Skip to content

Commit 528b1ab

Browse files
committed
Revisions based on dev testing
1 parent 0636cc9 commit 528b1ab

1 file changed

Lines changed: 9 additions & 12 deletions

File tree

memdocs/intune/protect/encrypt-devices.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 12/06/2021
10+
ms.date: 02/02/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -31,7 +31,7 @@ Use Intune to configure BitLocker Drive Encryption on devices that run Windows 1
3131

3232
BitLocker is available on devices that run Windows 10/11. Some settings for BitLocker require the device have a supported TPM.
3333

34-
Use one of the following policy types to configure BitLocker on your managed devices
34+
Use one of the following policy types to configure BitLocker on your managed devices:
3535

3636
- **[Endpoint security disk encryption policy for BitLocker](#create-an-endpoint-security-policy-for-bitlocker)**. The BitLocker profile in *Endpoint security* is a focused group of settings that is dedicated to configuring BitLocker.
3737

@@ -122,9 +122,6 @@ You can configure a BitLocker policy to automatically and silently enable BitLoc
122122

123123
Devices must meet the following prerequisites, receive applicable settings to silently enable BitLocker, and not have incompatible settings for TPM startup PIN or key.
124124

125-
> [!NOTE]
126-
> Silent enablement of BitLocker will encrypt used disk space only.
127-
128125
#### Device Prerequisites
129126

130127
A device must meet the following conditions to be eligible for silently enabling BitLocker:
@@ -163,16 +160,16 @@ Following are the relevant settings for each profile type:
163160
**Endpoint security disk encryption policy** - In the BitLocker profile you'll find the following settings in the *BitLocker - OS Drive Settings* category when *BitLocker system drive policy* is set to *Configure*, and then *Startup authentication required* is set to *Yes*.
164161

165162
- **Compatible TPM startup** - Configure this as *Allowed* or *Required*
166-
- **Compatible TPM startup PIN** - This setting must not be set to *Required*
167-
- **Compatible TPM startup key** - This setting must not be set to *Required*
168-
- **Compatible TPM startup key and PIN** - This setting must not be set to *Required*
163+
- **Compatible TPM startup PIN** - Configure this as *Blocked*
164+
- **Compatible TPM startup key** - Configure this as *Blocked*
165+
- **Compatible TPM startup key and PIN** - Configure this as *Blocked*
169166

170167
**Device configuration policy** - In the endpoint protection template you'l find the following settings in the *Windows Encryption* category:
171168

172-
- **Compatible TPM startup** - Configure this as *Allowed* or *Required*
173-
- **Compatible TPM startup PIN** - This setting must not be set to *Require startup PIN with TPM*
174-
- **Compatible TPM startup key** - This setting must not be set to *Require startup key with TPM*
175-
- **Compatible TPM startup key and PIN** - This setting must not be set to *Require startup key and PIN with TPM*
169+
- **Compatible TPM startup** - Configure this as *Allow TPM* or *Require TPM*
170+
- **Compatible TPM startup PIN** - Configure this as *Do not allow startup PIN with TPM*
171+
- **Compatible TPM startup key** - Configure this as *Do not allow startup Key with TPM*
172+
- **Compatible TPM startup key and PIN** - Configure this as *Do not allow startup Key and PIN with TPM*
176173

177174
> [!WARNING]
178175
> While neither the endpoint security or device configuration policies configure the TPM settings by default, some versions of the [security baseline for Microsoft Defender for Endpoint](../protect/security-baselines.md#available-security-baselines) will configure both *Compatible TPM startup PIN* and *Compatible TPM startup key* by default. These configurations might block silent enablement of BitLocker.

0 commit comments

Comments
 (0)