:55.860<br \/>Patrick Toner: The sharing of password amongst the team doesn&#8217;t.<\/p>\n<p>137<br \/>00:17:57.630 &#8211;&gt; 00:17:58.320<br \/>Sebastien Perusat: make practical.<\/p>\n<p>138<br \/>00:17:59.250 &#8211;&gt; 00:18:00.990<br \/>Sebastien Perusat: or write it on the poster yep exactly.<\/p>\n<p>139<br \/>00:18:01.140 &#8211;&gt; 00:18:02.160<br \/>Patrick Toner: yeah posted oh no.<\/p>\n<p>140<br \/>00:18:03.240 &#8211;&gt; 00:18:04.710<br \/>Patrick Toner: that&#8217;s where security really comes in.<\/p>\n<p>141<br \/>00:18:04.740 &#8211;&gt; 00:18:09.780<br \/>Andy Whiteside: Post, it notes yeah so guys have a question, this is version one, I understand that.<\/p>\n<p>142<br \/>00:18:10.650 &#8211;&gt; 00:18:23.880<br \/>Andy Whiteside: You know, in the world of say windows, the sun this disk encryption stuff kind of happens under the scenes and and the user users plural, in this case wouldn&#8217;t know it is that, where this is headed, or is this the intent of the product, the way it is today.<\/p>\n<p>143<br \/>00:18:26.070 &#8211;&gt; 00:18:35.070<br \/>Sebastien Perusat: If you asked me just myself, I would say it&#8217;s not the final version since we&#8217;re missing specific steps lexi remote recovery like.<\/p>\n<p>144<br \/>00:18:35.700 &#8211;&gt; 00:18:46.710<br \/>Sebastien Perusat: What happened with device just the APP is so somewhere under the desk and never restarted down the the device went over to another employee I couldn&#8217;t remember password.<\/p>\n<p>145<br \/>00:18:47.370 &#8211;&gt; 00:18:56.910<br \/>Sebastien Perusat: that&#8217;s something that&#8217;s the steps way i&#8217;m saying as soon as we are speaking about the upcoming versions of the US and was what might expect some when this year.<\/p>\n<p>146<br \/>00:18:57.660 &#8211;&gt; 00:19:07.560<br \/>Sebastien Perusat: will make definitely expected there you change that behavior that&#8217;s what i&#8217;ve been told, so, for the first step for the was 11 burden and you&#8217;re my six or 10 that&#8217;s what we that&#8217;s why we are.<\/p>\n<p>147<br \/>00:19:08.220 &#8211;&gt; 00:19:24.000<br \/>Sebastien Perusat: At from all the windows or MAC os based administrators for might already have used that for their fighter boat or a bit locker please expect that it will get smarter than it is at the moment, definitely yeah okay.<\/p>\n<p>148<br \/>00:19:24.330 &#8211;&gt; 00:19:33.270<br \/>Andy Whiteside: One some cases, because I just so security, and this is just a matter of checking boxes, but I also get it hey um so I maybe I missed it but let&#8217;s say you&#8217;re using.<\/p>\n<p>149<br \/>00:19:34.350 &#8211;&gt; 00:19:40.770<br \/>Andy Whiteside: workplace okay so you&#8217;re going to be it&#8217;s going to come up you&#8217;re gonna have to enter that password now and then you then would enter your.<\/p>\n<p>150<br \/>00:19:41.700 &#8211;&gt; 00:19:52.050<br \/>Andy Whiteside: username and password let&#8217;s say your ad you don&#8217;t log in as an end user, that would be a second currently login at that point or your citrix login would be a second login something would be a second one.<\/p>\n<p>151<br \/>00:19:52.770 &#8211;&gt; 00:20:04.500<br \/>Sebastien Perusat: Okay, yes, that the short answer and I would add, so the main goal is because that&#8217;s what I have been asked, on my projects from from customers.<\/p>\n<p>152<br \/>00:20:05.010 &#8211;&gt; 00:20:16.080<br \/>Sebastien Perusat: hey we&#8217;re deploying corporate identity files like a wallpaper like a specific session name so citrix I can enjoy the depth is already holding company data because yeah they are used to.<\/p>\n<p>153<br \/>00:20:16.710 &#8211;&gt; 00:20:23.310<br \/>Sebastien Perusat: or they&#8217;re having specific customer logos already in the start menu, and whatever just think of regarding corporate identity.<\/p>\n<p>154<br \/>00:20:23.940 &#8211;&gt; 00:20:36.030<br \/>Sebastien Perusat: yeah that&#8217;s, the first thing that we&#8217;re trying to deal with you boot up a device that you find someone on the street, I mean speaking about you, the package don&#8217;t find laptop that often on the street, but if you wouldn&#8217;t be the pocket on another PC.<\/p>\n<p>155<br \/>00:20:36.420 &#8211;&gt; 00:20:40.590<br \/>Sebastien Perusat: You will not want to see the customer name, you will see his wallpaper So if you want to tag it.