This commit is contained in:
Paolo Matarazzo
2023-10-31 15:22:05 -04:00
parent fe8bbf40c4
commit 41bebc9c24
3 changed files with 22 additions and 32 deletions

View File

@ -197,13 +197,13 @@ Organizations can use Microsoft Intune or Configuration Manager to monitor devic
## Next steps ## Next steps
> [!div class="nextstepaction"] > [!div class="nextstepaction"]
> Learn how to plan a BitLocker recovery strategy for your organization. > Learn how to plan a BitLocker recovery strategy for your organization:
> >
> >
> [BitLocker recovery overview >](recovery-overview.md) > [BitLocker recovery overview >](recovery-overview.md)
> [!div class="nextstepaction"] > [!div class="nextstepaction"]
> Learn about the available options to configure BitLocker and how to configure them via Configuration Service Providers (CSP) or group policy (GPO). > Learn about the available options to configure BitLocker and how to configure them via Configuration Service Providers (CSP) or group policy (GPO):
> >
> >
> [Configure BitLocker >](configure.md) > [Configure BitLocker >](configure.md)

View File

@ -12,14 +12,14 @@ ms.date: 10/30/2023
BitLocker recovery is the process by which access to a BitLocker-protected drive can be restored if the drive doesn't unlock using its default unlock mechanism. BitLocker recovery is the process by which access to a BitLocker-protected drive can be restored if the drive doesn't unlock using its default unlock mechanism.
This article describes scenarios that trigger BitLocker recovery, the options to restore access to a locked drive, and details about the information that can be stored in Microsoft Entra ID and Active Directory Domain Services (AD DS) when BitLocker is enabled. This article describes scenarios that trigger BitLocker recovery, how to configure devices to save recovery information, and the options to restore access to a locked drive.
## BitLocker recovery scenarios ## BitLocker recovery scenarios
The following list provides examples of common events that cause a device to enter BitLocker recovery mode when starting Windows: The following list provides examples of common events that cause a device to enter BitLocker recovery mode when starting Windows:
- Entering the wrong PIN too many times - Entering the wrong PIN too many times
- Turning off the support for reading the USB device in the pre-boot environment from the BIOS or UEFI firmware if using USB-based keys instead of a TPM - Turning off the support for reading the USB device in the preboot environment from the BIOS or UEFI firmware if using USB-based keys instead of a TPM
- Having the CD or DVD drive before the hard drive in the BIOS boot order (common with virtual machines) - Having the CD or DVD drive before the hard drive in the BIOS boot order (common with virtual machines)
- Docking or undocking a portable computer - Docking or undocking a portable computer
- Changes to the NTFS partition table on the disk - Changes to the NTFS partition table on the disk
@ -33,7 +33,7 @@ The following list provides examples of common events that cause a device to ent
- Moving a BitLocker-protected drive into a new computer - Moving a BitLocker-protected drive into a new computer
- On devices with TPM 1.2, changing the BIOS or firmware boot device order - On devices with TPM 1.2, changing the BIOS or firmware boot device order
As part of the [BitLocker recovery process](recovery-process.md), it's recommend to determine what caused a device to enter in recovery mode. Root cause analysis might help to prevent the problem from occurring again in the future. For instance, if it's' determined that an attacker has modified the device by obtaining physical access, new security policies can be implemented for tracking who has physical presence. As part of the [BitLocker recovery process](recovery-process.md), it's recommended to determine what caused a device to enter in recovery mode. Root cause analysis might help to prevent the problem from occurring again in the future. For instance, if you determine that an attacker modified a device by obtaining physical access, you can implement new security policies for tracking who has physical presence.
For planned scenarios, such as a known hardware or firmware upgrades, initiating recovery can be avoided by temporarily suspending BitLocker protection. Suspending BitLocker leaves the drive fully encrypted, and the administrator can quickly resume BitLocker protection after the planned task is completed. Using *suspend* and *resume* also reseals the encryption key without requiring the entry of the recovery key. For planned scenarios, such as a known hardware or firmware upgrades, initiating recovery can be avoided by temporarily suspending BitLocker protection. Suspending BitLocker leaves the drive fully encrypted, and the administrator can quickly resume BitLocker protection after the planned task is completed. Using *suspend* and *resume* also reseals the encryption key without requiring the entry of the recovery key.
