Configuring Sophos SafeGuard Enterprise Disk Encryption
Imprivata Enterprise Access Management supports Sophos® SafeGuard® Enterprise disk encryption on Microsoft Windows endpoints with an Imprivata single-user computer or Imprivata shared kiosk workstation agent.
Supported Sophos SafeGuard Enterprise Configurations
Enterprise Access Management desktop authentication support for Sophos SafeGuard Enterprise disk encryption is based on the operating system of the Windows endpoint computers. See the Enterprise Access Management with SSO Supported Components matrix to verify that Enterprise Access Management supports your Sophos version.

- By default, BitLocker authenticates users before loading the operating system. Users are required to enter a password manually to authenticate. See Windows Desktop Authentication WorkflowsWindows Desktop Authentication Workflows.
- Streamlining the authentication workflow requires additional BitLocker and Sophos configuration to use one of the following:
- Trusted Platform Module (TPM) compatible hardware.
- TPM compatible hardware and a startup key.
- A startup key that is stored on a USB removable device only.
- BitLocker uses the startup key stored on the TPM, USB device, or both to authenticate the user. When you configure the environment to use one of these options, there is no user interaction with BitLocker.
After the Windows desktop opens, Sophos SafeGuard Enterprise disk encryption does not affect the Enterprise Access Management login/logout workflow or the desktop lock/unlock functionality.
NOTE: For more information about BitLocker, see the Microsoft documentation.
Streamlining the Authentication Workflow

To streamline the desktop authentication workflow:
-
Make sure that you have access to the SafeGuard Management Center.
-
Use Microsoft Server Manager to add the Group Policy Management Console (GPMC).
NOTE: For more information about installing the GPMC, see the Microsoft documentation.
Configuring BitLocker and Sophos to Streamline Windows Desktop Authentication
By default, BitLocker prompts users to enter a password before starting the operating system on Windows endpoint computers. The following steps detail how to configure the environment to automatically use a BitLocker startup key, which streamlines the desktop authentication workflow.
This process includes the following steps:

To create the Sophos authentication policy:
- From the SafeGuard Enterprise (SGN) Server, log into the SafeGuard Management Center.
- Open the Policies directory.
- Right–click Policy Items and click New > Authentication.
- Enter a policy name and click OK.
- Select the new authentication policy on the Policy Items list.
- On the Authentication tab, go to the BitLocker Options section.
- Select an authentication option for the BitLocker Logon mode:
- If the endpoint computers do not have TPM compatible hardware, select USB Memory Stick.
- If the endpoint computers have Trusted Platform Module (TPM) compatible hardware, select one of the following:
- TPM
- TPM + Startup Key
- Save the authentication policy.
NOTE: Although you can select TPM + PIN, users are prompted for a BitLocker PIN in addition to the BitLocker startup key, which is stored on the TPM hardware. This option provides an additional security layer, but requires user intervention.

To assign the authentication policy:
- In the SafeGuard Management Center, open the Users and Computers directory.
- Select the Active Directory group that represents the computers to which the authentication policy applies.
- Click Policies.
- Drag-and-drop the authentication policy from Available Policies to Policies.
-
- Right-click the authentication policy and click Save.
The policy takes affect the next time the SGN Client queries the SGN Server for policy changes.

To create the Group Policy Object (GPO) for BitLocker:
- From the Windows Server, open the Group Policy Management Console.
- Locate the domain that includes the Windows endpoint computers and do one of the following:
- Right-click the domain and click Create a GPO in this domain and Link it here.
- Right-click an existing GOP and click Edit.
- In the Group Policy Management Editor, go to Computer Configuration > Policies > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.
- Right-click Require additional authentication at startup and click Edit.
- In the Require additional authentication at startup window, select Enabled.
- Do one of the following:
- If the enterprise includes Windows 8.1 endpoint computers without TPM compatible hardware, select Allow BitLocker without a compatible TPM.
- If the enterprise includes Windows endpoint computers with TPM compatible hardware, configure Settings for computers with TPM as required by the Sophos authentication policy. For example, if you configured the Sophos authentication policy for TPM + Startup Key, open Configure TPM start up key and select Require start up key with TPM. For more information about the TPM options, see the help that is available in the Require additional authentication at startup window.
The GPO takes affect during the next Group Policy refresh interval.
Windows Desktop Authentication Workflows
By default, BitLocker requires users to enter a password before loading the operating system.
NOTE: The following workflows apply to a Sophos deployment that is synchronized with the same user directory domain controller as the appliance.

The user logs into a Windows endpoint computer three times:
-
The Windows endpoint computer starts.
-
The user enters the BitLocker password.
-
BitLocker authenticates the user. The locked Windows desktop opens with the Imprivata Login to Windows dialog.
-
The user logs into Enterprise Access Management with a user name and password, proximity card, fingerprint, or ID token. The Windows desktop opens with the Sophos SafeGuard Logon dialog.
-
The user enters the Sophos credentials and clicks OK. The Sophos SafeGuard successful logon dialog opens.
-
The user clicks OK.
-
The Windows desktop opens.
After the desktop opens, Enterprise Access Management continues to manage the desktop lock and unlock functionality.

The user logs into a Windows endpoint computer three times:
-
The Windows endpoint computer starts.
-
The user enters the BitLocker password.
-
BitLocker authenticates the user and the locked Windows desktop opens.
-
The user unlocks the desktop and enters the Windows domain credentials.
-
The user logs into Enterprise Access Management with a user name and password, proximity card, fingerprint, or ID token.
-
The Windows desktop opens.
After the desktop opens, Enterprise Access Management continues to manage the desktop lock and unlock functionality.