<\/p>\n<p>156<br \/>00:20:40.680 &#8211;&gt; 00:20:52.380<br \/>Sebastien Perusat: This this environment you&#8217;re already a first information that they&#8217;re using citrix the name of the maybe the names of the customer, because you say the last username and the citrix workspace the plan might be.<\/p>\n<p>157<br \/>00:20:52.830 &#8211;&gt; 00:21:01.740<br \/>Sebastien Perusat: And then you can go wider that&#8217;s what we&#8217;re trying to avoid with the pre boot authentication that&#8217;s my best.<\/p>\n<p>158<br \/>00:21:02.970 &#8211;&gt; 00:21:09.360<br \/>Sebastien Perusat: name for the developing country because it pre boot authentication covers it a bit better than the courtroom LP.<\/p>\n<p>159<br \/>00:21:09.960 &#8211;&gt; 00:21:20.700<br \/>Sebastien Perusat: Because when you boot up the device what we activating today in the in the tutorial and on the on the podcast is private authentication which was then decrypt your desk.<\/p>\n<p>160<br \/>00:21:21.120 &#8211;&gt; 00:21:30.270<br \/>Sebastien Perusat: So what decrypt your petition to be more precise, so you have before you even see something you would get a device encryption is active window.<\/p>\n<p>161<br \/>00:21:30.540 &#8211;&gt; 00:21:46.170<br \/>Sebastien Perusat: where you have to enter your password you don&#8217;t have to use the user just a path of that&#8217;s really fun and then from there as soon as we hit enter or the little arrow it will decrypt and start the rest of the operating system to the desktop alters the active directory login screen.<\/p>\n<p>162<br \/>00:21:48.180 &#8211;&gt; 00:21:48.690<br \/>Patrick Toner: instead.<\/p>\n<p>163<br \/>00:21:49.800 &#8211;&gt; 00:21:55.860<br \/>Patrick Toner: The device boots up so every every time you do a reboot or start the device after the first time.<\/p>\n<p>164<br \/>00:21:56.400 &#8211;&gt; 00:21:57.360<br \/>Sebastien Perusat: User we&#8217;re going to.<\/p>\n<p>165<br \/>00:21:58.470 &#8211;&gt; 00:22:02.460<br \/>Sebastien Perusat: reboot it will cover the reboot and the the culprit both of them.<\/p>\n<p>166<br \/>00:22:03.120 &#8211;&gt; 00:22:03.510<br \/>Patrick Toner: got it.<\/p>\n<p>167<br \/>00:22:04.620 &#8211;&gt; 00:22:11.370<br \/>Sebastien Perusat: So yeah we can call it, maybe to secure sometimes but that&#8217;s not the case at the moment.<\/p>\n<p>168<br \/>00:22:12.810 &#8211;&gt; 00:22:24.270<br \/>Patrick Toner: Are you guys seeing you know and i&#8217;m just not sure about this, are you guys seeing requirements in you know gdpr over in Europe at this or like you know, is it more customer driven what you know what have you seen with that.<\/p>\n<p>169<br \/>00:22:25.710 &#8211;&gt; 00:22:27.420<br \/>Sebastien Perusat: At the moment, mostly customer room.<\/p>\n<p>170<br \/>00:22:28.560 &#8211;&gt; 00:22:45.720<br \/>Sebastien Perusat: Especially if we, I mean because it because must work out where wasn&#8217;t worth were mostly military and banks and insurance has to be it yeah to be even more precise that was it three kind of verticals where this requirement was not an option, but was mandatory.<\/p>\n<p>171<br \/>00:22:47.010 &#8211;&gt; 00:22:56.580<br \/>Sebastien Perusat: And their first goal was encryption and then we told them all the agile story and said okay make sense for us, but still, we have to rely on encryption.<\/p>\n<p>172<br \/>00:22:57.030 &#8211;&gt; 00:23:04.620<br \/>Sebastien Perusat: and on something which will office obfuscate so hide any kind of company data if the device got found.<\/p>\n<p>173<br \/>00:23:05.130 &#8211;&gt; 00:23:13.530<br \/>Sebastien Perusat: And that&#8217;s where this small window, which is not really good looking but it doesn&#8217;t have to a bit locker pin entry window isn&#8217;t looking good either.<\/p>\n<p>174<br \/>00:23:14.100 &#8211;&gt; 00:23:24.900<br \/>Sebastien Perusat: or firewall so you don&#8217;t even have an agile over there you just have good luck, the the password field, and then, which is pretty cool, I must say.<\/p>\n<p>175<br \/>00:23:25.380 &#8211;&gt; 00:23:33.120<br \/>Sebastien Perusat: A failed login attempts windows showing up so that&#8217;s something we didn&#8217;t mention to know, but, as already mentioned in the video to.<\/p>\n<p>176<br \/>00:23:33.570 &#8211;&gt; 00:23:45.210<br \/>Sebastien Perusat: If you enter the password one, two or three times again wrongly, it will increase accountable, so you may be already have that on your rental rate or ios smart smartphone or.<\/p>\n<p>177<br \/>00:23:46.170 &#8211;&gt; 00:23:54.630<br \/>Sebastien Perusat: Bad well if you enter your password to often it will delays, an x Ray would add even more than X sweater etc so that&#8217;s something that we already covered there too.