mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge branch 'master' of https://github.com/MicrosoftDocs/windows-docs-pr into wn-21H1
This commit is contained in:
commit
0a8f7accdd
@ -105,9 +105,11 @@ To do this, follow these steps.
|
|||||||
|
|
||||||
2. On the **Install Windows** screen, select **Next** > **Repair your computer**.
|
2. On the **Install Windows** screen, select **Next** > **Repair your computer**.
|
||||||
|
|
||||||
3. On the **System Recovery Options** screen, select **Next** > **Command Prompt**.
|
3. On the **Choose an option** screen, select **Troubleshoot**.
|
||||||
|
|
||||||
4. After Startup Repair, select **Shutdown**, then turn on your PC to see if Windows can boot properly.
|
4. On the **Advanced options** screen, select **Startup Repair**.
|
||||||
|
|
||||||
|
5. After Startup Repair, select **Shutdown**, then turn on your PC to see if Windows can boot properly.
|
||||||
|
|
||||||
The Startup Repair tool generates a log file to help you understand the startup problems and the repairs that were made. You can find the log file in the following location:
|
The Startup Repair tool generates a log file to help you understand the startup problems and the repairs that were made. You can find the log file in the following location:
|
||||||
|
|
||||||
|
@ -104,7 +104,7 @@ where:
|
|||||||
- `<remove member>`: Specifies the SID or name of the member to remove from the specified group.
|
- `<remove member>`: Specifies the SID or name of the member to remove from the specified group.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> When specifying member names of the user accounts, you must use following format – AzureAD/userUPN. For example, "AzureAD/user1@contoso.com" or "AzureAD/user2@contoso.co.uk".
|
> When specifying member names of the user accounts, you must use following format – AzureAD\userUPN. For example, "AzureAD\user1@contoso.com" or "AzureAD\user2@contoso.co.uk".
|
||||||
For adding Azure AD groups, you need to specify the Azure AD Group SID. Azure AD group names are not supported with this policy.
|
For adding Azure AD groups, you need to specify the Azure AD Group SID. Azure AD group names are not supported with this policy.
|
||||||
for more information, see [LookupAccountNameA function](/windows/win32/api/winbase/nf-winbase-lookupaccountnamea).
|
for more information, see [LookupAccountNameA function](/windows/win32/api/winbase/nf-winbase-lookupaccountnamea).
|
||||||
|
|
||||||
|
@ -60,7 +60,8 @@ After creating the database, you need to assign permissions to it. In MDT, the a
|
|||||||
|
|
||||||
4. On the **Login - New** page, next to the **Login** name field, click **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles:
|
4. On the **Login - New** page, next to the **Login** name field, click **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles:
|
||||||
1. db\_datareader
|
1. db\_datareader
|
||||||
2. public (default)
|
2. db\_datawriter
|
||||||
|
3. public (default)
|
||||||
5. Click **OK**, and close SQL Server Management Studio.
|
5. Click **OK**, and close SQL Server Management Studio.
|
||||||
|
|
||||||

|

|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 76 KiB After Width: | Height: | Size: 96 KiB |
@ -18,14 +18,14 @@ ms.date: 02/28/2019
|
|||||||
ms.custom: bitlocker
|
ms.custom: bitlocker
|
||||||
---
|
---
|
||||||
|
|
||||||
# BCD settings and BitLocker
|
# Boot Configuration Data settings and BitLocker
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This topic for IT professionals describes the BCD settings that are used by BitLocker.
|
This topic for IT professionals describes the Boot Configuration Data (BCD) settings that are used by BitLocker.
|
||||||
|
|
||||||
When protecting data at rest on an operating system volume, during the boot process BitLocker verifies that the security sensitive boot configuration data (BCD) settings have not changed since BitLocker was last enabled, resumed, or recovered.
|
When protecting data at rest on an operating system volume, during the boot process BitLocker verifies that the security sensitive BCD settings have not changed since BitLocker was last enabled, resumed, or recovered.
|
||||||
|
|
||||||
## BitLocker and BCD Settings
|
## BitLocker and BCD Settings
|
||||||
|
|
||||||
|
@ -28,7 +28,7 @@ This article for the IT professional explains how BitLocker features can be used
|
|||||||
|
|
||||||
## Using BitLocker to encrypt volumes
|
## Using BitLocker to encrypt volumes
|
||||||
|
|
||||||
BitLocker provides full volume encryption (FVE) for operating system volumes, as well as fixed and removable data volumes. To support fully encrypted operating system volumes, BitLocker uses an unencrypted system volume for the files required to boot, decrypt, and load the operating system. This volume is automatically created during a new installation of both client and server operating systems.