@ -45,11 +45,11 @@ For planned scenarios, such as a known hardware or firmware upgrades, initiating
## BitLocker recovery options ## BitLocker recovery options
In a recovery scenario, the following options to restore access to the drive may be available, depending on the policy settings applied to the devices: In a recovery scenario, the following options to restore access to the drive might be available, depending on the policy settings applied to the devices:
:::row::: :::row:::
:::column span="2"::: :::column span="2":::
- **Recovery password**: a 48-digit number used to unlock a volume when it is in recovery mode. The recovery password may be saved as a text file, printed or stored in Microsoft Entra ID or Active Directory. The user can supply a recovery password, if available - **Recovery password**: a 48-digit number used to unlock a volume when it is in recovery mode. The recovery password might be saved as a text file, printed or stored in Microsoft Entra ID or Active Directory. The user can supply a recovery password, if available
:::column-end::: :::column-end:::
:::column span="2"::: :::column span="2":::
:::image type="content" source="images/preboot-recovery.png" alt-text="Screenshot of the default BitLocker recovery screen asking enter the recovery password." lightbox="images/preboot-recovery.png" border="false"::: :::image type="content" source="images/preboot-recovery.png" alt-text="Screenshot of the default BitLocker recovery screen asking enter the recovery password." lightbox="images/preboot-recovery.png" border="false":::
@ -65,7 +65,7 @@ In a recovery scenario, the following options to restore access to the drive may
:::row-end::: :::row-end:::
:::row::: :::row:::
:::column span="4"::: :::column span="4":::
- **Key package**: decryption key that can be used with the BitLocker Repair tool to reconstruct critical parts of a drive and salvage recoverable data. With the key package and either the *recovery password* or *recovery key*, portions of a corrupted BitLocker-protected drive can be decrypted. Each key package works only for a drive that has the corresponding drive identifier. A key package is not generated automatically, and can be saved on a file or in Active Directory Domain Services. A key package can't be stored in Microsoft Entra ID - **Key package**: decryption key that can be used with the BitLocker Repair tool to reconstruct critical parts of a drive and salvage recoverable data. With the key package and either the *recovery password* or *recovery key*, portions of a corrupted BitLocker-protected drive can be decrypted. Each key package works only for a drive that has the corresponding drive identifier. A key package isn't generated automatically, and can be saved on a file or in Active Directory Domain Services. A key package can't be stored in Microsoft Entra ID
:::column-end::: :::column-end:::
:::row-end::: :::row-end:::
:::row::: :::row:::
@ -81,11 +81,11 @@ When planning the BitLocker recovery process, first consult the organization's c
| :ballot_box_with_check: | Question | | :ballot_box_with_check: | Question |
|--|--| |--|--|
| :black_square_button: | *How does the organization handle lost or forgotted passwords?* | | :black_square_button: | *How does the organization handle lost or forgotten passwords?* |
| :black_square_button: | *How does the organization perform smart card PIN resets?* | | :black_square_button: | *How does the organization perform smart card PIN resets?* |
| :black_square_button: | *Are users allowed to save or retrieve recovery information for the devices that they own?* | | :black_square_button: | *Are users allowed to save or retrieve recovery information for the devices that they own?* |
Answering the questions helps to determine the best BitLocker recovery process for the organization, and to configure BitLocker policy settings accordingly. For example, if the organization has a process for resetting passwords, a similar process can be used for BitLocker recovery. If users aren't allowed to save or retrieve recovery information, the organization can use a data recovery agents (DRAs) or automatically back up recovery information to Microsoft Entra ID or Active Directory Domain Services (AD DS). Answering the questions helps to determine the best BitLocker recovery process for the organization, and to configure BitLocker policy settings accordingly. For example, if the organization has a process for resetting passwords, a similar process can be used for BitLocker recovery. If users aren't allowed to save or retrieve recovery information, the organization can use a data recovery agents (DRAs), or automatically back up recovery information.
