diff --git a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md index 502fcf5b27..2d79a22931 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md @@ -120,7 +120,7 @@ This policy setting allows users of devices that are compliant with Modern Stand
Policy path
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives
Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives
Conflicts
Policy path
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives
Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives
Conflicts
Policy path
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives
Conflicts
Policy path
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives
Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives
Conflicts
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
Passwords cannot be used if FIPS-compliance is enabled.
-Note
The System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing policy setting, which is located at Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options, specifies whether FIPS-compliance is enabled. +NoteThe System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing policy setting, which is located at Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options, specifies whether FIPS-compliance is enabled.
@@ -536,7 +536,7 @@ This policy setting is used to determine the unlock options that would be made a
| |||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -600,11 +600,11 @@ This policy setting is used to require, allow, or deny the use of smart cards wi
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
-To use smart cards with BitLocker, you may also need to modify the object identifier setting in the Computer Configuration\Administrative Templates\BitLocker Drive Encryption\Validate smart card certificate usage rule compliance policy setting to match the object identifier of your smart card certificates. |
+To use smart cards with BitLocker, you may also need to modify the object identifier setting in the Computer Configuration\\Administrative Templates\\BitLocker Drive Encryption\\Validate smart card certificate usage rule compliance policy setting to match the object identifier of your smart card certificates. |
||
When enabled |
@@ -649,11 +649,11 @@ This policy setting is used to require, allow, or deny the use of passwords with
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
-To use password complexity, the Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Password must meet complexity requirements policy setting must also be enabled. |
+To use password complexity, the Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements policy setting must also be enabled. |
||
When enabled |
@@ -685,9 +685,9 @@ Passwords must be at least 8 characters. To configure a greater minimum length f
For the complexity requirement setting to be effective, the group policy setting **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements** must also be enabled.
This policy setting is configured on a per-computer basis. This means that it applies to local user accounts and domain user accounts. Because the password filter that is used to validate password complexity is located on the domain controllers, local user accounts cannot access the password filter because they are not authenticated for domain access. When this policy setting is enabled, if you sign in with a local user account, and you attempt to encrypt a drive or change a password on an existing BitLocker-protected drive, an "Access denied" error message is displayed. In this situation, the password key protector cannot be added to the drive.
-Enabling this policy setting requires a connectivity to be established to a domain before adding a password key protector to a BitLocker-protected drive. Users who work remotely and have periods of time in which they cannot connect to the domain should be made aware of this requirement so that they can schedule a time during which they will be connected to the domain to turn on BitLocker or to change a password on a BitLocker-protected data drive.
+Enabling this policy setting requires a connectivity to be established to a domain before adding a password key protector to a BitLocker-protected drive. Users who work remotely and have periods of time in which they cannot connect to the domain must be made aware of this requirement so that they can schedule a time during which they will be connected to the domain to turn on BitLocker or to change a password on a BitLocker-protected data drive.
->**Important:** Passwords cannot be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
+>**Important:** Passwords cannot be used if FIPS-compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS-compliance is enabled.
### Configure use of smart cards on removable data drives
@@ -713,7 +713,7 @@ This policy setting is used to require, allow, or deny the use of smart cards wi
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -762,11 +762,11 @@ This policy setting is used to require, allow, or deny the use of passwords with
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives/b> |
||
Conflicts |
-To use password complexity, the Password must meet complexity requirements policy setting, which is located at Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy, must also be enabled. |
+To use password complexity, the Password must meet complexity requirements policy setting, which is located at Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy, must also be enabled. |
||
When enabled |
@@ -798,7 +798,7 @@ When set to **Allow complexity**, a connection to a domain controller is be atte
When set to **Do not allow complexity**, no password complexity validation is done.
->**Note:** Passwords cannot be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
+>**Note:** Passwords cannot be used if FIPS-compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS-compliance is enabled.
For information about this setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](https://technet.microsoft.com/library/jj852211.aspx).
@@ -826,7 +826,7 @@ This policy setting is used to determine the certificate that is to be used with
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -877,7 +877,7 @@ This policy setting allows users to enable authentication options that require u
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drive |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drive |
||
Conflicts |
@@ -932,7 +932,7 @@ This policy setting is used to make encryption of fixed drives mandatory prior t
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
@@ -961,7 +961,7 @@ Conflict considerations include:
- If you attempted to shrink the drive and create the system drive, the drive size is successfully reduced and a raw partition is created. However, the raw partition is not formatted. The following error message is displayed: "The new active drive cannot be formatted. You may need to manually prepare your drive for BitLocker."
- If you attempt to use unallocated space to create the system drive, a raw partition will be created. However, the raw partition will not be formatted. The following error message is displayed: "The new active drive cannot be formatted. You may need to manually prepare your drive for BitLocker."
- If you attempt to merge an existing drive into the system drive, the tool fails to copy the required boot file onto the target drive to create the system drive. The following error message is displayed: "BitLocker setup failed to copy boot files. You may need to manually prepare your drive for BitLocker."
-3. If this policy setting is enforced, a hard drive cannot be repartitioned because the drive is protected. If you are upgrading computers in your organization from a previous version of Windows, and those computers were configured with a single partition, you should create the required BitLocker system partition before you apply this policy setting to the computers.
+3. If this policy setting is enforced, a hard drive cannot be repartitioned because the drive is protected. If you are upgrading computers in your organization from a previous version of Windows, and those computers were configured with a single partition, you must create the required BitLocker system partition before you apply this policy setting to the computers.
