BitLocker Drive Encryption in Windows 7 Frequently Asked Questions Microsoft Learn
BitLocker Drive Encryption in Windows 7 Frequently Asked Questions Microsoft Learn
• Why are two partitions required? Why does the system drive have to be so large?
• Can I use BitLocker on an operating system drive without a TPM version 1.2?
Upgrading
• What versions of Windows 7 include BitLocker? Can I use BitLocker on a Windows XP–based
computer?
• Can I upgrade my Windows XP–based computer to Windows 7 with the necessary disk
configuration for BitLocker?
• What is the difference between disabling, suspending, and decrypting when I turn off
BitLocker?
• Can BitLocker encrypt more than just the operating system drive?
• Approximately how long will initial encryption take when BitLocker is turned on?
• Why does it appear that most of the free space in my drive is used when BitLocker is
converting the drive?
• Does BitLocker encrypt and decrypt the entire drive all at once when reading and writing
data?
• How can I prevent users on a network from storing data on an unencrypted drive?
• What system changes would cause the integrity check on my operating system drive to fail?
• What causes BitLocker to start into recovery mode when attempting to start the operating
system drive?
• Can I swap hard disks on the same computer if BitLocker is enabled on the operating system
drive?
• Can I access my BitLocker-protected drive if I insert the hard disk into a different computer?
• Can I dual boot Windows 7 and Windows Vista with BitLocker-protected operating system
drives?
Key management
• What is the difference between a TPM owner password, recovery password, recovery key, PIN,
enhanced PIN, and startup key?
• Can the USB flash drive that is used as the startup key also be used to store the recovery key?
• Can I save multiple (different) startup keys on the same USB flash drive?
• Can I generate multiple (different) startup keys for the same computer?
• What encryption keys are used in BitLocker? How do they work together?
• Why do I have to use the function keys to enter the PIN or the 48-character recovery
password?
• How does BitLocker help prevent an attacker from discovering the PIN that unlocks my
operating system drive?
• How are the PIN and TPM used to derive the volume master key?
BitLocker To Go
• What is BitLocker To Go?
• Is there a way to ensure the BitLocker To Go Reader is not installed on FAT-formatted drives?
For detailed instructions about how to configure AD DS for BitLocker, see Backing Up
BitLocker and TPM Recovery Information to AD DS.
• What if BitLocker is enabled on a computer before the computer has joined the domain?
• Is there an event log entry recorded on the client computer to indicate the success or failure
of the Active Directory backup?
• If I change the BitLocker recovery password on my computer and store the new password in
AD DS, will AD DS overwrite the old password?
• What happens if the backup initially fails? Will BitLocker retry the backup?
Security
• What form of encryption does BitLocker use? Is it configurable?
• What are the implications of using the sleep or hibernate power management options?
Other questions
• Can I use EFS with BitLocker?
• Can other tools that manage or modify the master boot record work with BitLocker?
• Why is the system check failing when I am encrypting my operating system drive?
• What can I do if the recovery key on my USB flash drive cannot be read?
• Why are some of my Windows Vista scripts not working with Windows 7?
• Where is Manage-bde.wsf?
• Encrypting the entire Windows operating system drive on the hard disk. BitLocker encrypts
all user files and system files on the operating system drive, including the swap files and
hibernation files.
• Checking the integrity of early boot components and boot configuration data. On
computers that have a Trusted Platform Module (TPM) version 1.2, BitLocker uses the
enhanced security capabilities of the TPM to help ensure that your data is accessible only if
the computer's boot components appear unaltered and the encrypted disk is located in the
original computer.
BitLocker is integrated into Windows 7 and provides enterprises with enhanced data protection
that is easy to manage and configure. For example, BitLocker can use an existing Active Directory
Domain Services (AD DS) infrastructure to remotely store BitLocker recovery keys.
BitLocker can also be used to protect fixed and removable data drives. When used with data drives,
BitLocker encrypts the entire contents of the drive and can be configured by using Group Policy to
require that BitLocker be enabled on a drive before the computer can write data to the drive.
BitLocker can be configured with the following unlock methods for data drives:
• Automatic unlock. Fixed data drives can be set to automatically unlock on a computer where
the operating system drive is encrypted. Removable data drives can be set to automatically
unlock on a computer running Windows 7 after the password or smart card is initially used to
unlock the drive. However, removable data drives must always have either a password or
smart card unlock method in addition to the automatic unlock method.