The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive: The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive:
@ -97,12 +97,12 @@ The following policy settings define the recovery methods that can be used to re
To recover BitLocker, a user can use a recovery password, if available. The BitLocker recovery password is unique to the device it was created on, and can be saved in different ways. Depending on the configured policy settings, the recovery password can be: To recover BitLocker, a user can use a recovery password, if available. The BitLocker recovery password is unique to the device it was created on, and can be saved in different ways. Depending on the configured policy settings, the recovery password can be:
- saved in Microsoft Entra ID, for Microsoft Entra joined and Microsoft Entra hybrid joined devices - Saved in Microsoft Entra ID, for Microsoft Entra joined
- saved in AD DS, for devices that are joined to Active Directory - Saved in AD DS, for devices that are joined to Active Directory
- saved on text file - Saved on text file
- printed - Printed
Having access to the recovery password allows the holder to unlock a BitLocker-protected volume and access all of its data. Therefore, it's important for your organization to establish procedures to control access to recovery passwords and ensure that they are stored securely, separate from the devices they protect. Having access to the recovery password allows the holder to unlock a BitLocker-protected volume and access all of its data. Therefore, it's important for your organization to establish procedures to control access to recovery passwords and ensure that they're stored securely, separate from the devices they protect.
> [!NOTE] > [!NOTE]
> There's an option for storing the BitLocker recovery key in a user's Microsoft account. This option is available for devices that aren't members of a domain and that the user is using a Microsoft account. Storing the recovery password in a Microsoft account is the default recommended recovery key storage method for devices that aren't Microsoft Entra joined or Active Directory joined. > There's an option for storing the BitLocker recovery key in a user's Microsoft account. This option is available for devices that aren't members of a domain and that the user is using a Microsoft account. Storing the recovery password in a Microsoft account is the default recommended recovery key storage method for devices that aren't Microsoft Entra joined or Active Directory joined.
@ -124,11 +124,11 @@ The benefit of using a DRA over password or key recovery is that the DRA acts as
To configure DRAs for devices that are joined to an Active Directory domain, the following steps are required: To configure DRAs for devices that are joined to an Active Directory domain, the following steps are required:
1. Obtain a DRA certificate. The following key usage and enhanced key usage attributes are inspected by BitLocker before using the certificate. 1. Obtain a DRA certificate. The following key usage and enhanced key usage attributes are inspected by BitLocker before using the certificate.
1. If a key usage attribute is present, it must be one of the following: 1. If a key usage attribute is present, it must be either:
- `CERT_DATA_ENCIPHERMENT_KEY_USAGE` - `CERT_DATA_ENCIPHERMENT_KEY_USAGE`
- `CERT_KEY_AGREEMENT_KEY_USAGE` - `CERT_KEY_AGREEMENT_KEY_USAGE`
- `CERT_KEY_ENCIPHERMENT_KEY_USAGE` - `CERT_KEY_ENCIPHERMENT_KEY_USAGE`
1. If an enhanced key usage (EKU) attribute is present, it must be one of the following: 1. If an enhanced key usage (EKU) attribute is present, it must be either:
- As specified in the policy setting, or the default `1.3.6.1.4.1.311.67.1.1` - As specified in the policy setting, or the default `1.3.6.1.4.1.311.67.1.1`
- Any EKU object identifier supported by your certification authority (CA) - Any EKU object identifier supported by your certification authority (CA)
1. Add the DRA via group policy using the path: **Computer configuration** > **Policies** > **Windows Settings** > **Security Settings** > **Public Key Policies** > **BitLocker Drive Encryption** 1. Add the DRA via group policy using the path: **Computer configuration** > **Policies** > **Windows Settings** > **Security Settings** > **Public Key Policies** > **BitLocker Drive Encryption**
@ -144,7 +144,7 @@ The BitLocker recovery information for Microsoft Entra joined devices can be sto
Access to recovery passwords can also be delegated to the help desk, to facilitate support scenarios. Access to recovery passwords can also be delegated to the help desk, to facilitate support scenarios.