### Deny write access to removable drives not protected by BitLocker
@@ -987,7 +987,7 @@ This policy setting is used to make it mandatory for removable drives to be encr
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -1040,7 +1040,7 @@ This policy setting is used to prevent users from turning BitLocker on or off on
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -1096,7 +1096,7 @@ This policy setting is used to control the encryption method and cipher strength
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -1120,7 +1120,7 @@ Enterprises may want to control the encryption level for increased security (AES
If you enable this setting, you will be able to configure an encryption algorithm and key cipher strength for fixed data drives, operating system drives, and removable data drives, individually.
For fixed and operating system drives, we recommend that you use the XTS-AES algorithm.
-For removable drives, you should use AES-CBC 128-bit or AES-CBC 256-bit if the drive will be used in other devices that are not running Windows 10, version 1511, or later.
+For removable drives, you must use AES-CBC 128-bit or AES-CBC 256-bit if the drive will be used in other devices that are not running Windows 10, version 1511, or later.
Changing the encryption method has no effect if the drive is already encrypted or if encryption is in progress. In these cases, this policy setting is ignored.
@@ -1152,7 +1152,7 @@ This policy controls how BitLocker reacts to systems that are equipped with encr
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
@@ -1207,7 +1207,7 @@ This policy controls how BitLocker reacts when encrypted drives are used as oper
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -1263,7 +1263,7 @@ This policy controls how BitLocker reacts to encrypted drives when they are used
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -1319,7 +1319,7 @@ This policy controls whether fixed data drives utilize Used Space Only encryptio
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
@@ -1368,7 +1368,7 @@ This policy controls whether operating system drives utilize Full encryption or
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -1417,7 +1417,7 @@ This policy controls whether fixed data drives utilize Full encryption or Used S
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -1466,7 +1466,7 @@ This policy setting is used to configure recovery methods for operating system d
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -1527,7 +1527,7 @@ This policy setting is used to configure recovery methods for BitLocker-protecte
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -1581,7 +1581,7 @@ This policy setting is used to configure the storage of BitLocker recovery infor
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -1639,7 +1639,7 @@ This policy setting is used to configure the default folder for recovery passwor
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -1686,7 +1686,7 @@ This policy setting is used to configure recovery methods for fixed data drives.
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
@@ -1747,7 +1747,7 @@ This policy setting is used to configure recovery methods for removable data dri
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -1805,7 +1805,7 @@ This policy setting is used to configure the entire recovery message and to repl
||||
Policy path |
-Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Operating System Drives \ Configure pre-boot recovery message and URL |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Configure pre-boot recovery message and URL |
||
Conflicts |
@@ -1860,7 +1860,7 @@ This policy controls how BitLocker-enabled system volumes are handled in conjunc
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -1909,7 +1909,7 @@ This policy setting is used to establish an identifier that is applied to all dr
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -1966,7 +1966,7 @@ This policy setting is used to control whether the computer's memory will be ove
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption |
||
Conflicts |
@@ -2011,7 +2011,7 @@ This policy setting determines the values that are measured by TPM when it valid
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -2086,7 +2086,7 @@ This policy setting determines the values that are measured by the TPM when it v
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -2161,12 +2161,12 @@ This policy setting determines the values to be measured by the TPM when it vali
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
Setting this policy with PCR 7 omitted results in an override of the Allow Secure Boot for integrity validation group policy setting, and this new setting prevents BitLocker from using secure boot for platform or Boot Configuration Data (BCD) integrity validation. -If your environments use TPM and secure boot for platform integrity checks, this policy should not be configured. +If your environments use TPM and secure boot for platform integrity checks, this policy must not be configured. For more information about PCR 7, see Platform Configuration Register (PCR) in this topic. |
|||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -2285,7 +2285,7 @@ This policy setting determines specific Boot Configuration Data (BCD) settings t
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives |
||
Conflicts |
@@ -2334,7 +2334,7 @@ This policy setting is used to control whether access to drives is allowed by us
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Fixed Data Drives |
||
Conflicts |
@@ -2383,7 +2383,7 @@ This policy setting controls access to removable data drives that are using the
||||
Policy path |
-Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives |
+Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Removable Data Drives |
||
Conflicts |
@@ -2408,7 +2408,7 @@ When this policy setting is enabled, select the **Do not install BitLocker To Go
## FIPS setting
-You can configure the Federal Information Processing Standard (FIPS) setting for FIPS compliance. As an effect of FIPS compliance, users cannot create or save a BitLocker password for recovery or as a key protector. The use of a recovery key is permitted.
+You can configure the Federal Information Processing Standard (FIPS) setting for FIPS-compliance. As an effect of FIPS-compliance, users cannot create or save a BitLocker password for recovery or as a key protector. The use of a recovery key is permitted.
Policy path |
-Local Policies\Security Options\System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing |
+ Local Policies\\Security Options\\System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing |
Conflicts |
@@ -2449,7 +2449,7 @@ You can configure the Federal Information Processing Standard (FIPS) setting for
Reference
-This policy needs to be enabled before any encryption key is generated for BitLocker. Note that when this policy is enabled, BitLocker prevents creating or using recovery passwords; therefore, recovery keys should be used, instead.
+This policy needs to be enabled before any encryption key is generated for BitLocker. Note that when this policy is enabled, BitLocker prevents creating or using recovery passwords; therefore, recovery keys must be used, instead.
You can save the optional recovery key to a USB drive. Because recovery passwords cannot be saved to AD DS when FIPS is enabled, an error is caused if AD DS backup is required by group policy.