You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/encrypt-devices.md
+46-18Lines changed: 46 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 12/06/2021
10
+
ms.date: 02/02/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -31,7 +31,7 @@ Use Intune to configure BitLocker Drive Encryption on devices that run Windows 1
31
31
32
32
BitLocker is available on devices that run Windows 10/11. Some settings for BitLocker require the device have a supported TPM.
33
33
34
-
Use one of the following policy types to configure BitLocker on your managed devices
34
+
Use one of the following policy types to configure BitLocker on your managed devices:
35
35
36
36
-**[Endpoint security disk encryption policy for BitLocker](#create-an-endpoint-security-policy-for-bitlocker)**. The BitLocker profile in *Endpoint security* is a focused group of settings that is dedicated to configuring BitLocker.
37
37
@@ -118,34 +118,63 @@ To view information about devices that receive BitLocker policy, see [Monitor di
118
118
119
119
### Silently enable BitLocker on devices
120
120
121
-
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
+
You can configure a BitLocker policy to automatically and silently enable BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device. You can use either the BitLocker profile from an endpoint security disk encryption policy, or the endpoint protection template from a device configuration policy.
122
122
123
-
**Device Prerequisites**:
123
+
Devices must meet the following prerequisites, receive applicable settings to silently enable BitLocker, and not have incompatible settings for TPM startup PIN or key.
124
+
125
+
#### Device Prerequisites
124
126
125
127
A device must meet the following conditions to be eligible for silently enabling BitLocker:
126
128
127
-
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
128
-
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
129
+
- If end users sign in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
130
+
- If end users sign in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
129
131
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
130
132
- Device must contain at least TPM (Trusted Platform Module) 1.2.
131
-
- The BIOS mode must be set to Native UEFI only.
133
+
- The BIOS mode must be set to Native UEFI only.
134
+
135
+
#### Required settings to silently enable BitLocker
136
+
137
+
Depending on the type of policy that you use to silently enable BitLocker, configure the following settings.
138
+
139
+
**Endpoint security disk encryption policy** - Configure the following settings in the BitLocker profile:
132
140
133
-
**BitLocker policy configuration**:
141
+
-**Hide prompt about third-party encryption** = *Yes*
142
+
-**Alow standard users to enable encryption during Autopilot** = *Yes*
134
143
135
-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
144
+
**Device configuration policy** - Configure the following settingsin the *Endpoint protection* template or a *custom settings* profile:
136
145
137
146
-**Warning for other disk encryption** = *Block*.
138
147
-**Allow standard users to enable encryption during Azure AD Join** = *Allow*
139
148
140
-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
149
+
> [!TIP]
150
+
> While the setting labels and options in the following two policy types are different from each other, they both apply the same configuration to Windows encryption CSPs that manage BitLocker on Windows devices.
141
151
142
-
-**Compatible TPM startup** must be set to *Allowed* or *Required*
143
-
-**Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
144
-
-**Compatible TPM startup key** must not be set to *Require startup key with TPM*
145
-
-**Compatible TPM startup key and PIN** must not be set to *Require startup key and PIN with TPM*
152
+
#### TPM startup PIN or key
146
153
147
-
> [!NOTE]
148
-
> Silent enablement of BitLocker will encrypt used disk space only.
154
+
A device **must not require** use of a startup PIN or startup key.
155
+
156
+
When a TPM startup PIN or startup key is required on a device, BitLocker can't silently enable on the device and instead requires interaction from the end user. Settings to configure the TPM startup PIN or key are available in both the endpoint protection template and the BitLocker policy. By default, these policies do not configure these settings.
157
+
158
+
Following are the relevant settings for each profile type:
159
+
160
+
**Endpoint security disk encryption policy** - In the BitLocker profile you'll find the following settings in the *BitLocker - OS Drive Settings* category when *BitLocker system drive policy* is set to *Configure*, and then *Startup authentication required* is set to *Yes*.
161
+
162
+
-**Compatible TPM startup** - Configure this as *Allowed* or *Required*
163
+
-**Compatible TPM startup PIN** - Configure this as *Blocked*
164
+
-**Compatible TPM startup key** - Configure this as *Blocked*
165
+
-**Compatible TPM startup key and PIN** - Configure this as *Blocked*
166
+
167
+
**Device configuration policy** - In the endpoint protection template you'l find the following settings in the *Windows Encryption* category:
168
+
169
+
-**Compatible TPM startup** - Configure this as *Allow TPM* or *Require TPM*
170
+
-**Compatible TPM startup PIN** - Configure this as *Do not allow startup PIN with TPM*
171
+
-**Compatible TPM startup key** - Configure this as *Do not allow startup Key with TPM*
172
+
-**Compatible TPM startup key and PIN** - Configure this as *Do not allow startup Key and PIN with TPM*
173
+
174
+
> [!WARNING]
175
+
> While neither the endpoint security or device configuration policies configure the TPM settings by default, some versions of the [security baseline for Microsoft Defender for Endpoint](../protect/security-baselines.md#available-security-baselines) will configure both *Compatible TPM startup PIN* and *Compatible TPM startup key* by default. These configurations might block silent enablement of BitLocker.
176
+
>
177
+
> If you deploy this baseline to devices on which you want to silently enable BitLocker, review your baseline configurations for possible conflicts. To remove conflicts, either reconfigure the settings in the baselines to remove the conflict, or remove applicable devices from receiving the baseline instances that configure TPM settings that block silent enablement of BitLocker.
149
178
150
179
### View details for recovery keys
151
180
@@ -184,11 +213,10 @@ All BitLocker recovery key accesses are audited. For more information on Audit L
184
213
185
214
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.
186
215
187
-
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](../../configmgr/hotfix/2107/11121541.md).
216
+
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices: See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
188
217
189
218
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
190
219
191
-
192
220
### Rotate BitLocker recovery keys
193
221
194
222
You can use an Intune device action to remotely rotate the BitLocker recovery key of a device that runs Windows 10 version 1909 or later, and Windows 11.
0 commit comments