<\/p>\n<p>178<br \/>00:23:55.650 &#8211;&gt; 00:24:01.680<br \/>Sebastien Perusat: And just because I made that mistake on a bit locker in the early days.<\/p>\n<p>179<br \/>00:24:02.700 &#8211;&gt; 00:24:14.910<br \/>Sebastien Perusat: bit locker is at least it wasn&#8217;t that time what tested it on American layout so I had not a pin but we pass a full the bit locker and the puzzle that was containing some some specific characters.<\/p>\n<p>180<br \/>00:24:15.690 &#8211;&gt; 00:24:19.320<br \/>Sebastien Perusat: And it was just locked out because I didn&#8217;t thought about these American layer<\/p>\n<p>181<br \/>00:24:19.950 &#8211;&gt; 00:24:26.610<br \/>Sebastien Perusat: that&#8217;s not the case here the agile operating system is such an intelligent, I must say that you have already.<\/p>\n<p>182<br \/>00:24:27.030 &#8211;&gt; 00:24:33.720<br \/>Sebastien Perusat: on the screen and drop down menu, where you can choose every keyboard layout that&#8217;s in our operating system.<\/p>\n<p>183<br \/>00:24:34.260 &#8211;&gt; 00:24:44.460<br \/>Sebastien Perusat: No matter if it was configured in a profile or not that&#8217;s not the case, just call everything, because you might connect you, with your pocket to the device, where I don&#8217;t know Chinese that keyboard isn&#8217;t.<\/p>\n<p>184<br \/>00:24:45.030 &#8211;&gt; 00:24:52.860<br \/>Sebastien Perusat: Connected okay training might not be the best a better limitless a DNS or Swedish of Canadian layout.<\/p>\n<p>185<br \/>00:24:53.880 &#8211;&gt; 00:25:04.620<br \/>Sebastien Perusat: And you might fail because you don&#8217;t have your typical characters that&#8217;s something that we covered and then you might ask what about touchscreens it&#8217;s all there too, so you&#8217;ve already have the ability to open.<\/p>\n<p>186<br \/>00:25:06.120 &#8211;&gt; 00:25:08.850<br \/>Sebastien Perusat: A touch screen keyboard there so that&#8217;s pretty cool.<\/p>\n<p>187<br \/>00:25:11.700 &#8211;&gt; 00:25:19.470<br \/>Patrick Toner: So you know we talked earlier said about it&#8217;s not a fit everywhere, like one to one you know it&#8217;s got to be a one to one device so.<\/p>\n<p>188<br \/>00:25:20.040 &#8211;&gt; 00:25:29.880<br \/>Patrick Toner: What would your recommendation be for you know, an organization, where they say Okay, we want our work from home users that use this feature, but all of our on site thin clients.<\/p>\n<p>189<br \/>00:25:30.870 &#8211;&gt; 00:25:39.600<br \/>Patrick Toner: You know they&#8217;re they&#8217;re going to be just you know, no, no, no, local encryption they&#8217;re sharing maybe they&#8217;re doing hoteling they&#8217;re sharing devices what&#8217;s your what&#8217;s your suggestion there.<\/p>\n<p>190<br \/>00:25:42.000 &#8211;&gt; 00:25:49.380<br \/>Sebastien Perusat: Of that&#8217;s a tough topic obviously i&#8217;m which kind of specific use case way to think about that well in that case.<\/p>\n<p>191<br \/>00:25:49.800 &#8211;&gt; 00:25:58.020<br \/>Patrick Toner: Well, you know i&#8217;m thinking like, if you so I guess, if you so this is set by profile right, so you could you could in theory separate this out.<\/p>\n<p>192<br \/>00:25:59.220 &#8211;&gt; 00:26:07.470<br \/>Patrick Toner: You know by directory right So if you have worked from home user let&#8217;s say 200 work from home users, you could just in only implement this for those hundred correct.<\/p>\n<p>193<br \/>00:26:07.800 &#8211;&gt; 00:26:08.760<br \/>Sebastien Perusat: yeah absolutely.<\/p>\n<p>194<br \/>00:26:09.210 &#8211;&gt; 00:26:09.870<br \/>\u092c\u093f\u0932\u094d\u0915\u0941\u0932\u0964<\/p>\n<p>195<br \/>00:26:11.460 &#8211;&gt; 00:26:15.150<br \/>Sebastien Perusat: that&#8217;s if some someone might be interesting that approach.<\/p>\n<p>196<br \/>00:26:15.750 &#8211;&gt; 00:26:26.460<br \/>Sebastien Perusat: We have a couple of features inside of the agile management platform which are called default territory routes, it just one example, but we have a couple of other products that might be the most common one.<\/p>\n<p>197<br \/>00:26:26.940 &#8211;&gt; 00:26:33.600<br \/>Sebastien Perusat: And thing as soon as a teddy worker is studying his device when I speak about the device and continue studying with device.