The BitLocker recovery password information is a `bitlockerRecoveryKey` resource type. The resource can be retrieved from the Microsoft Entra portal, the Microsoft Intune admin center (for devices enrolled in Microsoft Intune), using PowerShell, or using Microsoft Graph. For more information, see [bitlockerRecoveryKey resource type](/graph/api/resources/bitlockerrecoverykeystored). The BitLocker recovery password information stored in Microsoft Entra ID is a `bitlockerRecoveryKey` resource type. The resource can be retrieved from the Microsoft Entra admin center, the Microsoft Intune admin center (for devices enrolled in Microsoft Intune), using PowerShell, or using Microsoft Graph. For more information, see [bitlockerRecoveryKey resource type](/graph/api/resources/bitlockerrecoverykey).
## BitLocker recovery information stored in AD DS ## BitLocker recovery information stored in AD DS
@ -162,7 +162,7 @@ The common name (cn) for the BitLocker recovery object is `ms-FVE-RecoveryInform
|`ms-FVE-RecoveryPassword`| The 48-digit recovery password used to recover a BitLocker-encrypted disk volume.| |`ms-FVE-RecoveryPassword`| The 48-digit recovery password used to recover a BitLocker-encrypted disk volume.|
|`ms-FVE-RecoveryGuid`| GUID associated with a BitLocker recovery password. In BitLocker's recovery mode, the GUID is displayed to the user, so that the correct recovery password can be located to unlock the volume. The GUID is also included in the name of the recovery object.| |`ms-FVE-RecoveryGuid`| GUID associated with a BitLocker recovery password. In BitLocker's recovery mode, the GUID is displayed to the user, so that the correct recovery password can be located to unlock the volume. The GUID is also included in the name of the recovery object.|
|`ms-FVE-VolumeGuid`| GUID associated with a BitLocker-supported disk volume. While the password (stored in `ms-FVE-RecoveryGuid`) is unique for each recovery password, the volume identifier is unique for each BitLocker-encrypted volume.| |`ms-FVE-VolumeGuid`| GUID associated with a BitLocker-supported disk volume. While the password (stored in `ms-FVE-RecoveryGuid`) is unique for each recovery password, the volume identifier is unique for each BitLocker-encrypted volume.|
|`ms-FVE-KeyPackage`| Volume's BitLocker encryption key secured by the corresponding recovery password. With this key package and the recovery password (stored in `ms-FVE-RecoveryPassword`), portions of a BitLocker-protected volume can be decrypted if the disk is corrupted. Each key package will work only for a volume that has the corresponding volume identifier (stored in `ms-FVE-VolumeGuid`). The BitLocker Repair Tool can be used to make use of the key package.| |`ms-FVE-KeyPackage`| Volume's BitLocker encryption key secured by the corresponding recovery password. With this key package and the recovery password (stored in `ms-FVE-RecoveryPassword`), portions of a BitLocker-protected volume can be decrypted if the disk is corrupted. Each key package works only for a volume that has the corresponding volume identifier (stored in `ms-FVE-VolumeGuid`). The BitLocker Repair Tool can be used to make use of the key package.|
To learn more about the BitLocker attributes stored in AD DS, review the following articles: To learn more about the BitLocker attributes stored in AD DS, review the following articles:
@ -171,7 +171,7 @@ To learn more about the BitLocker attributes stored in AD DS, review the followi
The BitLocker key package isn't saved by default. To save the package along with the recovery password in AD DS, the **Backup recovery password and key package** policy setting must be selected in the policy that controls the recovery method. The key package can also be exported from a working volume. The BitLocker key package isn't saved by default. To save the package along with the recovery password in AD DS, the **Backup recovery password and key package** policy setting must be selected in the policy that controls the recovery method. The key package can also be exported from a working volume.
