There is already an extensive Wiki site managed by campus ITS to provide assistance to all users (TSCs, students, faculty, staff) with information on encryption policy and how to encrypt systems with UT Austin Approved Encryption Methods
...
For additional questions or assistance, please contact ECE-IT at help@ece.utexas.edu
Encryption Guidelines
If this is your Operating System... | Use this encryption solution... |
---|---|
Windows Operating Systems | Approved Encryption Solution |
Windows |
11 | Not officially released but TPM will be required to run Windows 11 |
Windows 10 Pro/Enterprise | BitLocker with TPM (preferred) or without TPM (pre-boot authentication-legacy systems only) |
Windows |
8.1 | BitLocker with TPM |
If the laptop is University-owned, upgrade to Windows 7 Enterprise*
If the laptop is personally-owned, upgrade to Windows 7 Ultimate (campus computer store)
When upgraded, use BitLocker with TPM (preferred)
If the laptop is University-owned, upgrade to Windows 7/8 Enterprise*
If the laptop is personally-owned, upgrade to Windows 7 Ultimate/8 Pro (campus computer store)
When upgraded, use BitLocker with TPM (preferred)
If the laptop is personally-owned, upgrade to Windows 7 Ultimate (campus computer store)
When upgraded, use BitLocker with TPM (preferred)
. Extended supported by Microsoft until January 10, 2023 | |
Windows 7 | Remove from Network, Inventory, and Upgrade System |
Windows Vista | Remove from Network, Inventory, and Upgrade System |
Windows XP | Remove from Network, Inventory, and Upgrade System |
|
---|
|
---|
|
---|
|
---|
Apple Mac Operating Systems | Approved Encryption Solution |
---|---|
Mac OS X 10. |
14 (Mojave & above) | FileVault 2 |
Linux Operating Systems | Approved Encryption Solution |
Fedora 9+
Ubuntu 6+
Ubuntu 12.10+
RedHat | Linux Unified Key Setup (LUKS) Encryption |
Encrypting partitions of an existing installation with LUKS will most likely require a reinstall of the operating system as this option is only presented to users at install time. You are urged to make certain that you have complete and working backups of all data before beginning this process. |
---|