<\/p>\n<p>198<br \/>00:26:34.050 &#8211;&gt; 00:26:50.460<br \/>Sebastien Perusat: It will usually connect via the ice so data cloud gateway which creates a connection between Alto devices and your internal your mess measurement system so from there, you can say if the devices started the other nice EG don&#8217;t put that don&#8217;t put that.<\/p>\n<p>199<br \/>00:26:51.480 &#8211;&gt; 00:27:00.840<br \/>Sebastien Perusat: Specific policy on or, if you want to you can activate it there are saying, if the devices holding a public IP address and do that.<\/p>\n<p>200<br \/>00:27:02.100 &#8211;&gt; 00:27:03.750<br \/>Sebastien Perusat: So yes, got it.<\/p>\n<p>201<br \/>00:27:05.610 &#8211;&gt; 00:27:17.190<br \/>Andy Whiteside: He said how likely and capable, is it How likely is it somebody want to unencrypted How likely is it how capable, is it of unencrypted.<\/p>\n<p>202<br \/>00:27:19.980 &#8211;&gt; 00:27:31.740<br \/>Sebastien Perusat: will not say that it&#8217;s impossible because nothing is impossible in the in the in the IT world out it&#8217;s highly improbable for standouts persons like you and I.<\/p>\n<p>203<br \/>00:27:32.670 &#8211;&gt; 00:27:42.960<br \/>Sebastien Perusat: If you&#8217;re using extremely powerful in via decryption systems which are used by intelligence etc by army intelligence and.<\/p>\n<p>204<br \/>00:27:43.530 &#8211;&gt; 00:27:49.950<br \/>Sebastien Perusat: Also, obviously it can take a few days and then you&#8217;re you&#8217;re out, but we still have to think about the aspect.<\/p>\n<p>205<br \/>00:27:50.520 &#8211;&gt; 00:27:58.590<br \/>Sebastien Perusat: What would be the use case the person would have them an operating system, which is still secure what&#8217;s the password the password our.<\/p>\n<p>206<br \/>00:27:59.040 &#8211;&gt; 00:28:06.360<br \/>Sebastien Perusat: hash are encrypted where the configuration and data is not stored locally, but still on your citrix farm so.<\/p>\n<p>207<br \/>00:28:07.260 &#8211;&gt; 00:28:23.820<br \/>Sebastien Perusat: Even there if someone would really want to do that in mind, definitely, but I would say that the amount of time and effort that he needs to deliver to do that is not in relation to what you would get but it&#8217;s it would definitely be a toy, yes, so it is not impossible, but highly improbable.<\/p>\n<p>208<br \/>00:28:24.180 &#8211;&gt; 00:28:39.930<br \/>Andy Whiteside: And the reality of is probably going to want to just factory reset or not reset but actually related to the device any way to overcome that yeah exactly he quick quick one off you guys should make this wallpaper you have here part of the idol os built in wallpapers.<\/p>\n<p>209<br \/>00:28:41.580 &#8211;&gt; 00:28:42.360<br \/>Yes, pretty sweet.<\/p>\n<p>210<br \/>00:28:43.500 &#8211;&gt; 00:28:57.120<br \/>Andy Whiteside: Baby i&#8217;ll describe it for people who may be listening at some point it&#8217;s a it&#8217;s a some Vikings it looks like a cartoonish Vikings throwing a windows and apple and other operating systems off the side of a cliff because they just don&#8217;t need them anymore.<\/p>\n<p>211<br \/>00:28:58.440 &#8211;&gt; 00:29:05.850<br \/>Sebastien Perusat: If it was one of the first word papers I use an unknown seven years ago, something that when I had to.<\/p>\n<p>212<br \/>00:29:06.240 &#8211;&gt; 00:29:11.220<br \/>Sebastien Perusat: Do Internet trainings and, since then, if I don&#8217;t have to do something with a specific partner.<\/p>\n<p>213<br \/>00:29:11.610 &#8211;&gt; 00:29:20.340<br \/>Sebastien Perusat: We have to put them the logo etc in my my room and i&#8217;m using just something more fun because they&#8217;re mostly speaking to people to achieve folks to administrators.<\/p>\n<p>214<br \/>00:29:21.090 &#8211;&gt; 00:29:28.680<br \/>Sebastien Perusat: Will alike in such kind of jokes and mostly are not obviously some really windows or MAC related so it&#8217;s always fun to see that.<\/p>\n<p>215<br \/>00:29:31.380 &#8211;&gt; 00:29:34.080<br \/>Andy Whiteside: yeah if you would share that with us that&#8217;d be awesome I love, now that one so.<\/p>\n<p>216<br \/>00:29:34.140 &#8211;&gt; 00:29:34.770<br \/>Sebastien Perusat: Oh yeah sure.<\/p>\n<p>217<br \/>00:29:35.310 &#8211;&gt; 00:29:40.290<br \/>Andy Whiteside: you&#8217;re in a section of the video called debugging what, why are you here, why are you doing this.<\/p>\n<p>218<br \/>00:29:42.180 &#8211;&gt; 00:29:57.120<br \/>Sebastien Perusat: Just for one simple reason every every encryption step hold also some some risks, nothing will happen on an encryption without having a small piece of yeah of danger.