windows-itpro-docs/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-tpm-platform-validation-profile-for-bios-based-firmware-configurations.md
Paolo Matarazzo 7135a27212 updates
2023-10-30 18:30:20 -04:00

3.3 KiB

author, ms.author, ms.date, ms.topic
author ms.author ms.date ms.topic
paolomatarazzo paoloma 10/30/2023 include

Configure TPM platform validation profile for BIOS-based firmware configurations

This policy setting determines what values the TPM measures when it validates early boot components before it unlocks an operating system drive on a computer with a BIOS configuration or with UEFI firmware that has the Compatibility Support Module (CSM) enabled.

  • When enabled , the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive can be configured. If any of these components change while BitLocker protection is in effect, then the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.
  • When disabled or not configured, the TPM uses the default platform validation profile or the platform validation profile that is specified by the setup script.

This policy setting doesn't apply if the computer doesn't have a compatible TPM or if BitLocker has already been turned on with TPM protection.

Important

This Group Policy setting only applies to computers with BIOS configurations or to computers with UEFI firmware with the CSM enabled. Computers that use a native UEFI firmware configuration store different values in the Platform Configuration Registers (PCRs). Use the Configure TPM platform validation profile for native UEFI firmware configurations policy setting to configure the TPM PCR profile for computers that use native UEFI firmware.

A platform validation profile consists of a set of PCR indices that range from 0 to 23. Each PCR index represents a specific measurement that the TPM validates during early boot. The default platform validation profile secures the encryption key against changes to the following PCRs:

PCR Description
PCR 0 Core root-of-trust for measurement, BIOS, and platform extensions
PCR 2 Option ROM code
PCR 4 Master Boot Record (MBR) code
PCR 8 NTFS boot sector
PCR 9 NTFS boot block
PCR 10 Boot manager
PCR 11 BitLocker access control

Note

Changing from the default platform validation profile affects the security and manageability of a computer. BitLocker's sensitivity to platform modifications (malicious or authorized) is increased or decreased depending on inclusion or exclusion (respectively) of the PCRs.

The following list identifies all of the available PCRs:

PCR Description
PCR 0 Core root-of-trust for measurement, BIOS, and platform extensions
PCR 1 Platform and motherboard configuration and data.
PCR 2 Option ROM code
PCR 3 Option ROM data and configuration
PCR 4 Master Boot Record (MBR) code
PCR 5 Master Boot Record (MBR) partition table
PCR 6 State transition and wake events
PCR 7 Computer manufacturer-specific
PCR 8 NTFS boot sector
PCR 9 NTFS boot block
PCR 10 Boot manager
PCR 11 BitLocker access control
PCR 12-23 Reserved for future use
Path
CSP Not available
GPO Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating Sytem Drives