|
BitLocker provides full volume encryption (FVE) for operating system volumes, as well as fixed and removable data drives. To support fully encrypted operating system drives, BitLocker uses an unencrypted system partition for the files required to boot, decrypt, and load the operating system. This volume is automatically created during a new installation of both client and server operating systems.
|
||||||
|
|
||||||
In the event that the drive was prepared as a single contiguous space, BitLocker requires a new volume to hold the boot files. BdeHdCfg.exe can create these volumes.
|
In the event that the drive was prepared as a single contiguous space, BitLocker requires a new volume to hold the boot files. BdeHdCfg.exe can create these volumes.
|
||||||
|
|
||||||
@ -110,9 +110,8 @@ The following table shows the compatibility matrix for systems that have been Bi
|
|||||||
|
|
||||||
Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes
|
Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes
|
||||||
|
|
||||||
|||||
|
|
||||||
|--- |--- |--- |--- |
|
|
||||||
|Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7|
|
|Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7|
|
||||||
|
|--- |--- |--- |--- |
|
||||||
|Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted|
|
|Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted|
|
||||||
|Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted|
|
|Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted|
|
||||||
|Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A|
|
|Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A|
|
||||||
|
@ -43,7 +43,7 @@ Before Windows starts, you must rely on security features implemented as part of
|
|||||||
|
|
||||||
### Trusted Platform Module
|
### Trusted Platform Module
|
||||||
|
|
||||||
A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys.
|
A trusted platform module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys.
|
||||||
On some platforms, TPM can alternatively be implemented as a part of secure firmware.
|
On some platforms, TPM can alternatively be implemented as a part of secure firmware.
|
||||||
BitLocker binds encryption keys with the TPM to ensure that a computer has not been tampered with while the system was offline.
|
BitLocker binds encryption keys with the TPM to ensure that a computer has not been tampered with while the system was offline.
|
||||||
For more info about TPM, see [Trusted Platform Module](/windows/device-security/tpm/trusted-platform-module-overview).
|
For more info about TPM, see [Trusted Platform Module](/windows/device-security/tpm/trusted-platform-module-overview).
|
||||||
@ -126,7 +126,7 @@ For SBP-2 and 1394 (a.k.a. Firewire), refer to the “SBP-2 Mitigation” sectio
|
|||||||
|
|
||||||
## Attack countermeasures
|
## Attack countermeasures
|
||||||
|
|
||||||
This section covers countermeasures for specific types attacks.
|
This section covers countermeasures for specific types of attacks.
|
||||||
|
|
||||||
### Bootkits and rootkits
|
### Bootkits and rootkits
|
||||||
|
|
||||||
@ -172,7 +172,7 @@ Mitigation:
|
|||||||
Targeted attack with plenty of time; this attacker will open the case, will solder, and will use sophisticated hardware or software.
|
Targeted attack with plenty of time; this attacker will open the case, will solder, and will use sophisticated hardware or software.
|
||||||
|
|
||||||
Mitigation:
|
Mitigation:
|
||||||
- Pre-boot authentication set to TPM with a PIN protector (with a sophisticated alphanumeric PIN to help the TPM anti-hammering mitigation).
|
- Pre-boot authentication set to TPM with a PIN protector (with a sophisticated alphanumeric PIN [enhanced pin] to help the TPM anti-hammering mitigation).
|
||||||
|
|
||||||
-And-
|
-And-
|
||||||
|
|
||||||
@ -197,4 +197,4 @@ For secure administrative workstations, Microsoft recommends TPM with PIN protec
|
|||||||
- [Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker](https://support.microsoft.com/help/2516445/blocking-the-sbp-2-driver-and-thunderbolt-controllers-to-reduce-1394-d)
|
- [Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker](https://support.microsoft.com/help/2516445/blocking-the-sbp-2-driver-and-thunderbolt-controllers-to-reduce-1394-d)
|
||||||
- [BitLocker Group Policy settings](./bitlocker-group-policy-settings.md)
|
- [BitLocker Group Policy settings](./bitlocker-group-policy-settings.md)
|
||||||
- [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp)
|
- [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp)
|
||||||
- [Winlogon automatic restart sign-on (ARSO)](https://docs.microsoft.com/windows-server/identity/ad-ds/manage/component-updates/winlogon-automatic-restart-sign-on--arso-)
|
- [Winlogon automatic restart sign-on (ARSO)](/windows-server/identity/ad-ds/manage/component-updates/winlogon-automatic-restart-sign-on--arso-)
|
||||||
|
@ -18,17 +18,17 @@ ms.custom: bitlocker
|
|||||||
|
|
||||||
# Guidelines for troubleshooting BitLocker
|
# Guidelines for troubleshooting BitLocker
|
||||||
|
|
||||||
This article addresses common issues in BitLocker and provides guidelines to troubleshoot these issues. This article also provides pointers to start the troubleshooting process, including what data to collect and what settings to check in order to narrow down the location in which these issues occur.
