You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/encrypt-devices.md
+43-16Lines changed: 43 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,34 +118,62 @@ To view information about devices that receive BitLocker policy, see [Monitor di
118
118
119
119
### Silently enable BitLocker on devices
120
120
121
-
You can use an *Endpoint protection* template as part of a *device configuration* profile to configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
121
+
You can configure a BitLocker policy to automatically and silently enable BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device. You can use either the BitLocker profile from an endpoint security disk encryption policy, or the endpoint protection template from a device configuration policy.
122
122
123
-
**Device Prerequisites**:
123
+
Devices must meet the following prerequisites, receive applicable settings to silently enable BitLocker, and not have incompatible settings for TPM startup PIN or key.
124
+
125
+
> [!NOTE]
126
+
> Silent enablement of BitLocker will encrypt used disk space only.
127
+
128
+
#### Device Prerequisites
124
129
125
130
A device must meet the following conditions to be eligible for silently enabling BitLocker:
126
131
127
-
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
128
-
- If end users log in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
132
+
- If end users sign in to the devices as Administrators, the device must run Windows 10 version 1803 or later, or Windows 11.
133
+
- If end users sign in to the devices as Standard Users, the device must run Windows 10 version 1809 or later, or Windows 11.
129
134
- The device must be Azure AD Joined or Hybrid Azure AD Joined.
130
135
- Device must contain at least TPM (Trusted Platform Module) 1.2.
131
-
- The BIOS mode must be set to Native UEFI only.
136
+
- The BIOS mode must be set to Native UEFI only.
137
+
138
+
#### Required settings to silently enable BitLocker
132
139
133
-
**BitLocker policy configuration**:
140
+
Depending on the type of policy that you use to silently enable BitLocker, configure the following settings.
134
141
135
-
The following two settings for *BitLocker base settings* must be configured in the BitLocker policy of a device configuration profile:
142
+
**Endpoint security disk encryption policy** - Configure the following settings in the BitLocker profile:
143
+
144
+
-**Hide prompt about third-party encryption** = *Yes*
145
+
-**Alow standard users to enable encryption during Autopilot** = *Yes*
146
+
147
+
**Device configuration policy** - Configure the following settings in the *Endpoint protection* template or a *custom settings* profile:
136
148
137
149
-**Warning for other disk encryption** = *Block*.
138
150
-**Allow standard users to enable encryption during Azure AD Join** = *Allow*
139
151
140
-
The BitLocker policy **must not require** use of a startup PIN or startup key. When a TPM startup PIN or startup key is *required*, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following four *BitLocker OS drive settings* in the same policy:
141
152
142
-
-**Compatible TPM startup** must be set to *Allowed* or *Required*
143
-
-**Compatible TPM startup PIN** must not be set to *Require startup PIN with TPM*
144
-
-**Compatible TPM startup key** must not be set to *Require startup key with TPM*
145
-
-**Compatible TPM startup key and PIN** must not be set to *Require startup key and PIN with TPM*
153
+
> [!TIP]
154
+
> While the setting labels and options in the following two policy types are different from each other, they both apply the same configuration to Windows encryption CSPs that manage BitLocker on Windows devices.
146
155
147
-
> [!NOTE]
148
-
> Silent enablement of BitLocker will encrypt used disk space only.
156
+
#### TPM startup PIN or key
157
+
158
+
A device **must not require** use of a startup PIN or startup key.
159
+
160
+
When a TPM startup PIN or startup key is required on a device, BitLocker can't silently enable on the device and instead requires interaction from the end user. Settings to configure the TPM startup PIN or key are available in both the endpoint protection template and the BitLocker policy. By default, these policies do not configure these settings.
161
+
162
+
Following are the relevant settings for each profile type:
163
+
164
+
**Endpoint security disk encryption policy** - In the BitLocker profile you'll find the following settings in the *BitLocker - OS Drive Settings* category when *BitLocker system drive policy* is set to *Configure*, and then *Startup authentication required* is set to *Yes*.
165
+
166
+
-**Compatible TPM startup** - Configure this as *Allowed* or *Required*
167
+
-**Compatible TPM startup PIN** - This setting must not be set to *Required*
168
+
-**Compatible TPM startup key** - This setting must not be set to *Required*
169
+
-**Compatible TPM startup key and PIN** - This setting must not be set to *Required*
170
+
171
+
**Device configuration policy** - In the endpoint protection template you'l find the following settings in the *Windows Encryption* category:
172
+
173
+
-**Compatible TPM startup** - Configure this as *Allowed* or *Required*
174
+
-**Compatible TPM startup PIN** - This setting must not be set to *Require startup PIN with TPM*
175
+
-**Compatible TPM startup key** - This setting must not be set to *Require startup key with TPM*
176
+
-**Compatible TPM startup key and PIN** - This setting must not be set to *Require startup key and PIN with TPM*
149
177
150
178
### View details for recovery keys
151
179
@@ -181,11 +209,10 @@ All BitLocker recovery key accesses are audited. For more information on Audit L
181
209
182
210
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.
183
211
184
-
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
212
+
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices: See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
185
213
186
214
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
187
215
188
-
189
216
### Rotate BitLocker recovery keys
190
217
191
218
You can use an Intune device action to remotely rotate the BitLocker recovery key of a device that runs Windows 10 version 1909 or later, and Windows 11.
0 commit comments