• Password. When users attempt to open a drive, they are prompted to enter their password
before the drive will be unlocked. This method can be used with the BitLocker To Go Reader
on computers running Windows Vista or Windows XP, to open BitLocker-protected drives as
read-only.
• Smart card. When users attempt to open a drive, they are prompted to insert their smart card
before the drive will be unlocked.
A drive can support multiple unlock methods. For example, a removable data drive can be
configured to be automatically unlocked on your primary work computer but query you for a
password if used with another computer.
7 Note
Use of both the USB and PIN along with the TPM must be configured by using the Manage-
bde command-line tool. This protection method cannot be specified by using the BitLocker
setup wizard.
Hardware The computer must meet the minimum requirements for Windows 7. For more
configuration information about Windows 7 requirements, see the Windows 7 Web site
(https://go.microsoft.com/fwlink/?LinkID=155370).
Note
BitLocker is an optional feature of Windows Server 2008 R2. Use Server Manager
to install BitLocker on a computer running Windows Server 2008 R2.
A TPM is not required for BitLocker; however, only a computer with a TPM can provide the
additional security of pre-startup system integrity verification and multifactor
authentication.
• The BIOS must be able to read from a USB flash drive during startup.
Requirement Description
File system At least two NTFS disk partitions, one for the system drive and one for the operating
system drive. The system drive partition must be at least 100 megabytes (MB) and set as
the active partition.
File system For a fixed or removable data drive to be BitLocker-protected, it must be formatted by using
the exFAT, FAT16, FAT32, or NTFS file system.
Note
To use the BitLocker To Go Reader to read data on a removable data drive, the drive
must be formatted by using the exFAT, FAT16, or FAT32 file system. If the drive is NTFS
formatted, it can only be unlocked on a computer running Windows Server 2008 R2
or Windows 7 and previous versions of the Windows operating system will not
recognize the drive and will prompt you to format the drive.
Why are two partitions required? Why does the system drive
have to be so large?
Two partitions are required to run BitLocker because pre-startup authentication and system
integrity verification must occur on a separate partition from the encrypted operating system drive.
This configuration helps protect the operating system and the information in the encrypted drive.
In Windows Vista, the system drive must be 1.5 gigabytes (GB), but in Windows 7 this requirement
has been reduced to 100 MB for a default installation. The system drive may also be used to store
the Windows Recovery Environment (Windows RE) and other files that may be specific to setup or
upgrade programs. Computer manufacturers and enterprise customers can also store system tools
or other recovery tools on this drive, which will increase the required size of the system drive. For
example, using the system drive to store Windows RE along with the BitLocker startup file will
increase the size of the system drive to 300 MB. The system drive is hidden by default and is not
assigned a drive letter. The system drive is created automatically when Windows 7 is installed.
) Important
When using BitLocker with a TPM, it is recommended that BitLocker be turned on immediately
after the computer has been restarted. If the computer has resumed from sleep prior to
turning on BitLocker, the TPM may incorrectly measure the pre-boot components on the
computer. In this situation, when the user subsequently attempts to unlock the computer, the
TPM verification check will fail and the computer will enter BitLocker recovery mode and
prompt the user to provide recovery information before unlocking the drive.
A compatible Trusted Platform Module (TPM) Security Device must be present on this computer,
but a TPM was not found. Please contact your system administrator to enable BitLocker.
If you receive this error message on a computer that has a TPM, check if either of the following
situations applies to your computer:
• Some computers have TPMs that do not appear in the Windows 7 TPM Microsoft
Management Console snap-in (tpm.msc) due to a BIOS setting that hides the TPM by default
and does not make the TPM available unless it is first enabled in the BIOS. If your TPM might
be hidden in the BIOS, consult the manufacturer's documentation for instructions to display
or enable the TPM.
• Some computers might have an earlier version of the TPM or an earlier version of the system
BIOS that is not compatible with BitLocker. Contact the computer manufacturer to verify that
the computer has a TPM version 1.2 or to get a BIOS update.
To help determine whether a computer can read from a USB device during the boot process, use
the BitLocker system check as part of the BitLocker setup process. This system check performs tests
to confirm that the computer can properly read from the USB devices at the appropriate time and
that the computer meets other BitLocker requirements.