|
This article addresses common issues in BitLocker and provides guidelines to troubleshoot these issues. This article also provides information such as what data to collect and what settings to check. This information makes your troubleshooting process much easier.
|
||||||
|
|
||||||
## Review the event logs
|
## Review the event logs
|
||||||
|
|
||||||
Open Event Viewer and review the following logs under Applications and Services logs\\Microsoft\\Windows:
|
Open Event Viewer and review the following logs under Applications and Services logs\\Microsoft\\Windows:
|
||||||
|
|
||||||
- **BitLocker-API**. Review the Management log, the Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
- **BitLocker-API**. Review the management log, the operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
||||||
- Microsoft-Windows-BitLocker-API/BitLocker Operational
|
- Microsoft-Windows-BitLocker-API/BitLocker Operational
|
||||||
- Microsoft-Windows-BitLocker-API/BitLocker Management
|
- Microsoft-Windows-BitLocker-API/BitLocker Management
|
||||||
|
|
||||||
- **BitLocker-DrivePreparationTool**. Review the Admin log, the Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
- **BitLocker-DrivePreparationTool**. Review the admin log, the operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
||||||
- Microsoft-Windows-BitLocker-DrivePreparationTool/Operational
|
- Microsoft-Windows-BitLocker-DrivePreparationTool/Operational
|
||||||
- Microsoft-Windows-BitLocker-DrivePreparationTool/Admin
|
- Microsoft-Windows-BitLocker-DrivePreparationTool/Admin
|
||||||
|
|
||||||
@ -36,19 +36,20 @@ Additionally, review the Windows logs\\System log for events that were produced
|
|||||||
|
|
||||||
To filter and display or export logs, you can use the [wevtutil.exe](/windows-server/administration/windows-commands/wevtutil) command-line tool or the [Get-WinEvent](/powershell/module/microsoft.powershell.diagnostics/get-winevent?view=powershell-6) cmdlet.
|
To filter and display or export logs, you can use the [wevtutil.exe](/windows-server/administration/windows-commands/wevtutil) command-line tool or the [Get-WinEvent](/powershell/module/microsoft.powershell.diagnostics/get-winevent?view=powershell-6) cmdlet.
|
||||||
|
|
||||||
For example, to use wevtutil to export the contents of the Operational log from the BitLocker-API folder to a text file that is named BitLockerAPIOpsLog.txt, open a Command Prompt window, and run a command that resembles the following:
|
|
||||||
|
For example, to use wevtutil to export the contents of the operational log from the BitLocker-API folder to a text file that is named BitLockerAPIOpsLog.txt, open a Command Prompt window, and run the following command:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
wevtutil qe "Microsoft-Windows-BitLocker/BitLocker Operational" /f:text > BitLockerAPIOpsLog.txt
|
wevtutil qe "Microsoft-Windows-BitLocker/BitLocker Operational" /f:text > BitLockerAPIOpsLog.txt
|
||||||
```
|
```
|
||||||
|
|
||||||
To use the **Get-WinEvent** cmdlet to export the same log to a comma-separated text file, open a Windows Powershell window and run a command that resembles the following:
|
To use the **Get-WinEvent** cmdlet to export the same log to a comma-separated text file, open a Windows Powershell window and run the following command:
|
||||||
|
|
||||||
```ps
|
```ps
|
||||||
Get-WinEvent -logname "Microsoft-Windows-BitLocker/BitLocker Operational" | Export-Csv -Path Bitlocker-Operational.csv
|
Get-WinEvent -logname "Microsoft-Windows-BitLocker/BitLocker Operational" | Export-Csv -Path Bitlocker-Operational.csv
|
||||||
```
|
```
|
||||||
|
|
||||||
You can use Get-WinEvent in an elevated PowerShell window to display filtered information from the System or Application log by using syntax that resembles the following:
|
You can use Get-WinEvent in an elevated PowerShell window to display filtered information from the system or application log by using the following syntax:
|
||||||
|
|
||||||
- To display BitLocker-related information:
|
- To display BitLocker-related information:
|
||||||
```ps
|
```ps
|
||||||
@ -86,7 +87,7 @@ You can use Get-WinEvent in an elevated PowerShell window to display filtered in
|
|||||||
Open an elevated Windows PowerShell window, and run each of the following commands.
