The school's automated process leverages the BigFix patch management software to seamlessly handle the complexity of each step of the installation.
1. Data Backup - On each computer with the BigFix software installed, you will receive a pop-up window alerting you that the process to back up your computer is about to begin. You will be able to defer the backup process for a period of time until you are ready to proceed.
During the actual backup, you can use the computer normally. A message will appear letting you know when it is complete. Expected times vary from hours to days.
Note: If you have personal information stored on a computer that you do not want to have backed up, you have two options for excluding this data from the backup process. For more info, see FAQ on data backup.
2. Disk Health Check - Once backup is complete, a series of tests will be run on your hard drive to be sure it is ready for encryption. This check will look for problems with your disk and data using diagnostic tools available natively within the operating system of your machine. This step can take anywhere from 15 minutes to several hours to complete and you may notice some degradation of performance while it is running.
If a problem is found the encryption step will not proceed. An IT specialist will contact you to assist with any required repairs.
3. Encryption - Following the completion of your computer's backup, you will receive another BigFix window alerting you that the process to encrypt your computer is about to begin. Once again, you will have the option to defer this process for a period of time until you are ready.
You may use your computer normally during the encryption process. If you shut down your computer or it enters "sleep" mode, the encryption will resume when your computer becomes active again.
To finish the encryption process, you will be prompted to restart the computer.
Note: You may notice some slowness during the encryption process. Once completed, most people report no perceptible difference in computer performance.
For more info, see FAQs on encryption.