Files
windows-itpro-docs/windows/security/information-protection/personal-data-encryption.md
2022-09-16 15:39:13 -04:00

14 KiB

title, description, ms.reviewer, manager, ms.author, ms.prod, author, ms.date
title description ms.reviewer manager ms.author ms.prod author ms.date
Personal Data Encryption (PDE) Personal Data Encryption unlocks user encrypted data at user sign in instead of at boot aaroncz frankroj m365-security frankroj 09/22/2022

Personal Data Encryption

(Applies to: Windows 11, version 22H2 and later Enterprise and Education editions)

Personal data encryption (PDE) is a security feature introduced in Windows 11, version 22H2 that provides encryption of individual user files. PDE occurs in addition to other encryption methods such as BitLocker.

PDE utilizes Windows Hello for Business to link data encryption keys with user credentials. This feature can minimizes the number of credentials the user has to remember to gain access to files. For example, when using BitLocker with PIN, a user would need to authenticate twice - once with the BitLocker PIN and a second time with Windows credentials. This requires users to remember two different credentials. With PDE, users only need to enter one set of credentials via Windows Hello for Business.

PDE is also accessibility friendly. For example, The BitLocker PIN entry screen doesn't have accessibility options. PDE however uses Windows Hello for Business, which does have accessibility features.

Unlike BitLocker that releases data encryption keys at boot, PDE doesn't release data encryption keys until a user logs in using Windows Hello for Business. Users will only be able to access their PDE encrypted files once they've signed into Windows using Windows Hello for Business. Additionally, PDE has the ability to also discard the encryption keys when the device is locked.

Note

PDE is currently only available to developers via APIs. There is no user interface in Windows to encrypt files via PDE. There are also no policies that can be deployed to devices via MDM to encrypt files via PDE.

Prerequisites

PDE protection levels

PDE offers two levels of protection. The level of protection is determined based on the organizational needs. These levels can be set via the PDE APIs.

Level 1 Level 2
Data is accessible when user is signed in Yes Yes
Data is accessible when user has locked their device Yes No
Data is accessible after user signs out No No
Data is accessible when device is shut down No No
Decryption keys discarded After user signs out After user locks device or signs out

When will PDE encrypted files be inaccessible

When a file is encrypted with PDE, its icon will show a lock on it. If the user hasn't signed in locally with Windows Hello for Business or an unauthorized user attempts to access a PDE encrypted file, they'll be denied access to the file. Scenarios where a user will be denied access to a PDE encrypted file include:

  • User has signed into Windows via a password instead of signing in with Windows Hello for Business biometric or PIN.
  • If specified via level 2 protection, when the device is locked.
  • When trying to access files on the device remotely. For example, UNC network paths.
  • Remote Desktop sessions
  • Other users on the device who aren't owners of the file, even if they're signed in via Windows Hello for Business and have permissions to navigate to the PDE encrypted files.

How to enable PDE

To enable PDE on devices, push an MDM policy to the devices with the following parameters:

  • Name: Personal Data Encryption
  • OMA-URI: ./User/Vendor/MSFT/PDE/EnablePersonalDataEncryption
  • Data type: Integer
  • Value: 1

There's also a PDE CSP available for MDM solutions that support it.

Note

Enabling the PDE policy on devices only enables the PDE feature. It does not encrypt any files. To encrypt files, use the PDE APIs to create custom applications and scripts to specify which files to encrypt and at what level to encrypt the files. Additionally, files will not encrypt via the APIs until this policy has been enabled.

Enabling PDE in Intune

  1. Sign into the Intune admin center
  2. Navigate to Devices > Configuration Profiles
  3. Select Create profile
  4. Under Platform, select Windows 10 and later
  5. Under Profile type, select Templates
  6. Under Template name, select Custom, and then select Create
  7. On the **Basics tab:
    1. Next to Name, enter Personal Data Encryption
    2. Next to Description, enter a description
  8. Select Next
  9. On the Configuration settings tab, select Add
  10. In the Add Row window:
    1. Next to Name, enter Personal Data Encryption
    2. Next to Description, enter a description
    3. Next to OMA-URI, enter in ./User/Vendor/MSFT/PDE/EnablePersonalDataEncryption
    4. Next to Data type, select Integer
    5. Next to Value, enter in 1
  11. Select Save, and then select Next
  12. On the Assignments tab:
    1. Under Included groups, select Add groups
    2. Select the groups that the PDE policy should be deployed to
    3. Select Select
    4. Select Next
  13. On the Applicability Rules tab, configure if necessary and then select Next
  14. On the Review + create tab, review the configuration to make sure everything is configured correctly, and then select Create