|
Open an elevated Windows PowerShell window, and run each of the following commands.
|
||||||
|
|
||||||
|Command |Notes |
|
|Command |Notes |
|
||||||
| - | - |
|
| --- | --- |
|
||||||
|[**get-tpm \> C:\\TPM.txt**](/powershell/module/trustedplatformmodule/get-tpm?view=win10-ps) |Exports information about the local computer's Trusted Platform Module (TPM). This cmdlet shows different values depending on whether the TPM chip is version 1.2 or 2.0. This cmdlet is not supported in Windows 7. |
|
|[**get-tpm \> C:\\TPM.txt**](/powershell/module/trustedplatformmodule/get-tpm?view=win10-ps) |Exports information about the local computer's Trusted Platform Module (TPM). This cmdlet shows different values depending on whether the TPM chip is version 1.2 or 2.0. This cmdlet is not supported in Windows 7. |
|
||||||
|[**manage-bde –status \> C:\\BDEStatus.txt**](/windows-server/administration/windows-commands/manage-bde-status) |Exports information about the general encryption status of all drives on the computer. |
|
|[**manage-bde –status \> C:\\BDEStatus.txt**](/windows-server/administration/windows-commands/manage-bde-status) |Exports information about the general encryption status of all drives on the computer. |
|
||||||
|[**manage-bde c: <br />-protectors -get \> C:\\Protectors**](/windows-server/administration/windows-commands/manage-bde-protectors) |Exports information about the protection methods that are used for the BitLocker encryption key. |
|
|[**manage-bde c: <br />-protectors -get \> C:\\Protectors**](/windows-server/administration/windows-commands/manage-bde-protectors) |Exports information about the protection methods that are used for the BitLocker encryption key. |
|
||||||
@ -98,7 +99,7 @@ Open an elevated Windows PowerShell window, and run each of the following comman
|
|||||||
1. Open an elevated Command Prompt window, and run the following commands.
|
1. Open an elevated Command Prompt window, and run the following commands.
|
||||||
|
|
||||||
|Command |Notes |
|
|Command |Notes |
|
||||||
| - | - |
|
| --- | --- |
|
||||||
|[**gpresult /h \<Filename>**](/windows-server/administration/windows-commands/gpresult) |Exports the Resultant Set of Policy information, and saves the information as an HTML file. |
|
|[**gpresult /h \<Filename>**](/windows-server/administration/windows-commands/gpresult) |Exports the Resultant Set of Policy information, and saves the information as an HTML file. |
|
||||||
|[**msinfo /report \<Path> /computer \<ComputerName>**](/windows-server/administration/windows-commands/msinfo32) |Exports comprehensive information about the hardware, system components, and software environment on the local computer. The **/report** option saves the information as a .txt file. |
|
|[**msinfo /report \<Path> /computer \<ComputerName>**](/windows-server/administration/windows-commands/msinfo32) |Exports comprehensive information about the hardware, system components, and software environment on the local computer. The **/report** option saves the information as a .txt file. |
|
||||||
|
|
||||||
@ -109,13 +110,13 @@ Open an elevated Windows PowerShell window, and run each of the following comman
|
|||||||
|
|
||||||
## Check the BitLocker prerequisites
|
## Check the BitLocker prerequisites
|
||||||
|
|
||||||
Common settings that can cause issues for BitLocker include the following:
|
Common settings that can cause issues for BitLocker include the following scenarios:
|
||||||
|
|
||||||
- The TPM must be unlocked. You can check the output of the **get-tpm** command for the status of the TPM.
|
- The TPM must be unlocked. You can check the output of the **get-tpm** command for the status of the TPM.
|
||||||
- Windows RE must be enabled. You can check the output of the **reagentc** command for the status of WindowsRE.
|
- Windows RE must be enabled. You can check the output of the **reagentc** command for the status of WindowsRE.
|
||||||
- The system reserved partition must use the correct format.
|
- The system-reserved partition must use the correct format.
|
||||||
- On Unified Extensible Firmware Interface (UEFI) computers, the system reserved partition must be formatted as FAT32.
|
- On Unified Extensible Firmware Interface (UEFI) computers, the system-reserved partition must be formatted as FAT32.
|
||||||
- On legacy computers, the system reserved partition must be formatted as NTFS.
|
- On legacy computers, the system-reserved partition must be formatted as NTFS.