To enable BitLocker on a computer without a TPM, you must enable the Require additional
authentication at setup Group Policy setting, which is located in Computer
Configuration\Administrative Templates\Windows Components\BitLocker Drive
Encryption\Operating System Drives. You must select the Allow BitLocker without a compatible
TPM check box. After this setting is applied to the local computer, the non-TPM settings appear in
the BitLocker setup wizard.
1. It is compatible with Windows 7 and has passed the Windows 7 logo tests.
3. It has a secure update mechanism to help prevent a malicious BIOS from being installed on
the computer.
Upgrading
Disable and Suspend refer to the same process. Disable was used in Windows Vista, and Suspend
is used in Windows 7. The term was changed to more accurately describe the process. When
BitLocker is suspended, BitLocker keeps the data encrypted but encrypts the BitLocker volume
master key with a clear key. The clear key is a cryptographic key stored unencrypted and
unprotected on the disk drive. By storing this key unencrypted, the Suspend option allows for
changes or upgrades to the computer without the time and cost of decrypting and re-encrypting
the entire drive. After the changes are made and BitLocker is again enabled, BitLocker will reseal
the encryption key to the new values of the measured components that changed as a part of the
upgrade, and the clear key is erased. This option is only available for operating system drives.
7 Note
Disable is the term used in Windows Vista to refer to the process of temporarily suspending
BitLocker protection on a drive without decrypting the drive. In Windows 7, the term has been
changed to Suspend to more accurately reflect the process.
Please refer to the following table to determine whether you must disable or suspend BitLocker or
decrypt your drive before you perform an upgrade or update installation.
If you disabled or suspended BitLocker, you can resume BitLocker protection after you have
installed the upgrade or update. Upon resuming protection, BitLocker will reseal the encryption key
to the new values of the measured components that changed as a part of the upgrade or update. If
these types of upgrades or updates are applied without decrypting or disabling BitLocker, your
computer will enter recovery mode when restarting and will require a recovery key or password to
access the computer.
If you want to reclaim this free space before encryption of the drive has completed, you can use
the Manage-bde command-line tool to pause encryption. To do this, open an elevated command
prompt and type the following command, replacing driveletter with the letter of the drive you want
to pause encryption on:
When you are ready to start encrypting the drive again, type the following command:
Does BitLocker encrypt and decrypt the entire drive all at once
when reading and writing data?
No, BitLocker does not encrypt and decrypt the entire drive when reading and writing data. The
encrypted sectors in the BitLocker-protected drive are decrypted only as they are requested from
system read operations. Blocks that are written to the drive are encrypted before the system writes
them to the physical disk. No unencrypted data is ever stored on a BitLocker-protected drive.
When these policy settings are enabled, the BitLocker-protected operating system will mount any
data drives that are not protected by BitLocker as read-only.
If you are concerned that your users might inadvertently store data in an unencrypted drives while
using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group
Policy to configure access control for the drives or hide the drive letter.
For additional information about how to hide drive letters, see article 231289 in the Microsoft
Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=83219 ).
• Changing the BIOS, master boot record, boot sector, boot manager, option ROM, or other
early boot components or boot configuration data.
This functionality is by design; BitLocker treats unauthorized modification of any of the early boot
components as a potential attack and will place the system into recovery mode. Authorized
administrators can update boot components without entering recovery mode by disabling
BitLocker beforehand.
• Changing any boot configuration data (BCD) boot entry data type settings with the exception
of the following items:
DESCRIPTION
RAMDISKIMAGEOFFSET
PASSCOUNT
TESTMIX
FAILURECOUNT
TESTTOFAIL
2 Warning
When installing a language pack, an additional option in the language pack installation wizard
asks if the user wants to apply language settings to All users and system accounts. If this
option is selected, it will change the local computer BCD settings (if the user-only option is
selected, BCD settings are not changed). This change will result in a modification of a BCD
setting to the new locale value. If you are using a TPM with BitLocker, this is interpreted as a
boot attack on reboot and the computer will require that the user enter the recovery password
or recovery key to start the computer.
We recommend that you suspend BitLocker before changing locales or installing a language
pack, just as you would before making any major computer configuration change, such as
updating the BIOS.
• Changing the BIOS boot order to boot another drive in advance of the hard drive.
• Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting
or removing a CD or DVD.
• Failing to boot from a network drive before booting from the hard drive.
• Changes to the NTFS partition table on the disk including creating, deleting, or resizing a
primary partition.
• Entering the personal identification number (PIN) incorrectly too many times so that the anti-
hammering logic of the TPM is activated. Anti-hammering logic is software or hardware
methods that increase the difficulty and cost of a brute force attack on a PIN by not accepting
PIN entries until after a certain amount of time has passed.
• Turning off the BIOS support for reading the USB device in the pre-boot environment if you
are using USB-based keys instead of a TPM.
• Upgrading critical early startup components, such as a BIOS upgrade, causing the BIOS
measurements to change.
• Adding or removing hardware. For example, inserting a new card in the computer, including
some PCMIA wireless cards.
• Hiding the TPM from the operating system. Some BIOS settings can be used to prevent the
enumeration of the TPM to the operating system. When implemented, this option can make
the TPM hidden from the operating system. When the TPM is hidden, BIOS secure startup is
disabled, and the TPM does not respond to commands from any software.
• Using a different keyboard that does not correctly enter the PIN or whose keyboard map does
not match the keyboard map assumed by the pre-boot environment. This can prevent the
entry of enhanced PINs.
• Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For
example, including PCR[1] would result in most changes to BIOS settings, causing BitLocker
to enter recovery mode.
7 Note
Some computers have BIOS settings that skip measurements to certain PCRs, such as PCR[2].
Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the
PCR measurement will be different.
• Losing the USB flash drive containing the startup key when startup key authentication has
been enabled.
• Having a BIOS or an option ROM component that is not compliant with the relevant Trusted
Computing Group standards for a client computer. For example, a non-compliant
implementation may record volatile data (such as time) in the TPM measurements, causing
different measurements on each startup and causing BitLocker to start in recovery mode.
• Changing the usage authorization for the storage root key of the TPM to a non-zero value.
7 Note
The BitLocker TPM initialization process sets the usage authorization value to zero, so another
user or process must explicitly have changed this value.
• Disabling the code integrity check or enabling test signing on Windows Boot Manager
(Bootmgr).
• Pressing the F8 or F10 key during the boot process.
• Adding or removing add-in cards (such as video or network cards), or upgrading firmware on
add-in cards.
• Using a BIOS hot key during the boot process to change the boot order to something other
than the hard drive.
7 Note
Mounting the hard disk on another computer running Windows 7 is a quick and
straightforward way to recover information from a damaged computer that has a BitLocker-
protected drive on the hard disk.
2 Warning
Configuring a computer for dual boot is not recommended if the computer is running Unified
Extensible Firmware Interface (UEFI) firmware.
2. Click Start, click Control Panel, click Security, and then click BitLocker Drive Encryption.
3. For the drive Windows Vista is installed on, click Turn On BitLocker, and follow the BitLocker
setup process. You may need to run the BitLocker Drive Preparation Tool prior to beginning
BitLocker setup.
4. After encryption has started, follow the same steps to begin the process of encrypting any
data drives that you want to access in both Windows 7 and Windows Vista.
5. After all of the drives you want to encrypt are fully encrypted, click Start, click Control Panel,
click Security, click BitLocker Drive Encryption, and then click Turn Off BitLocker on the drive
Windows Vista is installed on.
8. After the installation is complete, click Start, click Control Panel, click System and Security,
and then click BitLocker Drive Encryption.
9. For the drive Windows 7 is installed on, click Turn On BitLocker, and follow the BitLocker
setup process.
10. After encryption is complete, click Start, click Control Panel, click System and Security, and
then click BitLocker Drive Encryption.
11. Click Manage BitLocker for the drive Windows Vista is installed on, and then click
Automatically unlock on this computer. Repeat this step for any additional data drives.
12. Restart the computer. From the boot options menu, choose Windows Vista.
13. Click Start, click Control Panel, click Security, and click BitLocker Drive Encryption.
14. For the drive Windows Vista is installed on, click Turn On BitLocker.
• When running Windows 7, you will have access to any BitLocker-protected fixed data drives
and the drive Windows Vista is installed on.
• When running Windows Vista, you will have access to any BitLocker-protected fixed data
drives but will not be able to access the drive Windows 7 is installed on.