<\/p>\n<p>219<br \/>00:29:57.870 &#8211;&gt; 00:30:02.970<br \/>Sebastien Perusat: So the first thing that I would like to mention to every listener is.<\/p>\n<p>220<br \/>00:30:03.840 &#8211;&gt; 00:30:21.900<br \/>Sebastien Perusat: There already all the use cases where it&#8217;s extremely important to have time and date set properly the our nighttime protocols sort of caught NTP there are plenty of them from certificate verification code communication is a G, so the agile cloud gateway configuration and use it.<\/p>\n<p>221<br \/>00:30:22.920 &#8211;&gt; 00:30:33.300<br \/>Sebastien Perusat: But never forget that you also have a virus, or you a fee where you have also time and it&#8217;s a locally and I wouldn&#8217;t say it&#8217;s happened 10,000 times that will be alive.<\/p>\n<p>222<br \/>00:30:34.170 &#8211;&gt; 00:30:39.240<br \/>Sebastien Perusat: But I had one time situation, the Community where, after setting the password.<\/p>\n<p>223<br \/>00:30:39.780 &#8211;&gt; 00:30:50.550<br \/>Sebastien Perusat: correctly, the device couldn&#8217;t be decrypted because of time and date on the bias was just wrapped up, so it was I don&#8217;t know something like 2004 and February, when wasn&#8217;t July so.<\/p>\n<p>224<br \/>00:30:50.910 &#8211;&gt; 00:31:01.050<br \/>Sebastien Perusat: Nothing was was good, we suspect that the symbols battery was done and wasn&#8217;t able to hold the the actual data and configurations justice fiction.<\/p>\n<p>225<br \/>00:31:01.500 &#8211;&gt; 00:31:11.880<br \/>Sebastien Perusat: So that&#8217;s something that i&#8217;m trying to teach in the video which kind of debugging steps, I will try to follow as someone is asking what can I do if it fails, I mean.<\/p>\n<p>226<br \/>00:31:12.360 &#8211;&gt; 00:31:24.990<br \/>Sebastien Perusat: you&#8217;re not in most cases, you might not recover the device, we have a few of them, we might work, but in most cases, you would do you would just know where it happened, and we are with issues coming from.<\/p>\n<p>227<br \/>00:31:27.030 &#8211;&gt; 00:31:34.530<br \/>Andy Whiteside: Okay, so anything specific that call out in the motions of watching walking through it now.<\/p>\n<p>228<br \/>00:31:36.630 &#8211;&gt; 00:31:39.600<br \/>Andy Whiteside: you&#8217;re going to factory default you&#8217;re just nuking it basically right.<\/p>\n<p>229<br \/>00:31:40.470 &#8211;&gt; 00:31:48.810<br \/>Sebastien Perusat: Right, so we have already the ability to check in the pre boot authentication method which steps and done before it fades.<\/p>\n<p>230<br \/>00:31:49.290 &#8211;&gt; 00:32:01.140<br \/>Sebastien Perusat: So that&#8217;s why already covered another tutorial with you guys the variable Bu which is giving where the algebra system is just showing a black screen or showing a logo.<\/p>\n<p>231<br \/>00:32:01.680 &#8211;&gt; 00:32:18.300<br \/>Sebastien Perusat: Their stuff happening behind the scenes, obviously, because it&#8217;s not just showing a black display we are showing something in the background and to get that specific kind of information you have to move beyond the actual operating system boot menu, which was the key escape on your keyboard.<\/p>\n<p>232<br \/>00:32:19.320 &#8211;&gt; 00:32:26.010<br \/>Sebastien Perusat: There we had to start into the Bible school and you would see if something before the passwords critics showing up.<\/p>\n<p>233<br \/>00:32:26.850 &#8211;&gt; 00:32:34.920<br \/>Sebastien Perusat: tells you something I mean there was no real recommendation that I have just check that maybe you will find something that leads to an error.<\/p>\n<p>234<br \/>00:32:35.400 &#8211;&gt; 00:32:46.470<br \/>Sebastien Perusat: And from there, you can also enter the password from the command line perspective, so it has a little bit to better understand where the device hangs or even if, after the encryption.<\/p>\n<p>235<br \/>00:32:47.490 &#8211;&gt; 00:32:56.400<br \/>Sebastien Perusat: password entry the device will not vote that might also be the case that&#8217;s where the verbose but would definitely help you to find the root cause of the issue.<\/p>\n<p>236<br \/>00:32:58.710 &#8211;&gt; 00:33:05.490<br \/>Patrick Toner: You got me thinking to hear said so and so you&#8217;re saying on a kind of a similar on a related but different note.<\/p>\n<p>237<br \/>00:33:05.880 &#8211;&gt; 00:33:17.640<br \/>Patrick Toner: If somebody wants to reset this to factory default what happens first do they get prompted with the Bu decryption first, or are they able to reset to factory default and then, if if they get to their doesn&#8217;t prompt them for that password.