We use Bit locker here at our ORG and it is pretty easy to implement. Definitely look into MDOP to get MBAM to help your HDesk get the key or you can simply use AD to hold the key for you. If you do decide to use Bit locker, keep in mind the following steps.
1) Use a solution provided by your OEM to automate the BIOS steps needed. Dell and HP has this currently but Panasonic does not. Set a BIOS Password Turn on TPM Activate TPM 2) OWN TPM 3) Turn on Bit locker Good to go. If your OEM for your workstations does not have a solution to change BIOS parameters then Step 1 in the above example requires the technician or someone else to manually access the BIOS and set these manually which becomes a question of risk vs reward. From: [email protected] [mailto:[email protected]] On Behalf Of Linkey, Mike Sent: Tuesday, June 18, 2013 7:55 AM To: [email protected] Subject: [mssms] RE: Disk Encryption We do exactly that. We use Bitlocker and MBAM 2.0. If a user messes up their pc, the Help Desk can get the key for them. From: [email protected] [mailto:[email protected]] On Behalf Of Kevin Johnston Sent: Monday, June 17, 2013 9:32 PM To: '[email protected]' Subject: [mssms] RE: Disk Encryption Actually we do have SA. It just took them this long to realize that they need to encrypt data. We currently use WDS/MDT to do our images. I never understood why they went with Win 7 Pro and not enterprise on the machines (done before my time). Mistakes made by the past affect the future right :) But if going to Ent is a possible solution (only currently encrypting laptops) then they may still decide to do that. I figured bitlocker would be a suggestion, I just don't know how reliable and manageable it is. Also it is possible we will be going to Win 8 at some point too (I don't make any decisions, I don't wear a suit) From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Jason Sandys Sent: Monday, June 17, 2013 9:37 PM To: [email protected]<mailto:[email protected]> Subject: [mssms] RE: Disk Encryption Good luck with that. The only full-disk encryption that plays well with OSD and MDT is ... surprise, Bitlocker - which of course your org cannot use because (being blunt here) your org was too cheap to actually buy SA and is now ending up paying even more in the long run because it saved them money in the short run. Sorry, more of rant not direct at you personally, just to short-sighted (worthless) MBAs. J From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Kevin Johnston Sent: Monday, June 17, 2013 4:36 PM To: '[email protected]' Subject: [mssms] Disk Encryption Was wondering if anyone deploys disk encryption along with their deployments? We are looking into this, and just getting a feel for some of the players. Needs to be manageable and I would like to see something that is easy to deploy, maybe something that allows us to encrypt after an image (I guess kinda like bitlocker) but I am not sure how powerful it is. Our machines are solely Windows 7 Pro x64 machines. Anyone have any recommendations or suggestions? Thanks, Kevin Johnston ________________________________ CONFIDENTIALITY NOTICE: This email message and any attachments hereto are intended only for use by the addressee(s) named herein and may contain information which is legally privileged, confidential and/or exempt from disclosure under applicable law. If you are not the intended recipient, or an authorized representative of the intended recipient, of this email message, you are hereby notified that any review, dissemination, distribution, copying, or use (including any reliance thereon) of this email message, and/or any attachment hereto, is strictly prohibited. Although this transmission and any attachments are believed to be free of any virus or other defect that might affect any computer system into which it is received and opened, it is the responsibility of the recipient to ensure that it is free from virus or other defect and no responsibility is accepted by the sending company, its subsidiaries and affiliates, as applicable, for any loss or damage arising in any way from its use. If you have received this email message in error, please immediately notify the sender by return email and permanently delete from your system, the original and any copies of this email and any attachments hereto and any printout hereof. Unauthorized interception of this email is a violation of federal criminal law.

