|
|
|
@ -19,53 +19,53 @@ sections:
|
|
|
|
|
answer: Two partitions are required to run BitLocker because pre-startup authentication and system integrity verification must occur on a separate partition from the encrypted operating system drive. This configuration helps protect the operating system and the information in the encrypted drive.
|
|
|
|
|
|
|
|
|
|
- question: How can I tell if a computer has a TPM?
|
|
|
|
|
answer: The TPM status can be checked in **Windows Defender Security Center** > **Device Security** > **Security processor details**.
|
|
|
|
|
answer: The TPM status can be checked in **Windows Defender Security Center** > **Device Security** > **Security processor details**.
|
|
|
|
|
|
|
|
|
|
- question: Can I use BitLocker on an operating system drive without a TPM?
|
|
|
|
|
answer: |
|
|
|
|
|
Yes, BitLocker can be enabled on an operating system drive without a TPM, if the BIOS or UEFI firmware has the ability to read from a USB flash drive in the boot environment. BitLocker won't unlock the protected drive until BitLocker's own volume master key is first released by either the computer's TPM or by a USB flash drive containing the BitLocker startup key for that computer. However, computers without TPMs won't be able to use the system integrity verification that BitLocker can also provide.
|
|
|
|
|
To help determine whether a computer can read from a USB device during the boot process, use the BitLocker system check as part of the BitLocker setup process. This system check performs tests to confirm that the computer can properly read from the USB devices at the appropriate time and that the computer meets other BitLocker requirements.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: How do I obtain BIOS support for the TPM on my computer?
|
|
|
|
|
answer: |
|
|
|
|
|
Contact the computer manufacturer to request a Trusted Computing Group (TCG)-compliant BIOS or UEFI boot firmware that meets the following requirements:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- It's compliant with the TCG standards for a client computer
|
|
|
|
|
- It has a secure update mechanism to help prevent a malicious BIOS or boot firmware from being installed on the computer
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: What user rights are required to use BitLocker?
|
|
|
|
|
answer: To turn on, turn off, or change configurations of BitLocker on operating system and fixed data drives, membership to the local *Administrators* group is required. Standard users can turn on, turn off, or change configurations of BitLocker on removable data drives.
|
|
|
|
|
|
|
|
|
|
- question: What is the recommended boot order for computers that are going to be BitLocker-protected?
|
|
|
|
|
answer: The computer's startup options should be configured to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk isn't first and the computer typically boots from the hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause a prompt for the BitLocker recovery key. For the same reason, if a laptop is used with a docking station, ensure that the hard disk drive is first in the boot order both when the laptop is docked and undocked.
|
|
|
|
|
answer: The computer's startup options should be configured to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk isn't first and the computer typically boots from the hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause a prompt for the BitLocker recovery key. For the same reason, if a laptop is used with a docking station, ensure that the hard disk drive is first in the boot order both when the laptop is docked and undocked.
|
|
|
|
|
|
|
|
|
|
- name: BitLocker and Windows upgrade
|
|
|
|
|
questions:
|
|
|
|
|
- question: |
|
|
|
|
|
Can I upgrade Windows versions with BitLocker enabled?
|
|
|
|
|
answer: |
|
|
|
|
|
Yes.
|
|
|
|
|
Yes.
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What is the difference between suspending and decrypting BitLocker?
|
|
|
|
|
answer: |
|
|
|
|
|
*Decrypt* completely removes BitLocker protection and fully decrypts the drive.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*Suspend* keeps the data encrypted but encrypts the BitLocker volume master key with a clear key. The clear key is a cryptographic key stored unencrypted and unprotected on the disk drive. By storing this key unencrypted, the *Suspend* option allows for changes or upgrades to the computer without the time and cost of decrypting and re-encrypting the entire drive. After the changes are made and BitLocker is again enabled, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade, the volume master key is changed, the protectors are updated to match and the clear key is erased.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
Do I have to suspend BitLocker protection to download and install system updates and upgrades?
|
|
|
|
|
answer: |
|
|
|
|
|
No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](/windows/deployment/update/waas-quick-start).
|
|
|
|
|
Users need to suspend BitLocker for Non-Microsoft software updates, such as:
|
|
|
|
|
|
|
|
|
|
No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](/windows/deployment/update/waas-quick-start).
|
|
|
|
|
Users need to suspend BitLocker for Non-Microsoft software updates, such as:
|
|
|
|
|
|
|
|
|
|
- Some TPM firmware updates if these updates clear the TPM outside of the Windows API. Not every TPM firmware update will clear the TPM. Users don't have to suspend BitLocker if the TPM firmware update uses Windows API to clear the TPM because in this case, BitLocker will be automatically suspended. It's recommended that users test their TPM firmware updates if they don't want to suspend BitLocker protection
|
|
|
|
|
- Non-Microsoft application updates that modify the UEFI\BIOS configuration
|
|
|
|
|
- Manual or third-party updates to secure boot databases (only if BitLocker uses Secure Boot for integrity validation)
|
|
|
|
|
- Manual or non-Microsoft updates to secure boot databases (only if BitLocker uses Secure Boot for integrity validation)
|
|
|
|
|
- Updates to UEFI\BIOS firmware, installation of additional UEFI drivers, or UEFI applications without using the Windows update mechanism (only if BitLocker doesn't use Secure Boot for integrity validation during updates)
|
|
|
|
|
- BitLocker can be checked if it uses Secure Boot for integrity validation with the command line `manage-bde.exe -protectors -get C:`. If Secure Boot for integrity validation is being used, it reports **Uses Secure Boot for integrity validation**
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
|
> If BitLocker is suspended, you can resume BitLocker protection after the upgrade or update is installed. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, the computer will enter recovery mode when restarting and will require a recovery key or password to access the computer.
|
|
|
|
|
|
|
|
|
@ -74,16 +74,16 @@ sections:
|
|
|
|
|
- question: Can BitLocker deployment be automated in an enterprise environment?
|
|
|
|
|
answer: |
|
|
|
|
|
Yes, the deployment and configuration BitLocker can be automated using either Windows PowerShell or with the `manage-bde.exe` command. For more information about common BitLocker management commands, check the [BitLocker operations guide](operations-guide.md).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: Is there a noticeable performance impact when BitLocker is enabled on a computer?
|
|
|
|
|
answer: Typically, there's a small performance overhead, often in single-digit percentages, which is relative to the throughput of the storage operations on which it needs to operate.
|
|
|
|
|
|
|
|
|
|
- question: How long will initial encryption take when BitLocker is turned on?
|
|
|
|
|
answer: |
|
|
|
|
|
Although BitLocker encryption occurs in the background while a user continues to work with the system remaining usable, encryption times vary depending on the type of drive that is being encrypted, the size of the drive, and the speed of the drive. If encrypting large drives, encryption may want to be scheduled during times when the drive isn't being used.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When BitLocker is enabled, BitLocker can also be set to encrypt the entire drive or just the used space on the drive. On a new hard drive, encrypting just the used spaced can be considerably faster than encrypting the entire drive. When this encryption option is selected, BitLocker automatically encrypts data as it is saved, ensuring that no data is stored unencrypted.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: What happens if the computer is turned off during encryption or decryption?
|
|
|
|
|
answer: If the computer is turned off or goes into hibernation, the BitLocker encryption and decryption process will resume where it stopped the next time Windows starts. BitLocker resuming encryption or decryption is true even if the power is suddenly unavailable.
|
|
|
|
|
|
|
|
|
@ -94,35 +94,35 @@ sections:
|
|
|
|
|
answer: |
|
|
|
|
|
Policy settings can be configured to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker policy settings](configure.md).
|
|
|
|
|
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that aren't protected by BitLocker as read-only.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What is Used Disk Space Only encryption?
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](planning-guide.md#used-disk-space-only-encryption).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What system changes would cause the integrity check on the OS drive to fail?
|
|
|
|
|
answer: |
|
|
|
|
|
The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Moving the BitLocker-protected drive into a new computer
|
|
|
|
|
- Installing a new motherboard with a new TPM
|
|
|
|
|
- Turning off, disabling, or clearing the TPM
|
|
|
|
|
- Changing any boot configuration settings
|
|
|
|
|
- Changing the BIOS, UEFI firmware, master boot record, boot sector, boot manager, option ROM, or other early boot components or boot configuration data
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: What causes BitLocker to start into recovery mode when attempting to start the operating system drive?
|
|
|
|
|
answer: |
|
|
|
|
|
Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode.
|
|
|
|
|
For example:
|
|
|
|
|
|
|
|
|
|
Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode.
|
|
|
|
|
For example:
|
|
|
|
|
|
|
|
|
|
- Changing the BIOS boot order to boot another drive in advance of the hard drive
|
|
|
|
|
- Adding or removing hardware, such as inserting a new card in the computer
|
|
|
|
|
- Removing, inserting, or completely depleting the charge on a smart battery on a portable computer
|
|
|
|
|
|
|
|
|
|
In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password.
|
|
|
|
|
|
|
|
|
|
In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password.
|
|
|
|
|
The TPM isn't involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: What can prevent BitLocker from binding to PCR 7?
|
|
|
|
|
answer: BitLocker can be prevented from binding to PCR 7 if a non-Windows OS booted prior to Windows, or if Secure Boot isn't available to the device, either because it's disabled or the hardware doesn't support it.
|
|
|
|
|
|
|
|
|
@ -139,15 +139,15 @@ sections:
|
|
|
|
|
answer: Any number of internal, fixed data drives can be protected with BitLocker. On some versions ATA and SATA-based, direct-attached storage devices are also supported.
|
|
|
|
|
|
|
|
|
|
- name: Key Management
|
|
|
|
|
questions:
|
|
|
|
|
questions:
|
|
|
|
|
- question: How can I authenticate or unlock my removable data drive?
|
|
|
|
|
answer: |
|
|
|
|
|
Removable data drives can be unlocked using a password or a smart card. A SID protector can also be configured to unlock a drive by using user domain credentials. After encryption has started, the drive can also be automatically unlocked on a specific computer for a specific user account. System administrators can configure which options are available for users including password complexity and minimum length requirements. To unlock by using a SID protector, use `manage-bde.exe`:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```cmd
|
|
|
|
|
Manage-bde.exe -protectors -add e: -sid domain\username
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: What is the difference between a TPM owner password, recovery password, recovery key, PIN, enhanced PIN, and startup key?
|
|
|
|
|
answer: |
|
|
|
|
|
There are multiple keys that can be generated and used by BitLocker. Some keys are required and some are optional protectors you can choose to use depending on the level of security you require.
|
|
|
|
@ -164,7 +164,7 @@ sections:
|
|
|
|
|
- A key file on a USB flash drive that is read directly by the BitLocker recovery console. During recovery, you need to insert this USB device
|
|
|
|
|
|
|
|
|
|
**PIN and enhanced PIN**
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For a higher level of security with the TPM, you can configure BitLocker with a personal identification number (PIN). The PIN is a user-created value that must be entered each time the computer starts or resumes from hibernation. The PIN can consist of 4 to 20 digits as specified by the *Configure minimum PIN length for startup* policy setting and is stored internally as a 256-bit hash of the entered Unicode characters. This value is never displayed to the user. The PIN is used to provide another factor of authentication in conjunction with TPM authentication.\
|
|
|
|
|
For an even higher level of security with the TPM, you can configure BitLocker to use enhanced PINs. Enhanced PINs are PINs that use the full keyboard character set in addition to the numeric set to allow for more possible PIN combinations and are between 4 and 20 characters in length. To use enhanced PINs, you must enable the *Allow enhanced PINs for startup* policy setting before adding the PIN to the drive. By enabling this policy, all PINs created can utilize full keyboard characters.
|
|
|
|
|
|
|
|
|
@ -178,15 +178,15 @@ sections:
|
|
|
|
|
- question: How can the recovery password and recovery key be stored?
|
|
|
|
|
answer: |
|
|
|
|
|
The recovery password and recovery key for an operating system drive or a fixed data drive can be saved to a folder, saved to one or more USB devices, saved to a Microsoft Account, or printed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For removable data drives, the recovery password and recovery key can be saved to a folder, saved to a Microsoft Account, or printed. By default, a recovery key for a removable drive can't be stored on a removable drive.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A domain administrator can also configure policy settings to automatically generate recovery passwords and store them in Active Directory Domain Services (AD DS) or Microsoft Entra ID for any BitLocker-protected drive.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: Is it possible to add an additional method of authentication without decrypting the drive if I only have the TPM authentication method enabled?
|
|
|
|
|
answer: |
|
|
|
|
|
The `Manage-bde.exe` command-line tool can be used to replace TPM-only authentication mode with a multifactor authentication mode. For example, if BitLocker is enabled with TPM authentication only and PIN authentication needs to be added, use the following commands from an elevated Command Prompt, replacing *4-20 digit numeric PIN* with the desired numeric PIN:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```cmd
|
|
|
|
|
manage-bde.exe -protectors -delete %systemdrive% -type tpm
|
|
|
|
|
|
|
|
|
@ -195,13 +195,13 @@ sections:
|
|
|
|
|
|
|
|
|
|
- question: When should an additional method of authentication be considered?
|
|
|
|
|
answer: |
|
|
|
|
|
New hardware that meets [Windows Hardware Compatibility Program](/windows-hardware/design/compatibility/) requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book don't have external DMA ports to attack.
|
|
|
|
|
For older hardware, where a PIN may be needed, it's recommended to enable [enhanced PINs](configure.md) that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on the risk tolerance and the hardware anti-hammering capabilities available to the TPMs on the computers.
|
|
|
|
|
|
|
|
|
|
New hardware that meets [Windows Hardware Compatibility Program](/windows-hardware/design/compatibility/) requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book don't have external DMA ports to attack.
|
|
|
|
|
For older hardware, where a PIN may be needed, it's recommended to enable [enhanced PINs](configure.md) that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on the risk tolerance and the hardware anti-hammering capabilities available to the TPMs on the computers.
|
|
|
|
|
|
|
|
|
|
- question: If I lose my recovery information, will the BitLocker-protected data be unrecoverable?
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker is designed to make the encrypted drive unrecoverable without the required authentication. When in recovery mode, the user needs the recovery password or recovery key to unlock the encrypted drive.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
|
> Store the recovery information in Microsoft Entra ID, AD DS, Microsoft Account, or another safe location.
|
|
|
|
|
|
|
|
|
@ -226,39 +226,39 @@ sections:
|
|
|
|
|
- question: Where are the encryption keys stored?
|
|
|
|
|
answer: |
|
|
|
|
|
The full volume encryption key is encrypted by the volume master key and stored in the encrypted drive. The volume master key is encrypted by the appropriate key protector and stored in the encrypted drive. If BitLocker has been suspended, the clear key that is used to encrypt the volume master key is also stored in the encrypted drive, along with the encrypted volume master key.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This storage process ensures that the volume master key is never stored unencrypted and is protected unless BitLocker is disabled. The keys are also saved to two additional locations on the drive for redundancy. The keys can be read and processed by the boot manager.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: Why do I have to use the function keys to enter the PIN or the 48-character recovery password?
|
|
|
|
|
answer: |
|
|
|
|
|
The F1 through F10 keys are universally mapped scan codes available in the pre-boot environment on all computers and in all languages. The numeric keys 0 through 9 aren't usable in the pre-boot environment on all keyboards.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When using an enhanced PIN, users should run the optional system check during the BitLocker setup process to ensure that the PIN can be entered correctly in the pre-boot environment.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: How does BitLocker help prevent an attacker from discovering the PIN that unlocks my operating system drive?
|
|
|
|
|
answer: |
|
|
|
|
|
It's possible that a personal identification number (PIN) can be discovered by an attacker performing a brute force attack. A brute force attack occurs when an attacker uses an automated tool to try different PIN combinations until the correct one is discovered. For BitLocker-protected computers, this type of attack, also known as a dictionary attack, requires that the attacker has physical access to the computer.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The TPM has the built-in ability to detect and react to these types of attacks. Because different manufacturers' TPMs may support different PIN and attack mitigations, contact the TPM's manufacturer to determine how the computer's TPM mitigates PIN brute force attacks.
|
|
|
|
|
After the TPM's manufacturer is determined, contact the manufacturer to gather the TPM's vendor-specific information. Most manufacturers use the PIN authentication failure count to exponentially increase lockout time to the PIN interface. However, each manufacturer has different policies regarding when and how the failure counter is decreased or reset.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: How can I determine the manufacturer of my TPM?
|
|
|
|
|
answer: The TPM manufacturer can be determined in **Windows Defender Security Center** > **Device Security** > **Security processor details**.
|
|
|
|
|
|
|
|
|
|
- question: How can I evaluate a TPM's dictionary attack mitigation mechanism?
|
|
|
|
|
answer: |
|
|
|
|
|
The following questions can assist when asking a TPM manufacturer about the design of a dictionary attack mitigation mechanism:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- How many failed authorization attempts can occur before lockout?
|
|
|
|
|
- What is the algorithm for determining the duration of a lockout based on the number of failed attempts and any other relevant parameters?
|
|
|
|
|
- What actions can cause the failure count and lockout duration to be decreased or reset?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: Can PIN length and complexity be managed with policy settings?
|
|
|
|
|
answer: |
|
|
|
|
|
The minimum personal identification number (PIN) length can be configured by using the **Configure minimum PIN length for startup** Group Policy setting and allow the use of alphanumeric PINs by enabling the **Allow enhanced PINs for startup** policy setting. PIN complexity can't be required via policy settings.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For more info, see [BitLocker policy settings](configure.md).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: How are the PIN and TPM used to derive the volume master key?
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker hashes the user-specified personal identification number (PIN) by using SHA-256, and the first 160 bits of the hash are used as authorization data sent to the TPM to seal the volume master key. The volume master key is now protected by both the TPM and the PIN. To unseal the volume master key, you are required to enter the PIN each time the computer restarts or resumes from hibernation.
|
|
|
|
@ -267,18 +267,18 @@ sections:
|
|
|
|
|
questions:
|
|
|
|
|
- question: What is BitLocker To Go?
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of:
|
|
|
|
|
|
|
|
|
|
BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of:
|
|
|
|
|
|
|
|
|
|
- USB flash drives
|
|
|
|
|
- SD cards
|
|
|
|
|
- External hard disk drives
|
|
|
|
|
- Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system.
|
|
|
|
|
- Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system.
|
|
|
|
|
|
|
|
|
|
Drive partitioning must meet the [BitLocker Drive Encryption Partitioning Requirements](/windows-hardware/manufacture/desktop/bitlocker-drive-encryption#bitlocker-drive-encryption-partitioning-requirements).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
As with BitLocker, drives that are encrypted by BitLocker To Go can be opened by using a password or smart card on another computer. In Control Panel, use **BitLocker Drive Encryption**.
|
|
|
|
|
|
|
|
|
|
- name: BitLocker and Active Directory Domain Services (AD DS)
|
|
|
|
|
- name: BitLocker and Active Directory Domain Services (AD DS)
|
|
|
|
|
questions:
|
|
|
|
|
- question: |
|
|
|
|
|
What type of information is stored in AD DS?
|
|
|
|
@ -286,15 +286,15 @@ sections:
|
|
|
|
|
Stored information | Description
|
|
|
|
|
-------------------|------------
|
|
|
|
|
BitLocker recovery password | The recovery password allows unlocking of and access to the drive after a recovery incident. Domain administrators can view the BitLocker recovery password by using the BitLocker Recovery Password Viewer. For more information about this tool, see [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md).
|
|
|
|
|
BitLocker key package | The key package helps to repair damage to the hard disk that would otherwise prevent standard recovery. Using the key package for recovery requires the BitLocker Repair Tool, `Repair-bde`.
|
|
|
|
|
|
|
|
|
|
BitLocker key package | The key package helps to repair damage to the hard disk that would otherwise prevent standard recovery. Using the key package for recovery requires the BitLocker Repair Tool, `Repair-bde`.
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What if BitLocker is enabled on a computer before the computer joins the domain?
|
|
|
|
|
answer: |
|
|
|
|
|
If BitLocker is enabled on a drive before policy settings are applied to enforce a backup, the recovery information won't be automatically backed up to AD DS when the computer joins the domain or when the policy settings are subsequently applied. However, the policy settings **Choose how BitLocker-protected operating system drives can be recovered**, **Choose how BitLocker-protected fixed drives can be recovered**, and **Choose how BitLocker-protected removable drives can be recovered** can be chosen to require the computer to be connected to a domain before BitLocker can be enabled to help ensure that recovery information for BitLocker-protected drives in the organization is backed up to AD DS.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For more information how to back up the recovery password to AD DS or Microsoft Entra ID, review the [BitLocker operations guide](operations-guide.md).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
|
> Joining a computer to the domain should be the first step for new computers within an organization. After computers are joined to a domain, storing the BitLocker recovery key to AD DS is automatic (when enabled with policy settings).
|
|
|
|
|
|
|
|
|
@ -302,9 +302,9 @@ sections:
|
|
|
|
|
Is there an event log entry recorded on the client computer to indicate the success or failure of the Microsoft Entra ID or Active Directory backup?
|
|
|
|
|
answer: |
|
|
|
|
|
Yes, an event log entry that indicates the success or failure of a backup is recorded on the client computer. However, even if an event log entry says "Success," the information could have been subsequently removed from AD DS, or BitLocker could have been reconfigured in such a way that the Active Directory information can no longer unlock the drive (such as by removing the recovery password key protector). In addition, it's also possible that the log entry could be spoofed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ultimately, determining whether a legitimate backup exists in AD DS requires querying AD DS with domain administrator credentials by using the BitLocker password viewer tool.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
If I change the BitLocker recovery password on my computer and store the new password in AD DS, will AD DS overwrite the old password?
|
|
|
|
|
answer: |
|
|
|
|
@ -314,11 +314,11 @@ sections:
|
|
|
|
|
What happens if the backup initially fails? Will BitLocker retry it?
|
|
|
|
|
answer: |
|
|
|
|
|
If the backup initially fails, such as when a domain controller is unreachable at the time when the BitLocker setup wizard is run, BitLocker doesn't try again to back up the recovery information to AD DS.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When an administrator selects the **Do not enable BitLocker until recovery information is stored in AD DS for (operating system | fixed data | removable data) drives** check box in any of the **Choose how BitLocker-protected operating system drives can be recovered**, **Choose how BitLocker-protected fixed data drives can be recovered**, and **Choose how BitLocker-protected removable data drives can be recovered** policy settings, users can't enable BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. With these settings configured if the backup fails, BitLocker can't be enabled, ensuring that administrators will be able to recover BitLocker-protected drives in the organization.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For more info, see [BitLocker policy settings](configure.md).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When an administrator clears these check boxes, the administrator is allowing a drive to be BitLocker-protected without having the recovery information successfully backed up to AD DS; however, BitLocker won't automatically retry the backup if it fails. Instead, administrators can create a backup script, as described earlier in [What if BitLocker is enabled on a computer before the computer joins the domain?](#what-if-bitlocker-is-enabled-on-a-computer-before-the-computer-joins-the-domain-) to capture the information after connectivity is restored.
|
|
|
|
|
|
|
|
|
|
- name: Security
|
|
|
|
@ -336,29 +336,29 @@ sections:
|
|
|
|
|
- question: |
|
|
|
|
|
What are the implications of using the sleep or hibernate power management options?
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker on operating system drives in its basic configuration provides extra security for the hibernate mode. In sleep mode, the computer is vulnerable to direct memory access attacks, since unprotected data remains in RAM. Therefore, for improved security, it's recommended to disable sleep mode. Startup authentication can be configured by using a [policy setting](configure.md).
|
|
|
|
|
|
|
|
|
|
BitLocker on operating system drives in its basic configuration provides extra security for the hibernate mode. In sleep mode, the computer is vulnerable to direct memory access attacks, since unprotected data remains in RAM. Therefore, for improved security, it's recommended to disable sleep mode. Startup authentication can be configured by using a [policy setting](configure.md).
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What are the advantages of a TPM?
|
|
|
|
|
answer: |
|
|
|
|
|
Most operating systems use a shared memory space and rely on the operating system to manage physical memory. A TPM is a hardware component that uses its own internal firmware and logic circuits for processing instructions, thus shielding it from external software vulnerabilities. Attacking the TPM requires physical access to the computer. Additionally, the tools and skills necessary to attack hardware are often more expensive, and usually aren't as available as the ones used to attack software. And because each TPM is unique to the computer that contains it, attacking multiple TPM computers would be difficult and time-consuming.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
|
> Configuring BitLocker with an additional factor of authentication provides even more protection against TPM hardware attacks.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- name: Network Unlock
|
|
|
|
|
questions:
|
|
|
|
|
- question: |
|
|
|
|
|
What is BitLocker Network Unlock?
|
|
|
|
|
answer: |
|
|
|
|
|
answer: |
|
|
|
|
|
BitLocker Network Unlock enables easier management for BitLocker-enabled clients and servers that use the TPM+PIN protection method in a domain environment. When a computer that is connected to a wired corporate network is rebooted, Network Unlock allows the PIN entry prompt to be bypassed. It automatically unlocks BitLocker-protected operating system volumes by using a trusted key that is provided by the Windows Deployment Services server as its secondary authentication method.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To use Network Unlock, a PIN must be configured for the computer. When the computer isn't connected to the network, a PIN will need to be provided to unlock it.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BitLocker Network Unlock has software and hardware requirements for both client computers, Windows Deployment services, and domain controllers that must be met before it can be used.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Network Unlock uses two protectors - the TPM protector and the protector provided by the network or by the PIN. Automatic unlock uses a single protector - the one stored in the TPM. If the computer is joined to a network without the key protector, it will prompt to enter a PIN. If the PIN isn't available, the recovery key will need to be used to unlock the computer if it can't be connected to the network.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For more info, see [BitLocker: How to enable Network Unlock](network-unlock.md).
|
|
|
|
|
|
|
|
|
|
- name: Use BitLocker with other programs
|
|
|
|
@ -397,7 +397,7 @@ sections:
|
|
|
|
|
Why is the system check failing when I'm encrypting my operating system drive?
|
|
|
|
|
answer: |
|
|
|
|
|
The system check is designed to ensure the computer's BIOS or UEFI firmware is compatible with BitLocker and that the TPM is working correctly. The system check can fail for several reasons:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- The computer's BIOS or UEFI firmware can't read USB flash drives
|
|
|
|
|
- The computer's BIOS, uEFI firmware, or boot menu doesn't have reading USB flash drives enabled
|
|
|
|
|
- There are multiple USB flash drives inserted into the computer
|
|
|
|
@ -405,7 +405,7 @@ sections:
|
|
|
|
|
- The computer's BIOS or UEFI firmware only supports using the function keys (F1-F10) to enter numerals in the pre-boot environment
|
|
|
|
|
- The startup key was removed before the computer finished rebooting
|
|
|
|
|
- The TPM has malfunctioned and fails to unseal the keys
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
What can I do if the recovery key on my USB flash drive can't be read?
|
|
|
|
|
answer: |
|
|
|
|
@ -430,18 +430,18 @@ sections:
|
|
|
|
|
How do I "lock" a data drive?
|
|
|
|
|
answer: |
|
|
|
|
|
Both fixed and removable data drives can be locked by using the Manage-bde command-line tool and the -lock command.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
|
> Ensure all data is saved to the drive before locking it. Once locked, the drive will become inaccessible.
|
|
|
|
|
|
|
|
|
|
The syntax of this command is:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```cmd
|
|
|
|
|
manage-bde.exe <driveletter> -lock
|
|
|
|
|
````
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Outside of using this command, data drives will be locked on shutdown and restart of the operating system. A removable data drive will also be locked automatically when the drive is removed from the computer.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
Can I use BitLocker with the Volume Shadow Copy Service?
|
|
|
|
|
answer: |
|
|
|
|
@ -453,9 +453,9 @@ sections:
|
|
|
|
|
BitLocker should work like any specific physical machine within its hardware limitations as long as the environment (physical or virtual) meets Windows Operating System requirements to run.
|
|
|
|
|
- With TPM: Yes, it's supported.
|
|
|
|
|
- Without TPM: Yes, it's supported (with password protector).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BitLocker is also supported on data volume VHDs, such as those used by clusters.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- question: |
|
|
|
|
|
Can I use BitLocker with virtual machines (VMs)?
|
|
|
|
|
answer: |
|
|
|
|
|