<\/p>\n<p>238<br \/>00:33:18.780 &#8211;&gt; 00:33:26.790<br \/>Sebastien Perusat: Unfortunately, you cannot reset it to factory defaults on there, so you will still be asked for the for the pre boot authentication password.<\/p>\n<p>239<br \/>00:33:27.390 &#8211;&gt; 00:33:30.990<br \/>Sebastien Perusat: The broken one is the first thing I tried to be honest, because I just wanted to know.<\/p>\n<p>240<br \/>00:33:31.020 &#8211;&gt; 00:33:43.230<br \/>Sebastien Perusat: How, how does it work and then case even the recovery path of that you can use for the administrator password international presence will not work so that&#8217;s where we have to rely on the refreshing.<\/p>\n<p>241<br \/>00:33:44.610 &#8211;&gt; 00:33:49.770<br \/>Patrick Toner: So that&#8217;s that&#8217;s that&#8217;s booting to an OSC crater stick yep and totally flashing okay.<\/p>\n<p>242<br \/>00:33:50.070 &#8211;&gt; 00:33:50.400<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>243<br \/>00:33:54.840 &#8211;&gt; 00:33:57.840<br \/>Andy Whiteside: I said what&#8217;s left in the video see if I go here.<\/p>\n<p>244<br \/>00:33:58.770 &#8211;&gt; 00:34:06.030<br \/>Sebastien Perusat: We are almost almost done, he said, one thing because we spoke all the time about activating the future, but what about these activating it.<\/p>\n<p>245<br \/>00:34:07.800 &#8211;&gt; 00:34:11.340<br \/>Sebastien Perusat: You might have a situation where you tested it and you want to disable the setting.<\/p>\n<p>246<br \/>00:34:12.600 &#8211;&gt; 00:34:14.550<br \/>Sebastien Perusat: So just removing the profile.<\/p>\n<p>247<br \/>00:34:15.600 &#8211;&gt; 00:34:28.320<br \/>Sebastien Perusat: would not be enough for the reason that we mentioned the beginning of the story, the standard setting is usually keep So even if you created a profile somewhere where you activate the standard setting it will just keep rockin and cookie.<\/p>\n<p>248<br \/>00:34:29.490 &#8211;&gt; 00:34:34.320<br \/>Sebastien Perusat: So my recommendation is low locally or insert a profile saying.<\/p>\n<p>249<br \/>00:34:35.400 &#8211;&gt; 00:34:43.920<br \/>Sebastien Perusat: Where you activate as a feature where you said, instead of keep activate and deactivate save a sense of progress of the endpoint.<\/p>\n<p>250<br \/>00:34:44.430 &#8211;&gt; 00:34:54.240<br \/>Sebastien Perusat: And the same manner, like the pop up showed up for the encryption password entry the user will get a notification saying hey you want to decrypt.<\/p>\n<p>251<br \/>00:34:54.630 &#8211;&gt; 00:35:10.050<br \/>Sebastien Perusat: Your brain aneurysm no big deal does enter your password to be sure that you&#8217;re allowed to Bam and then the decryption process is starting and then the same recommendations are applying be careful to not pull off your device or just breaking it off, and then you are good.<\/p>\n<p>252<br \/>00:35:12.210 &#8211;&gt; 00:35:16.080<br \/>Andy Whiteside: And Kim between the two you smart guys tell me a situation where you think.<\/p>\n<p>253<br \/>00:35:17.190 &#8211;&gt; 00:35:19.380<br \/>Andy Whiteside: That would ever happen, where they actually tried has decrypted.<\/p>\n<p>254<br \/>00:35:23.130 &#8211;&gt; 00:35:23.940<br \/>Sebastien Perusat: Whatever if you first.<\/p>\n<p>255<br \/>00:35:25.050 &#8211;&gt; 00:35:27.510<br \/>Patrick Toner: say no, you know you never know right there&#8217;s customers out there.<\/p>\n<p>256<br \/>00:35:27.510 &#8211;&gt; 00:35:35.760<br \/>Patrick Toner: They you know, maybe the user start complaining they don&#8217;t like doing this, every time and they say you know what we&#8217;re going to just remove the setting and.<\/p>\n<p>257<br \/>00:35:36.540 &#8211;&gt; 00:35:46.650<br \/>Patrick Toner: You know so to do that, it sounds like said they would have to push the profile to deactivate and each user would have to enter the password one final time correct gotta.<\/p>\n<p>258<br \/>00:35:47.220 &#8211;&gt; 00:35:48.930<br \/>Patrick Toner: I could see that I can see that by now for sure.<\/p>\n<p>259<br \/>00:35:49.920 &#8211;&gt; 00:35:52.980<br \/>Andy Whiteside: It maybe they got through their security audit now they want to unencrypted those.<\/p>\n<p>260<br \/>00:35:54.480 &#8211;&gt; 00:35:56.940<br \/>Patrick Toner: They checked the box now now they gonna.<\/p>\n<p>261<br \/>00:35:57.120 &#8211;&gt; 00:35:59.850<br \/>Andy Whiteside: We laugh, but I am certain that&#8217;s happened sometimes.