Skip to content

Commit 4d6a535

Browse files
authored
Merge pull request #7757 from JanuszGal/patch-1
Add section for Full Disk Encryption
2 parents c70e2d8 + 4e9d9dc commit 4d6a535

3 files changed

Lines changed: 36 additions & 17 deletions

File tree

memdocs/autopilot/bitlocker.md

Lines changed: 36 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,73 @@
11
---
22
title: Setting the BitLocker encryption algorithm for Autopilot devices
33
description: Microsoft Intune provides a comprehensive set of configuration options to manage BitLocker on Windows devices.
4-
keywords: Autopilot, BitLocker, encryption, 256-bit, Windows 10
54
ms.prod: w10
6-
ms.mktglfcycl: deploy
7-
ms.sitesec: library
8-
ms.pagetype: deploy
95
ms.localizationpriority: medium
10-
audience: itpro
116
author: aczechowski
127
ms.author: aaroncz
138
ms.reviewer: jubaptis
149
manager: dougeby
15-
ms.date: 12/16/2020
10+
ms.date: 06/15/2022
1611
ms.collection: M365-modern-desktop
1712
ms.topic: how-to
1813
---
1914

20-
2115
# Setting the BitLocker encryption algorithm for Autopilot devices
2216

2317
**Applies to**
2418

2519
- Windows 11
2620
- Windows 10
2721

28-
With Windows Autopilot, you can configure BitLocker encryption settings to get applied before automatic encryption starts. This configuration makes sure the default encryption algorithm isn't applied automatically. Other BitLocker policies can also be applied before automatic BitLocker encryption begins.
22+
BitLocker [automatically encrypts](/windows-hardware/design/device-experiences/oem-bitlocker#bitlocker-automatic-device-encryption) internal drives during the out of box experience (OOBE) for devices that support [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or meet the [Hardware Security Testability Specification (HSTI)](/windows-hardware/test/hlk/testref/hardware-security-testability-specification). By default, BitLocker uses XTS-AES 128-bit used space only for automatic encryption.
23+
24+
With Windows Autopilot, you can configure BitLocker encryption settings to apply before automatic encryption starts. This configuration makes sure the default encryption algorithm or type isn't applied automatically. A device that receives these settings after encrypting automatically will need to be decrypted before changing the encryption algorithm.
25+
26+
## Encryption algorithm
27+
28+
The BitLocker encryption algorithm is used when BitLocker is first enabled. During Autopilot, BitLocker will be enabled after the device setup portion of the [enrollment status page](enrollment-status.md). The following encryption algorithms are available:
2929

30-
The BitLocker encryption algorithm is used when BitLocker is first enabled. The algorithm sets the strength for full volume encryption. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit, or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use.
30+
- AES-CBC 128-bit
31+
- AES-CBC 256-bit
32+
- XTS-AES 128-bit (default)
33+
- XTS-AES 256-bit
34+
35+
For more information about the recommended encryption algorithms to use, see [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp).
3136

3237
To make sure the BitLocker encryption algorithm you want is set before automatic encryption occurs for Autopilot devices:
3338

34-
1. Configure the [encryption method settings](../intune/protect/endpoint-protection-windows-10.md#windows-encryption) in the Windows Endpoint Protection profile to the encryption algorithm you want.
39+
1. Configure the [encryption method settings](../intune/protect/encrypt-devices.md#create-an-endpoint-security-policy-for-bitlocker) in the Endpoint Security disk encryption policy. The settings are available under **Endpoint Security** > **Disk encryption** > **Create policy** > **Platform** = Windows 10 and later, **Profile type** = BitLocker.
40+
3541
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
36-
3. Enable the Autopilot [Enrollment Status Page](enrollment-status.md) (ESP) for these devices. If the ESP isn't enabled, the policy won't apply before encryption starts.
3742

38-
An example of Microsoft Intune Windows Encryption settings is shown below.
43+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
44+
45+
The following image is an example of the Endpoint Security disk encryption settings.
3946

40-
![BitLocker encryption settings.](images/bitlocker-encryption.png)
47+
:::image type="content" source="media/bitlocker/endpoint-security-disk-encryption-policy.png" alt-text="Screenshot example of the Endpoint Security disk encryption settings.":::
4148

42-
A device that is encrypted automatically will need to be decrypted before changing the encryption algorithm.
49+
## Full disk or used space-only encryption
4350

44-
The settings are available under **Device Configuration** > **Profiles** > **Create profile** > **Platform** = Windows 10 and later, Profile type = Endpoint protection > **Configure** > **Windows Encryption** > **BitLocker base settings**, Configure encryption methods = Enable.
51+
There are two types of encryption, full disk or used space-only. The type of encryption is automatically determined by configuration of [silent enablement](../intune/protect/encrypt-devices.md#silently-enable-bitlocker-on-devices) and hardware support for modern standby. You can enforce it by configuring the [SystemDrivesEncryptionType](/windows/client-management/mdm/bitlocker-csp) setting. Like the encryption algorithm, the encryption type is used when BitLocker is first enabled. For more information on the expected encryption type behavior, see [Manage BitLocker policy](../intune/protect/encrypt-devices.md#full-disk-vs-used-space-only-encryption).
4552

46-
It's also recommended to set **Windows Encryption** > **Windows Settings** > **Encrypt** = Require.
53+
To enforce the type of drive encryption used:
54+
55+
1. Configure the **Enforce drive encryption type on operating system drives** setting within the [settings catalog](../intune/configuration/settings-catalog.md). This setting is available in the **Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives** category from the settings picker.
56+
57+
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
58+
59+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
60+
61+
The following image is an example of the settings catalog profile.
62+
63+
:::image type="content" source="media/bitlocker/settings-catalog-drive-type.png" alt-text="Screenshot example of the BitLocker drive type configuration in the settings catalog.":::
4764

4865
## Requirements
4966

50-
Windows 10, version 1809 or later.
67+
A supported version of Windows 11 or Windows 10.
5168

5269
## Next steps
5370

5471
[BitLocker overview](/windows/security/information-protection/bitlocker/bitlocker-overview)
72+
73+
[Manage BitLocker policy for Windows devices with Intune](../intune/protect/encrypt-devices.md)
73.7 KB
Loading
23.3 KB
Loading

0 commit comments

Comments
 (0)