|
||||||
- If the device that you are troubleshooting is a slate or tablet PC, use <https://gpsearch.azurewebsites.net/#8153> to verify the status of the **Enable use of BitLocker authentication requiring preboot keyboard input on slates** option.
|
- If the device that you are troubleshooting is a slate or tablet PC, use <https://gpsearch.azurewebsites.net/#8153> to verify the status of the **Enable use of BitLocker authentication requiring preboot keyboard input on slates** option.
|
||||||
|
|
||||||
For more information about the BitLocker prerequisites, see [BitLocker basic deployment: Using BitLocker to encrypt volumes](./bitlocker-basic-deployment.md#using-bitlocker-to-encrypt-volumes)
|
For more information about the BitLocker prerequisites, see [BitLocker basic deployment: Using BitLocker to encrypt volumes](./bitlocker-basic-deployment.md#using-bitlocker-to-encrypt-volumes)
|
||||||
@ -124,14 +125,14 @@ For more information about the BitLocker prerequisites, see [BitLocker basic dep
|
|||||||
|
|
||||||
If the information that you have examined so far indicates a specific issue (for example, WindowsRE is not enabled), the issue may have a straightforward fix.
|
If the information that you have examined so far indicates a specific issue (for example, WindowsRE is not enabled), the issue may have a straightforward fix.
|
||||||
|
|
||||||
Resolving issues that do not have obvious causes depends on exactly which components are involved and what behavior you see. The information that you have gathered can help you narrow down the areas to investigate.
|
Resolving issues that do not have obvious causes depends on exactly which components are involved and what behavior you see. The information that you have gathered helps you narrow down the areas to investigate.
|
||||||
|
|
||||||
- If you are working on a device that is managed by Microsoft Intune, see [Enforcing BitLocker policies by using Intune: known issues](ts-bitlocker-intune-issues.md).
|
- If you are working on a device that is managed by Microsoft Intune, see [Enforcing BitLocker policies by using Intune: known issues](ts-bitlocker-intune-issues.md).
|
||||||
- If BitLocker does not start or cannot encrypt a drive and you notice errors or events that are related to the TPM, see [BitLocker cannot encrypt a drive: known TPM issues](ts-bitlocker-cannot-encrypt-tpm-issues.md).
|
- If BitLocker does not start or cannot encrypt a drive and you notice errors or events that are related to the TPM, see [BitLocker cannot encrypt a drive: known TPM issues](ts-bitlocker-cannot-encrypt-tpm-issues.md).
|
||||||
- If BitLocker does not start or cannot encrypt a drive, see [BitLocker cannot encrypt a drive: known issues](ts-bitlocker-cannot-encrypt-issues.md).
|
- If BitLocker does not start or cannot encrypt a drive, see [BitLocker cannot encrypt a drive: known issues](ts-bitlocker-cannot-encrypt-issues.md).
|
||||||
- If BitLocker Network Unlock does not behave as expected, see [BitLocker Network Unlock: known issues](ts-bitlocker-network-unlock-issues.md).
|
- If BitLocker Network Unlock does not behave as expected, see [BitLocker Network Unlock: known issues](ts-bitlocker-network-unlock-issues.md).
|
||||||
- If BitLocker does not behave as expected when you recover an encrypted drive, or if you did not expect BitLocker to recover the drive, see [BitLocker recovery: known issues](ts-bitlocker-recovery-issues.md).
|
- If BitLocker does not behave as expected when you recover an encrypted drive, or if you did not expect BitLocker to recover the drive, see [BitLocker recovery: known issues](ts-bitlocker-recovery-issues.md).
|
||||||
- If BitLocker does not behave as expected or the encrypted drive does not behave as expected, and you notice errors or events that are related to the TPM, see [BitLocker and TPM: other known issues](ts-bitlocker-tpm-issues.md).
|
- If BitLocker or the encrypted drive does not behave as expected, and you notice errors or events that are related to the TPM, see [BitLocker and TPM: other known issues](ts-bitlocker-tpm-issues.md).
|
||||||
- If BitLocker does not behave as expected or the encrypted drive does not behave as expected, see [BitLocker configuration: known issues](ts-bitlocker-config-issues.md).
|
- If BitLocker or the encrypted drive does not behave as expected, see [BitLocker configuration: known issues](ts-bitlocker-config-issues.md).
|
||||||
|
|
||||||
We recommend that you keep the information that you have gathered handy in case you decide to contact Microsoft Support for help to resolve your issue.
|
We recommend that you keep the information that you have gathered handy in case you decide to contact Microsoft Support for help to resolve your issue.
|
Loading…
x
Reference in New Issue
Block a user