Configuring required prerequisites in Intune

Disabling Winlogon automatic restart sign-on (ARSO)

  1. Sign into the Intune admin center
  2. Navigate to Devices > Configuration Profiles
  3. Select Create profile
  4. Under Platform, select Windows 10 and later
  5. Under Profile type, select Templates
  6. Under Template name, select Administrative templates, and then select Create
  7. On the **Basics tab:
    1. Next to Name, enter Disable ARSO
    2. Next to Description, enter a description
  8. Select Next
  9. On the Configuration settings tab, under Computer Configuration, navigate to Windows Components > Windows Logon Options
  10. Select Sign-in and lock last interactive user automatically after a restart
  11. In the Sign-in and lock last interactive user automatically after a restart window that opens, select Disabled, and then select OK
  12. Select Next
  13. On the Scope tags tab, configure if necessary and then select Next
  14. On the Assignments tab:
    1. Under Included groups, select Add groups
    2. Select the groups that the ARSO policy should be deployed to
    3. Select Select
    4. Select Next
  15. On the Review + create tab, review the configuration to make sure everything is configured correctly, and then select Create

Disabling hibernation

  1. Sign into the Intune admin center
  2. Navigate to Devices > Configuration Profiles
  3. Select Create profile
  4. Under Platform, select Windows 10 and later
  5. Under Profile type, select Settings catalog, and then select Create
  6. On the **Basics tab:
    1. Next to Name, enter Disable Hibernation
    2. Next to Description, enter a description
  7. Select Next
  8. On the Configuration settings tab, select Add settings
  9. In the Settings picker windows, select Power
  10. When the settings appear in the lower pane, under Setting name, select Allow Hibernate, and then select the X in the top right corner of the Settings picker window to close the window
  11. Change Allow Hibernate to Block, and then select Next
  12. On the Scope tags tab, configure if necessary and then select Next
  13. On the Assignments tab:
    1. Under Included groups, select Add groups
    2. Select the groups that the ARSO policy should be deployed to
    3. Select Select
    4. Select Next
  14. On the Review + create tab, review the configuration to make sure everything is configured correctly, and then select Create

Disabling crash dumps

  1. Sign into the Intune admin center
  2. Navigate to Devices > Configuration Profiles
  3. Select Create profile
  4. Under Platform, select Windows 10 and later
  5. Under Profile type, select Settings catalog, and then select Create
  6. On the **Basics tab:
    1. Next to Name, enter Disable Hibernation
    2. Next to Description, enter a description
  7. Select Next
  8. On the Configuration settings tab, select Add settings
  9. In the Settings picker windows, select Memory Dump
  10. When the settings appear in the lower pane, under Setting name, select both Allow Crash Dump and Allow Live Dump, and then select the X in the top right corner of the Settings picker window to close the window
  11. Change both Allow Live Dump and Allow Crash Dump to Block, and then select Next
  12. On the Scope tags tab, configure if necessary and then select Next
  13. On the Assignments tab:
    1. Under Included groups, select Add groups
    2. Select the groups that the ARSO policy should be deployed to
    3. Select Select
    4. Select Next
  14. On the Review + create tab, review the configuration to make sure everything is configured correctly, and then select Create

Differences between PDE and BitLocker

PDE BitLocker
Release of encryption keys At user sign in via Windows Hello for Business At boot
Encryption keys discarded At user sign out At reboot
Files encrypted Individual specified files Entire volume/drive
Authentication to access encrypted file Windows Hello for Business When BitLocker with PIN is enabled, BitLocker PIN plus Windows sign in
Accessibility Windows Hello for Business is accessibility friendly BitLocker with PIN doesn't have accessibility features

Differences between PDE and EFS

The main difference between encrypting files with PDE instead of EFS is the method they use to encrypt the file. PDE uses Windows Hello for Business to secure the encryption keys that encrypts the files. EFS uses certificates to secure and encrypt the files.

To see if a file is encrypted with PDE or EFS

  1. Open the properties of the file.
  2. Under the General tab, select on the Advanced... button.
  3. In the Advanced Attributes windows, select on the Details button.

For PDE encrypted files, under Protection status: there will be an item listed as Personal Data Encryption is: and it will have the attribute of On.

For EFS encrypted files, under Users who can access this file:, there will be a Certificate thumbprint next to the users with access to the file. There will also be a section at the bottom labeled Recovery certificates for this file as defined by recovery policy:.

Encryption information including what encryption method is being used can be obtained with the command line cipher.exe /c command.

Next steps