Please enable javascript to view this page in its intended format.

Queen's University
 

Requirements for Encryption

 

There is a three-step process in determining if your computer meets the requirements for encryption:

 

  1. Find out if your operating system supports encryption.
  2. Make sure your computer's hardware meets the requirements for encryption.
  3. Encrypt your computer by following the Do-it-yourself tutorials.

 

If  at any time you have a question, or need help, please contact the IT Support Centre to have a technician provide assistance.   


 

Step 1:  Find out if your operating system supports encryption

 

Certain operating systems that come pre-installed on computers do not have built-in encryption capabilities (for example, Windows 7 Home.) These computers will need to have the operating system upgraded to an encryption-capable operating system.

 

Follow the instructions to determine which operating system you are using, then consult the Operating System Compatibility Table to see if it is encryption capable.

 

To find out which operating system you are using:

 

Macintosh: As long as your Mac is running OS X 10.7 or newer, it meets the requirements for encryption. If you are running an earlier version of the Mac operating system, you will need to upgrade.

 

Windows: To find out what version of Windows you have installed on your computer, you need to access the System Control Panel.

 

Windows 8.1:

  • From the Start screen, start typing System (this will automatically open the search screen)
  • From the Search list, tap or click on System (the icon will be a computer)
  • The System screen will open. The full version name will be displayed (Windows 8 Professional or Windows 8.1 Enterprise). Note: A Home version will not show the word "Home."
  • Check the Operating System Compatibility Table below to see if your operating system is encryption capable.

 

Windows 7:

  • Click on Windows Start
  • In the Start search box, enter System
  • The program list will open
  • Select System from the list
  • Check the Operating System Compatibility Table below to see if your operating system is encryption capable.

 

Operating System Compatibility Table

 

Operating System

Encryption Capable?

Windows 7 Home

No

Please see What are my options...? below

Windows 7 Pro

No

Please see What are my options...? below

Windows 7 Enterprise

Yes

Windows 7 Ultimate

Yes

Windows 8.0

Not Supported by ITS. 

Upgrade to Windows 8.1 Enterprise required.  Please see What are my options...? below

Windows 8.1

No

Please see What are my options...? below

Windows 8.1 Pro

Yes

Windows 8.1 Enterprise

Yes

Windows 8.1 RT

Yes

Device encryption is automatically enabled after first login with a Microsoft account.

Mac OS X 10.7 or newer

Yes

Recommend free upgrade to Mac OS X 10.9.x

 

What are my options if my operating system does not have encryption capabilities?

 

Macintosh: ITServices supports Mac OS 10.7 and above. If you are running an earlier version of the Mac operating system, you will need to upgrade.

 

Windows: The operating system must be replaced with a copy of Windows with encryption capabilities (see Compatibility Table). Queen's is now licensed to provide Microsoft Windows Enterprise. These are available from the Campus Computer Store to staff, faculty and grad students.

 


 

Step 2:  Make sure your computer's hardware meets the requirements for encryption

 

Macintosh hardware requirements

 

As long as your Mac is running OS X 10.7 or newer, it meets the requirements to be encrypted.

 

Windows hardware requirements

 

Windows 8.1:

  • A Trusted Platform Module (TPM) is recommended, however, Windows will allow you to use a dedicated USB key, or the option of simply entering a PIN password on boot-up.
  • Storage of the encryption Recovery Key is very important and should be printed and stored in a locked location.

 

Windows 7:

  • A Trusted Platform Module (TPM) is recommended, however, Windows will allow you to use a dedicated USB key.
  • Windows 7 does not allow a PIN password-only option.
  • Storage of the encryption Recovery Key is very important and should be printed and stored in a locked location.

 

If you need help with determining if your system has a TPM, please call the Support Centre at 613-533-6666 and we will be happy to help.

 

 

Step 3:  Encrypt your computer by following the Do It Yourself tutorial 


Once you have determined that your computer's operating system and hardware supports encryption, your can use the step-by-step  tutorials to encrypt your computer yourself. 

 

If you have any questions or if  you would prefer to have an IT Support Centre technician encrypt your computer for you contact the IT Support Centre

 

  • Contact us by calling 613-533-6666 during business hours
  • Or, fill out the online help form

 

 


Kingston, Ontario, Canada K7L 3N6 613.533.2000