You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/encrypt-devices.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 11/16/2021
10
+
ms.date: 12/06/2021
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -73,7 +73,8 @@ Use one of the following procedures to create the policy type you prefer.
73
73
74
74
4. On the **Configuration settings** page, configure settings for BitLocker to meet your business needs.
75
75
76
-
If you want to enable BitLocker silently, see [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices), in this article for additional prerequisites and the specific setting configurations you must use.
76
+
> [!TIP]
77
+
> If you want to enable BitLocker silently, you must use a Endpoint protection template as part of a device configuration profile and not an Endpoint security policy. See [Silently enable BitLocker on devices](#silently-enable-bitlocker-on-devices) in this article for additional prerequisites and the specific setting configurations you must use.
77
78
78
79
Select **Next**.
79
80
@@ -117,26 +118,26 @@ To view information about devices that receive BitLocker policy, see [Monitor di
117
118
118
119
### Silently enable BitLocker on devices
119
120
120
-
You can configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
+
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
122
122
123
**Device Prerequisites**:
123
124
124
125
A device must meet the following conditions to be eligible for silently enabling BitLocker:
125
126
126
127
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
127
-
- If end users log in to the the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128
+
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
128
129
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
129
130
- Device must contain at least TPM (Trusted Platform Module) 1.2.
130
131
- The BIOS mode must be set to Native UEFI only.
131
132
132
133
**BitLocker policy configuration**:
133
134
134
-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy:
135
+
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
135
136
136
137
-**Warning for other disk encryption** = *Block*.
137
138
-**Allow standard users to enable encryption during Azure AD Join** = *Allow*
138
139
139
-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can not silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140
+
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
140
141
141
142
-**Compatible TPM startup** must be set to *Allowed* or *Required*
142
143
-**Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
@@ -182,7 +183,7 @@ When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager
182
183
183
184
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
184
185
185
-
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
186
+
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
0 commit comments