Dynamic volumes
RAM disks
FAT16
FAT32
ExFAT
Drive Supported Not supported
configuration
SATA eSATA
SAS Bluetooth
ATA
IDE
SCSI
Key management
Prior to enabling BitLocker on a computer with a TPM version 1.2, you must initialize the TPM. The
initialization process generates a TPM owner password, which is a password set on the TPM. You
must be able to supply the TPM owner password to change the state of the TPM, such as when
enabling or disabling the TPM or resetting the TPM lockout.
When you set up BitLocker, you must choose how access to BitLocker-protected drives can be
recovered in the event that the specified unlock method cannot be used (such as if the TPM cannot
validate the boot components, the personal identification number (PIN) is forgotten, or the
password is forgotten). In these situations, you must be able to supply either the recovery key or
the recovery password to unlock the encrypted data on the drive. In Windows 7, the term "recovery
key" is used generically to refer to both the recovery key file and the recovery password. When you
supply the recovery information, you can use either of the following formats:
• A recovery password consisting of 48 digits divided into eight groups. During recovery, you
need to type this password into the BitLocker recovery console by using the function keys on
your keyboard.
• A key file on a USB flash drive that is read directly by the BitLocker recovery console. During
recovery, you need to insert this USB device.
For a higher level of security with the TPM, you can configure BitLocker with a personal
identification number (PIN). The PIN is a user-created value that must be entered each time the
computer starts or resumes from hibernation. The PIN can consist of 4 to 20 digits as specified by
the Configure minimum PIN length for startup Group Policy setting and is stored internally as a
256-bit hash of the entered Unicode characters. This value is never displayed to the user. The PIN is
used to provide another factor of authentication in conjunction with TPM authentication.
For an even higher level of security with the TPM, you can configure BitLocker to use enhanced
PINs. Enhanced PINs are PINs that use the full keyboard character set in addition to the numeric set
to allow for more possible PIN combinations and are between 4 and 20 characters in length. To use
enhanced PINs, you must enable the Allow enhanced PINs for startup Group Policy setting before
adding the PIN to the drive. By enabling this policy, all PINs created can utilize full keyboard
characters.
7 Note
To use enhanced PINs, your computer's BIOS must support using the full keyboard in the pre-
boot environment. Users can run the optional system check during the BitLocker setup
process to ensure the PIN can be entered correctly in the pre-boot environment. You should
verify that the computers in your organization are compatible before making the use of
enhanced PINs an organizational requirement.
When setting a BitLocker PIN by using the BitLocker setup wizard, the Manage-bde command-line
tool, or through Windows Management Instrumentation (WMI) remote administration, you can use
the wide character set. However, system firmware, either BIOS or Unified Extensible Firmware
Interface (UEFI), may only support a standard EN-US keyboard and keymap during system startup.
Additionally, BIOS-based systems are limited to 7-bit ASCII input during PIN entry. Thus, the use of
either non-English characters or keys that differ in position from the EN-US keymap, such as
QWERTZ and AZERTY keyboards, may cause boot-time PIN entry to fail. If your computer is
affected by this limitation, it should be identified during the system check run by the BitLocker
setup wizard. If it is not identified during the system check and the PIN is not able to be entered,
you will need to supply the recovery key to unlock the drive.
We recommend that users set their keyboard layout to EN-US during enhanced PIN entry to avoid
PIN entry failure in the pre-boot environment. If you are unable to enter an enhanced PIN from
your keyboard even after setting the keyboard layout to EN-US, you must use a numeric-only PIN.
The following list identifies characters that are not currently supported by system firmware:
• Roman characters on keyboards with a non-EN-US keymap. For example, "Z" and "Y" on
German keyboards and "Q" and "A" on French keyboards.
• Characters that are not available in 7-bit ASCII. For example, characters with umlauts, grave
accents, and tildes.
• Symbols that are not available in 7-bit ASCII. For example, squared superscript, fractions,
copyright, trademark, and international currency symbols.
Startup key
Configuring a startup key is another method to enable a higher level of security with the TPM. The
startup key is a key stored on a USB flash drive, and the USB flash drive must be inserted every
time the computer starts. The startup key is used to provide another factor of authentication in
conjunction with TPM authentication. To use a USB flash drive as a startup key, the USB flash drive
must be formatted by using the NTFS, FAT, or FAT32 file system.
