If you need MBAM/Bitlocker assistance after 5PM CST please reach out to our operator. The contact information is below.

334-670-HELP (4357)

Hours of Operation (Central Time)
Monday - Friday: 7:00 a.m. - 9:00 p.m.
Saturday: 10:00 a.m. - 3:00 p.m.
Sunday: 1:00 p.m. - 6:00 p.m.

Microsoft BitLocker Administration and Monitoring (MBAM) is a ITS service that provides a simplified administrative interface for managing and monitoring BitLocker Drive Encryption on Windows systems.  BitLocker offers enhanced protection against data theft and data exposure for Windows systems that are lost or stolen.  BitLocker encrypts all data that is stored on a Windows system.

With MBAM you can:

  • Enforce University and Departmental encryption policies
  • Monitor and audit compliance with encryption policies

Governing Policies

What is Encryption?

Encryption is a method to protect digital information as it travels across the Internet, or scrambling it when the information is "at rest" or stored on our computers. This ensures that only authorized users can decrypt (unencrypt/mask) the information and use it.  Encryption enhances the privacy and confidentiality, as well as the integrity and authenticity of our information. It helps us keep our information safe. 

Why Encrypt Data?

Portable devices such as laptops, tablets, and USB storage are most at risk for being misplaced or stolen. If a device is lost or stolen, encryption prevents unauthorized users from accessing data stored locally on the device. Without encryption, unauthorized users can use various techniques to bypass the accounts and permissions in order to access the local drive contents.

In order to meet our legal obligations and our responsibility to protect the privacy of those we serve, Troy University requires full disk encryption to be implemented on all university owned mobile computing devices (i.e. laptops, tablets, USB storage). The best way to avoid theft or loss of sensitive data is to keep it in a secure file storage offering such as OneDrive, RDSS, or department shared drives, where it's physically secured and regularly backed up. Then, you can easily access the information remotely from your mobile computer.  However, encryption is our safety net for new files, temporary (cached) files, and other information that is stored on a mobile device. 

Everyone uses network encryption today: over “https” connections from your browser to a website and also over wireless networks that require a login or connection password. Full disk encryption is similarly designed to protect information when its stored.

Submit a Ticket


Service ID: 23131
Wed 9/27/17 3:07 PM
Wed 3/18/20 3:04 PM