Skip to main content
deleted 56 characters in body
Source Link
ᄂ ᄀ
  • 4.1k
  • 1
  • 20
  • 20

I have an MSI GT60-2OD (Haswell MB, UEFI enabled w/o CSM) with 3 Samsung EVO 840 mSATA SSD drives in RAID 0 mode (Intel RST AHCI RAID Controller Miniport aka Intel(R) Mobile Express Chipset SATA RAID Controller, SATA mode is 'RAID' and not 'AHCI' in "BIOS"). This works fine as such.

I thought that the eDrive compatibility of the EVO 840 mSATA would allow me to use Bitlocker encryption natively in the SSD hardware controller, so there would be no performance penalty. Because Windows only sees the Intel RST Raid Controller volume and not the actual SSD's, this doesn't work (Windows wants to enable software encryption, which I don't want). I found documentary evidence of the lack of support for this on MS Technet and at the Intel website.

The question is whether it is then possible at all to enable the native "Self Encrypting Drive" (SED) of the SSD's in this configuration? I would speculate this is by putting a user/admin password in the security tab of the "BIOS" menu and enabling the "Secure Boot menu" with secure boot mode "standard", but I cannot find any documentary evidence that this would actually enable the SED functionality of the 3 SSD's behind the Intel RAID controller.

I would appreciate all help.

Regards,

ebaybe

I have an MSI GT60-2OD (Haswell MB, UEFI enabled w/o CSM) with 3 Samsung EVO 840 mSATA SSD drives in RAID 0 mode (Intel RST AHCI RAID Controller Miniport aka Intel(R) Mobile Express Chipset SATA RAID Controller, SATA mode is 'RAID' and not 'AHCI' in "BIOS"). This works fine as such.

I thought that the eDrive compatibility of the EVO 840 mSATA would allow me to use Bitlocker encryption natively in the SSD hardware controller, so there would be no performance penalty. Because Windows only sees the Intel RST Raid Controller volume and not the actual SSD's, this doesn't work (Windows wants to enable software encryption, which I don't want). I found documentary evidence of the lack of support for this on MS Technet and at the Intel website.

The question is whether it is then possible at all to enable the native "Self Encrypting Drive" (SED) of the SSD's in this configuration? I would speculate this is by putting a user/admin password in the security tab of the "BIOS" menu and enabling the "Secure Boot menu" with secure boot mode "standard", but I cannot find any documentary evidence that this would actually enable the SED functionality of the 3 SSD's behind the Intel RAID controller.

I would appreciate all help.

Regards,

ebaybe

I have an MSI GT60-2OD (Haswell MB, UEFI enabled w/o CSM) with 3 Samsung EVO 840 mSATA SSD drives in RAID 0 mode (Intel RST AHCI RAID Controller Miniport aka Intel(R) Mobile Express Chipset SATA RAID Controller, SATA mode is 'RAID' and not 'AHCI' in "BIOS"). This works fine as such.

I thought that the eDrive compatibility of the EVO 840 mSATA would allow me to use Bitlocker encryption natively in the SSD hardware controller, so there would be no performance penalty. Because Windows only sees the Intel RST Raid Controller volume and not the actual SSD's, this doesn't work (Windows wants to enable software encryption, which I don't want). I found documentary evidence of the lack of support for this on MS Technet and at the Intel website.

The question is whether it is then possible at all to enable the native "Self Encrypting Drive" (SED) of the SSD's in this configuration? I would speculate this is by putting a user/admin password in the security tab of the "BIOS" menu and enabling the "Secure Boot menu" with secure boot mode "standard", but I cannot find any documentary evidence that this would actually enable the SED functionality of the 3 SSD's behind the Intel RAID controller.

Source Link
ebaybe
  • 11
  • 1
  • 2

How to enable Samsung EVO 840 mSATA SSD Self Encrypting Drive with Intel RST RAID 0

I have an MSI GT60-2OD (Haswell MB, UEFI enabled w/o CSM) with 3 Samsung EVO 840 mSATA SSD drives in RAID 0 mode (Intel RST AHCI RAID Controller Miniport aka Intel(R) Mobile Express Chipset SATA RAID Controller, SATA mode is 'RAID' and not 'AHCI' in "BIOS"). This works fine as such.

I thought that the eDrive compatibility of the EVO 840 mSATA would allow me to use Bitlocker encryption natively in the SSD hardware controller, so there would be no performance penalty. Because Windows only sees the Intel RST Raid Controller volume and not the actual SSD's, this doesn't work (Windows wants to enable software encryption, which I don't want). I found documentary evidence of the lack of support for this on MS Technet and at the Intel website.

The question is whether it is then possible at all to enable the native "Self Encrypting Drive" (SED) of the SSD's in this configuration? I would speculate this is by putting a user/admin password in the security tab of the "BIOS" menu and enabling the "Secure Boot menu" with secure boot mode "standard", but I cannot find any documentary evidence that this would actually enable the SED functionality of the 3 SSD's behind the Intel RAID controller.

I would appreciate all help.

Regards,

ebaybe