) Important
For removable data drives, the recovery password and recovery key can be saved to a folder or
printed. By default, you cannot store a recovery key for a removable drive on a removable drive.
A domain administrator can additionally configure Group Policy to automatically generate recovery
passwords and store them in Active Directory Domain Services (AD DS) for any BitLocker-protected
drive. For more information about how to store recovery information in AD DS, see Backing Up
BitLocker and TPM Recovery Information to AD DS.
For more information about using Manage-bde, see the Manage-bde.exe Parameter Reference.
Can the USB flash drive that is used as the startup key also be
used to store the recovery key?
While this is technically possible, it is not a best practice to use one USB flash drive to store both
keys. If the USB flash drive that contains your startup key is lost or stolen, you also lose access to
your recovery key. In addition, inserting this key would cause your computer to automatically boot
from the recovery key even if TPM-measured files have changed, which circumvents the TPM's
system integrity check.
This storage process ensures that the volume master key is never stored unencrypted and is
protected unless you disable BitLocker. The keys are also saved to two additional locations on the
drive for redundancy. The keys can be read and processed by the boot manager.
For a complete description of how encryption keys work in BitLocker, see the BitLocker Drive
Encryption Technical Overview .
Why do I have to use the function keys to enter the PIN or the
48-character recovery password?
The F1 through F10 keys are universally mapped scan codes available in the pre-boot environment
on all computers and in all languages. The numeric keys 0 through 9 are not usable in the pre-boot
environment on all keyboards.
When using an enhanced PIN, users should run the optional system check during the BitLocker
setup process to ensure that the PIN can be entered correctly in the pre-boot environment. For
more information about enhanced PINs see What is the difference between a TPM owner
password, recovery password, recovery key, PIN, enhanced PIN, and startup key?
How does BitLocker help prevent an attacker from discovering
the PIN that unlocks my operating system drive?
It is possible that a personal identification number (PIN) can be discovered by an attacker
performing a brute force attack. A brute force attack occurs when an attacker uses an automated
tool to try different PIN combinations until the correct one is discovered. For BitLocker-protected
computers, this type of attack, also known as a dictionary attack, requires that the attacker have
physical access to the computer.
The TPM has the built-in ability to detect and react to these types of attacks. Because different
manufacturers' TPMs may support different PIN and attack mitigations, contact your TPM's
manufacturer to determine how your computer's TPM mitigates PIN brute force attacks.
After you have determined your TPM's manufacturer (see How can I determine the manufacturer of
my TPM?), contact the manufacturer to gather the TPM's vendor-specific information. Most
manufacturers use the PIN authentication failure count to exponentially increase lockout time to
the PIN interface. However, each manufacturer has different policies regarding when and how the
failure counter is decreased or reset.
• What is the algorithm for determining the duration of a lockout based on the number of
failed attempts and any other relevant parameters?
• What actions can cause the failure count and lockout duration to be decreased or reset?
How are the PIN and TPM used to derive the volume master
key?
BitLocker hashes the user-specified personal identification number (PIN) by using SHA-256, and
the first 160 bits of the hash are used as authorization data sent to the TPM to seal the volume
master key. The volume master key is now protected by both the TPM and the PIN. To unseal the
volume master key, you are required to enter the PIN each time the computer restarts or resumes
from hibernation.
BitLocker To Go
7 Note
The BitLocker To Go Reader is not supported on removable drives formatted with NTFS.
To allow computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2
to open BitLocker-protected data drives but prevent the BitLocker To Go Reader application
from being installed on the drive, enable these policy settings and select the Do not install
BitLocker To Go Reader on FAT formatted removable drives and Do not install BitLocker To
Go Reader on FAT formatted fixed drives check boxes on the respective policy settings.
7 Note
Before deleting the BitLocker To Go Reader from a drive, BitLocker checks that the
identification field of the drive is either blank or matches the identification field for your
organization.
) Important
You should ensure that BitLocker has finished the encryption process on your drive before
attempting to view the drive by using the BitLocker To Go Reader.
For detailed instructions about how to configure AD DS for BitLocker, see Backing Up
BitLocker and TPM Recovery Information to AD DS.
In Windows Server 2003 with SP1, the schema must be extended to support storing BitLocker and
TPM recovery and password information.
In Windows Server 2008 and Windows Server 2008 R2, the schema already includes the required
attributes.
Stored Description
information
Hash of the TPM The password hash can be stored only if the TPM is owned and the ownership was taken
owner password by using components of Windows 7, such as the BitLocker Setup Wizard or the TPM snap-
in.
BitLocker The recovery password allows you to unlock and access the drive in the event of a
recovery recovery incident. Domain administrators can view the BitLocker recovery password by
password using the BitLocker Recovery Password Viewer. For more information about this tool, see
BitLocker Recovery Password Viewer for Active Directory.
BitLocker key The key package helps to repair damage to the hard disk that would otherwise prevent
package standard recovery. Using the key package for recovery requires the BitLocker Repair Tool,
Repair-bde. For more information about this command-line tool, see Repair-bde.exe
Parameter Reference (https://go.microsoft.com/fwlink/?LinkId=162622).
7 Note
After recovery information is transmitted, AD DS does not store the BitLocker and TPM
recovery information in an encrypted format. However, access control permissions are set so
that only domain administrators or appropriate delegates can read the stored information
when the server is online. Enterprises concerned about offline attacks on branch office servers
should consider enabling BitLocker on those servers. We also recommended configuring your
domain controllers to support encryption sealing and that any recovery retrieval application
used in your organization use sealing as well.
For more information about developing applications that exchange encrypted data over a
network, see the following articles on MSDN:
For more information about configuring servers to support encryption sealing, see the following
articles:
If an attacker gains full access to AD DS, all computers in the domain, including BitLocker-protected
computers, can be compromised. For more information about securing access to AD DS, see
Securing Active Directory Administrative Groups and Accounts (https://go.microsoft.com/fwlink
/?LinkId=83266 ).
The BitLocker Windows Management Instrumentation (WMI) interface does allow administrators to
write a script to back up or synchronize an online client's existing recovery information; however,
BitLocker does not automatically manage this process. The Manage-bde command-line tool can
also be used to manually back up recovery information to AD DS. For example, to back up all of
the recovery information for the C: drive to AD DS, you would use the following command from an
elevated command prompt: manage-bde –protectors -adbackup C:.
) Important
Joining a computer to the domain should be the first step for new computers within an
organization. After computers are joined to a domain, storing the BitLocker recovery key to
AD DS is automatic (when enabled in Group Policy).
When an administrator selects the Require BitLocker backup to AD DS check box of the Store
BitLocker recovery information in Active Directory Domain Service (Windows 2008 and
Windows Vista) policy setting, or the equivalent Do not enable BitLocker until recovery
information is stored in AD DS for (operating system | fixed data | removable data) drives check
box in any of the Choose how BitLocker-protected operating system drives can be recovered,
Choose how BitLocker-protected fixed data drives can be recovered, Choose how BitLocker-
protected removable data drives can be recovered policy settings, this prevents users from
enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker
recovery information to AD DS succeeds. With these settings configured if the backup fails,
BitLocker cannot be enabled, ensuring that administrators will be able to recover BitLocker-
protected drives in the organization.
When an administrator clears these check boxes, the administrator is allowing a drive to be
BitLocker-protected without having the recovery information successfully backed up to AD DS;
however, BitLocker will not automatically retry the backup if it fails. Instead, administrators can
create a script for the backup, as described earlier in What if BitLocker is enabled on a computer
before the computer has joined the domain? to capture the information after connectivity is
restored.
Security
7 Note
Other questions
2. The TPM manufacturer is listed in the details pane, under TPM Manufacturer Information.
7 Note
The Manufacturer Name field in the TPM Manufacturer Information listing is information
provided by the TPM and is often an abbreviation (such as ATML for Atmel, BRCM for
Broadcomm, or IFX for Infineon).
• The computer's BIOS or boot menu does not have reading USB flash drives enabled.
• There are multiple USB flash drives inserted into the computer.
• The computer's BIOS only supports using the function keys (F1–F10) to enter numerals in the
pre-boot environment.
• The startup key was removed before the computer finished rebooting.
7 Note
Ensure all data is saved to the drive before locking it. Once locked, the drive will become
inaccessible.
Outside of using this command, data drives will be locked on shutdown and restart of the
operating system. A removable data drive will also be locked automatically when the drive is
removed from the computer.