<\/p>\n<p>262<br \/>00:35:59.910 &#8211;&gt; 00:36:00.540<br \/>Sebastien Perusat: That might be.<\/p>\n<p>263<br \/>00:36:01.440 &#8211;&gt; 00:36:09.180<br \/>Sebastien Perusat: Alright, I would say what what does add maybe some performance issues that you&#8217;re facing maybe and you want to be sure that it&#8217;s not related to.<\/p>\n<p>264<br \/>00:36:09.630 &#8211;&gt; 00:36:18.060<br \/>Sebastien Perusat: Local encryption process which is taking, which is not the case, but not taking too much performance I don&#8217;t know that might be also one approach so yeah.<\/p>\n<p>265<br \/>00:36:18.930 &#8211;&gt; 00:36:19.530<br \/>Sebastien Perusat: You should.<\/p>\n<p>266<br \/>00:36:19.920 &#8211;&gt; 00:36:30.210<br \/>Andy Whiteside: You I think you talked about the performance required to encrypt it is there a performance degradation that we should expect for using an encrypted system.<\/p>\n<p>267<br \/>00:36:32.430 &#8211;&gt; 00:36:50.580<br \/>Sebastien Perusat: that&#8217;s a really good question, I must say that I didn&#8217;t notice anything but i&#8217;m mostly working in virtual environments even my you discern but it&#8217;s still quite powerful device I didn&#8217;t seen something like that, if you ask me just myself just my my stomach feeling.<\/p>\n<p>268<br \/>00:36:51.660 &#8211;&gt; 00:37:03.030<br \/>Sebastien Perusat: If you&#8217;re using the odd to have the actual ut to I would maybe avoid to you that there just because the device are already quite thin in terms of performance.<\/p>\n<p>269<br \/>00:37:03.600 &#8211;&gt; 00:37:12.570<br \/>Sebastien Perusat: And if you&#8217;re using any kind of unified communication immunizations the device is already at 100% cpu and Ram usage not exactly what most cases.<\/p>\n<p>270<br \/>00:37:13.110 &#8211;&gt; 00:37:21.810<br \/>Sebastien Perusat: So that&#8217;s something that wouldn&#8217;t do that, since the device encryption mostly hits OSC or you the pocket devices.<\/p>\n<p>271<br \/>00:37:22.260 &#8211;&gt; 00:37:34.110<br \/>Sebastien Perusat: I must say that nearly every device which is a standard laptop shouldn&#8217;t shouldn&#8217;t see any kind of have to have degradation, but that&#8217;s a good question that I count on that 100% at the moment.<\/p>\n<p>272<br \/>00:37:34.710 &#8211;&gt; 00:37:38.730<br \/>Andy Whiteside: In theory, there has to be some, but whether it&#8217;s noticeable about human being.<\/p>\n<p>273<br \/>00:37:39.030 &#8211;&gt; 00:37:51.480<br \/>Andy Whiteside: yeah that&#8217;s the question, especially in a scenario where you&#8217;re maybe connecting to a citrix vmware Microsoft and you have this middle layer which is really absorbing most of the heavy lifting you probably shouldn&#8217;t even knows.<\/p>\n<p>274<br \/>00:37:52.110 &#8211;&gt; 00:37:53.010<br \/>Sebastien Perusat: yeah I agree.<\/p>\n<p>275<br \/>00:37:54.210 &#8211;&gt; 00:37:57.030<br \/>Andy Whiteside: Patrick any a take on that one.<\/p>\n<p>276<br \/>00:37:57.270 &#8211;&gt; 00:38:02.130<br \/>Patrick Toner: yeah I agree, I mean I was thinking you know, in theory, you should have more of a.<\/p>\n<p>277<br \/>00:38:03.510 &#8211;&gt; 00:38:09.660<br \/>Patrick Toner: You know degradation in performance if it&#8217;s a fat client right and if you&#8217;re if you&#8217;re doing all of your data is local your workloads are local.<\/p>\n<p>278<br \/>00:38:11.280 &#8211;&gt; 00:38:24.570<br \/>Patrick Toner: yeah i&#8217;d imagine you&#8217;re you know you&#8217;re going to see it more there, but because I just connecting the Center so it&#8217;s connecting to vmware you know add, whatever the workload is being done somewhere else it&#8217;s really just kind of streaming that experience to you yeah.<\/p>\n<p>279<br \/>00:38:25.170 &#8211;&gt; 00:38:30.900<br \/>Andy Whiteside: yeah I mean it&#8217;s an asynchronous solution there is impact on the endpoint side, whether it&#8217;s noticeable.<\/p>\n<p>280<br \/>00:38:32.460 &#8211;&gt; 00:38:33.390<br \/>Andy Whiteside: don&#8217;t know Probably not.<\/p>\n<p>281<br \/>00:38:34.740 &#8211;&gt; 00:38:45.090<br \/>Andy Whiteside: supposed to be using a machine to begin with, for using that 18 year old device it every once in a while someone will try to convert aka me improve it still works, you might notice it then.<\/p>\n<p>282<br \/>00:38:47.400 &#8211;&gt; 00:38:55.950<br \/>Andy Whiteside: and going back to the some of the original comments it&#8217;s read only to begin with, it has very little data local To begin with, you know don&#8217;t just turn it on because you can.