If recovery information is not backed up to AD DS, or if you want to save a key package in an alternative location, use the following command to generate a key package for a volume: If recovery information isn't backed up to AD DS, or if you want to save a key package in an alternative location, use the following command to generate a key package for a volume:
``` cmd ``` cmd
manage-bde.exe -KeyPackage C: -id <id> -path <path> manage-bde.exe -KeyPackage C: -id <id> -path <path>
@ -185,6 +185,6 @@ A file with a file name format of `BitLocker Key Package {<id>}.KPG` is created
## Next steps ## Next steps
> [!div class="nextstepaction"] > [!div class="nextstepaction"]
> Learn how to obtain BitLocker recovery information for Microsoft Entra joined, Microsoft Entra hybrid joined, and Active Directory joined devices, and how to restore access to a locked drive. > Learn how to obtain BitLocker recovery information for Microsoft Entra joined, Microsoft Entra hybrid joined, and Active Directory joined devices, and how to restore access to a locked drive:
> >
> [BitLocker recovery process >](recovery-process.md) > [BitLocker recovery process >](recovery-process.md)

View File

@ -97,7 +97,7 @@ Scan the event log to find events that help indicate why recovery was initiated
### Resolve the root cause ### Resolve the root cause
After it has been identified what caused recovery, BitLocker protection can be reset to avoid recovery on every startup. After it's been identified what caused recovery, BitLocker protection can be reset to avoid recovery on every startup.
The details of this reset can vary according to the root cause of the recovery. If root cause can't be determined, or if a malicious software or a rootkit infects the device, Helpdesk should apply best-practice virus policies to react appropriately. The details of this reset can vary according to the root cause of the recovery. If root cause can't be determined, or if a malicious software or a rootkit infects the device, Helpdesk should apply best-practice virus policies to react appropriately.
@ -149,14 +149,6 @@ For examples how to suspend and resume BitLocker protectors, review the [BitLock
:::column-end::: :::column-end:::
:::row-end::: :::row-end:::
## Windows RE and device encryption
Windows Recovery Environment (RE) can be used to recover access to a drive protected by BitLocker. If a device is unable to boot after two failures, *Startup Repair* automatically starts. When Startup Repair is launched automatically due to boot failures, it executes only operating system and driver file repairs if the boot logs or any available crash dump points to a specific corrupted file. Devices that include firmware to support specific TPM measurements for *PCR 7*, the TPM can validate that Windows RE is a trusted operating environment and unlock any BitLocker-protected drives if Windows RE hasn't been modified. If the Windows RE environment has been modified, for example, the TPM has been disabled, the drives stay locked until the BitLocker recovery key is provided. If Startup Repair isn't able to run automatically from the device and instead, Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker-protected drives.
Windows RE also asks for a BitLocker recovery key when a **Remove everything** reset from Windows RE is started on a device that uses **TPM + PIN** or **Password for OS drive** protectors. If BitLocker recovery is started on a keyboardless device with TPM-only protection, Windows RE, not the boot manager, asks for the BitLocker recovery key. After the key is entered, Windows RE troubleshooting tools can be accessed, or Windows can be started normally.
### Retrieve the recovery password from Microsoft Entra ID ### Retrieve the recovery password from Microsoft Entra ID
``` PowerShell ``` PowerShell
@ -284,8 +276,6 @@ The following limitations exist for Repair-bde:
For a complete list of the `repair-bde.exe` options, see the [Repair-bde reference](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/ff829851(v=ws.11)). For a complete list of the `repair-bde.exe` options, see the [Repair-bde reference](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/ff829851(v=ws.11)).
### Microsoft Entra ID
#### Data Recovery Agents #### Data Recovery Agents
To list data recovery agents configured for a BitLocker-protected drive, use the `manage-bde.exe` command, including certificate-based protectors. Example: To list data recovery agents configured for a BitLocker-protected drive, use the `manage-bde.exe` command, including certificate-based protectors. Example: