Paolo Matarazzo a0607033e0 updates
2023-10-10 12:55:46 -04:00

6.3 KiB

title, description, ms.topic, ms.date
title description ms.topic ms.date
BitLocker configuration Learn about the available options to configure BitLocker and how to configure them via Configuration Service Providers (CSP) or group policy (GPO). how-to 10/03/2023

BitLocker configuration

To configure BitLocker, you can use one of the following options:

  • Configuration Service Provider (CSP): this option is commonly used for devices managed by a Mobile Device Management (MDM) solution, like Microsoft Intune
  • Group policy (GPO): this option can be used for devices that are joined to an Active Directory domain and aren't managed by a device management solution. Group policy can also be used for devices that aren't joined to an Active Directory domain, using the local group policy editor
  • Microsoft Configuration Manager: this option can be used for devices that are managed by Microsoft Configuration Manager using the BitLocker management agent

The following table describes the options to configure BitLocker, depending on the device's join type:

Join type CSP GPO Configuration Manager
Microsoft Entra joined
Microsoft Entra registered
Microsoft Entra hybrid joined
Active Directory joined

Note

Windows Server doesn't support the configuration of BitLocker using CSP or Microsoft Configuration Manager. Use GPO instead.

While many of the BitLocker policy settings can be configured using both CSP and GPO, there are some settings that are only available using one of the options. To learn about the policy settings available for both CSP and GPO, review the reference article BitLocker policy settings.

[!INCLUDE bitlocker]

Configure devices using CSP

The configuration of devices using CSP is a good option for devices that managed by an MDM solution, like Microsoft Intune. These are Microsoft Entra joined, Microsoft Entra registered or Microsoft Entra hybrid joined devices.

The BitLocker CSP is used to configure BitLocker, and to report the status of different BitLocker functions to the MDM solution. With Microsoft Intune, you can use the BitLocker status in compliance polices, combining them with Conditional Access. Conditional Access can prevent or grant access to services like Exchange Online and SharePoint Online, based on the status of BitLocker.

Note

For hardware that is compliant with Modern Standby and HSTI, device encryption is automatically turned on whenever a user Microsoft Entra joins a device. Microsoft Entra ID provides a portal where recovery keys are also backed up, so users can retrieve their own recovery keys for self-service, if necessary.

To learn more about the Intune options to configure and monitor BitLocker, check the following articles:

Configure devices using GPO

To learn more about options to configure BitLocker via Microsoft Configuration Manager, see Deploy BitLocker management.

Tip

Organizations that image their device using Configuration Manager can use an existing task sequence to pre-provision BitLocker encryption while in Windows Preinstallation Environment (WinPE), and can then enable protection. These steps during an operating system deployment can help ensure that computers are encrypted from the start, even before users receive them. As part of the imaging process, an organization could also decide to use Configuration Manager to pre-set any desired BitLocker policy settings.

Configure and manage servers

Servers are often installed, configured, and deployed using PowerShell; therefore, the recommendation is to also use PowerShell to enable BitLocker on a server, ideally as part of the initial setup. BitLocker is an Optional Component (OC) in Windows Server; therefore, follow the directions in BitLocker: How to deploy on Windows Server to add the BitLocker OC.

The Minimal Server Interface is a prerequisite for some of the BitLocker administration tools. On a Server Core installation, the necessary GUI components must be added first. The steps to add shell components to Server Core are described in Using Features on Demand with Updated Systems and Patched Images and How to update local source media to add roles and features.

If a server is being installed manually, such as a stand-alone server, then choosing Server with Desktop Experience is the easiest path because it avoids performing the steps to add a GUI to Server Core.

Additionally, lights-out data centers can take advantage of the enhanced security of a second factor while avoiding the need for user intervention during reboots by optionally using a combination of BitLocker (TPM+PIN) and BitLocker Network Unlock. BitLocker Network Unlock brings together the best of hardware protection, location dependence, and automatic unlock, while in the trusted location. For the configuration steps, see BitLocker: How to enable Network Unlock.

Next steps

[!div class="nextstepaction"] Review the BitLocker operations guide to learn how to use different tools to manage and operate BitLocker.

BitLocker operations guide >