<\/p>\n<p>283<br \/>00:38:57.120 &#8211;&gt; 00:39:01.860<br \/>Andy Whiteside: Consider not turning it on unless you need to turn it on yeah yeah.<\/p>\n<p>284<br \/>00:39:02.130 &#8211;&gt; 00:39:02.820<br \/>Sebastien Perusat: he&#8217;s a tight.<\/p>\n<p>285<br \/>00:39:03.390 &#8211;&gt; 00:39:20.880<br \/>Andy Whiteside: guys that&#8217;s kind of a wrap I appreciate you joining and helping with this topic always good so been extremely thankful that you show up every time with something timely and important to cover it&#8217;s makes my life easy and makes the podcast relevant.<\/p>\n<p>286<br \/>00:39:21.690 &#8211;&gt; 00:39:22.530<br \/>Sebastien Perusat: My pleasure guys.<\/p>\n<p>287<br \/>00:39:23.940 &#8211;&gt; 00:39:25.470<br \/>Andy Whiteside: With that will wrap it up, have a good week.<\/p>\n<p>288<br \/>00:39:26.580 &#8211;&gt; 00:39:26.730<br \/>Sebastien Perusat: You.<\/p>\n<p>289<br \/>00:39:26.850 &#8211;&gt; 00:39:27.180<br \/>Sebastien Perusat: guys.<\/p>\n<p>290<br \/>00:39:27.210 &#8211;&gt; 00:39:28.290<br \/>you&#8217;re going to see you soon.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, manage lost devices, enhance the chain &hellip;<\/p>","protected":false},"author":7,"featured_media":65861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-65906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>48: IGEL Weekly: Using IGEL OS Drive Encryption<\/title>\n<meta name=\"description\" content=\"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"48: IGEL Weekly: Using IGEL OS Drive Encryption\" \/>\n<meta property=\"og:description\" content=\"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-02T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T19:52:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"37 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"48: IGEL Weekly: How to Use IGEL OS Drive Encryption\",\"datePublished\":\"2022-05-02T16:00:00+00:00\",\"dateModified\":\"2026-01-29T19:52:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/\"},\"wordCount\":8295,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/\",\"name\":\"48: IGEL Weekly: Using IGEL OS Drive Encryption\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"datePublished\":\"2022-05-02T16:00:00+00:00\",\"dateModified\":\"2026-01-29T19:52:15+00:00\",\"description\":\"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/48-igel-weekly-how-to-use-igel-os-drive-encryption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"48: IGEL Weekly: How to Use IGEL OS Drive Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"48: IGEL Weekly: Using IGEL OS Drive Encryption","description":"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/","og_locale":"hi_IN","og_type":"article","og_title":"48: IGEL Weekly: Using IGEL OS Drive Encryption","og_description":"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.","og_url":"https:\/\/xentegra.com\/hi\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-05-02T16:00:00+00:00","article_modified_time":"2026-01-29T19:52:15+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"37 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"48: IGEL Weekly: How to Use IGEL OS Drive Encryption","datePublished":"2022-05-02T16:00:00+00:00","dateModified":"2026-01-29T19:52:15+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/"},"wordCount":8295,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/","url":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/","name":"48: IGEL Weekly: Using IGEL OS Drive Encryption","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","datePublished":"2022-05-02T16:00:00+00:00","dateModified":"2026-01-29T19:52:15+00:00","description":"IGEL\u2019s Sebastian Perusat teaches you to use IGEL OS drive encryption. You will learn how to obfuscate the corporate identity, hide AD login info, and more.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/48-igel-weekly-how-to-use-igel-os-drive-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"48: IGEL Weekly: How to Use IGEL OS Drive Encryption"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65906"}],"version-history":[{"count":1759,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65906\/revisions"}],"predecessor-version":[{"id":716319,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65906\/revisions\/716319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65861"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}