Skip to content

Commit c411549

Browse files
authored
Merge pull request #6290 from Brenduns/bitlocker-silently-update
Update which policy type suports silent enablement of BitLocker
2 parents 2409783 + 86e461a commit c411549

1 file changed

Lines changed: 8 additions & 7 deletions

File tree

memdocs/intune/protect/encrypt-devices.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/16/2021
10+
ms.date: 12/06/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -73,7 +73,8 @@ Use one of the following procedures to create the policy type you prefer.
7373

7474
4. On the **Configuration settings** page, configure settings for BitLocker to meet your business needs.
7575

76-
If you want to enable BitLocker silently, see [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices), in this article for additional prerequisites and the specific setting configurations you must use.
76+
> [!TIP]
77+
> If you want to enable BitLocker silently, you must use a Endpoint protection template as part of a device configuration profile and not an Endpoint security policy. See [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices) in this article for additional prerequisites and the specific setting configurations you must use.
7778
7879
Select **Next**.
7980

@@ -117,26 +118,26 @@ To view information about devices that receive BitLocker policy, see [Monitor di
117118

118119
### Silently enable BitLocker on devices
119120

120-
You can configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121+
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121122

122123
**Device Prerequisites**:
123124

124125
A device must meet the following conditions to be eligible for silently enabling BitLocker:
125126

126127
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
127-
- If end users log in to the the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128+
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128129
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
129130
- Device must contain at least TPM (Trusted Platform Module) 1.2.
130131
- The BIOS mode must be set to Native UEFI only.
131132

132133
**BitLocker policy configuration**:
133134

134-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy:
135+
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
135136

136137
- **Warning for other disk encryption** = *Block*.
137138
- **Allow standard users to enable encryption during Azure AD Join** = *Allow*
138139

139-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can not silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140+
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140141

141142
- **Compatible TPM startup** must be set to *Allowed* or *Required*
142143
- **Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
@@ -182,7 +183,7 @@ When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager
182183

183184
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184185

185-
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186+
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186187

187188

188189
### Rotate BitLocker recovery keys

0 commit comments

Comments
 (0)