How to Manage BitLocker with Group Policy
BitLocker has several Group Policy settings located in Computer Configuration\Policies \Administrative Templates\Windows Components\BitLocker Drive Encryption that you can use to manage the available features. Table below lists these policies, which are written to the registry on targeted computers under the following registry key:
HKLM\Software\Policies\Microsoft\FVE
Group Policy Settings for BitLocker Drive Encryption
Policy | Description |
Store BitLocker Recovery Information In Active Directory Domain Services (Windows Server 2008 And Windows Vista) | Enabling this policy silently backs up BitLocker recovery information to AD DS. For computers running Windows 7 and Windows Server 2008 R2, enable the Fixed Data Drives \Choose How BitLocker-Protected Fixed Drives Can Be Recovered, Operating System Drives\Choose How BitLocker- Protected Operating System Drives Can Be Recovered, or Removable Data Drives\Choose How BitLocker-Protected Removable Drives Can Be Recovered policies. |
Choose Default Folder For Recovery Password | Enabling this policy and configuring a default path for it sets the default folder to display when the user is saving recovery information for BitLocker. The user will have the ability to override the default. |
Choose How Users Can Recover BitLocker-Protected Drives (Windows Server 2008 And Windows Vista) | Enabling this policy allows you to control which recovery mechanisms the user can choose. Disabling the recovery password will disable saving to a folder or printing the key because these actions require the 48-digit recovery password. Disabling the 256-bit recovery key will disable saving to a USB key. If you disable both options, you must enable AD DS backup or a policy error will occur. For computers running Windows 7 and Windows Server 2008 R2, enable the Fixed Data Drives\Choose How BitLocker-Protected Fixed Drives Can Be Recovered, Operating System Drives\Choose How BitLocker-Protected Operating System Drives Can Be Recovered, or Removable Data Drives\Choose How BitLocker- Protected Removable Drives Can Be Recovered policies. |
Choose Drive Encryption Method And Cipher Strength | Enabling this policy allows configuration of the encryption method used by BitLocker Drive Encryption. The default if this key is not enabled is 128-bit AES with Diffuser. Other choices that can be configured are 256-bit AES with Diffuser, 128-bit AES, and 256-bit AES. |
Prevent Memory Overwrite On Restart | Enabling this policy prevents Windows from overwriting memory on restarts. This potentially exposes BitLocker secrets but can improve restart performance. |
Provide The Unique Identifiers For Your Organization | Enable this policy if you want to prevent users from mounting BitLocker-protected drives that might be from outside organizations. |
Validate Smart Card Certificate Usage Rule Compliance | Enable this policy only if you want to restrict users to smart cards that have an object identifier (OID) that you specify. |
Operating System Drives \Require Additional Authentication At Startup or Operating System Drives \Require Additional Authentication At Startup (Windows Server 2008 And Windows Vista) | Enabling this policy allows configuring additional startup options and allows enabling of BitLocker on a non-TPMcompatible computer. On TPM-compatible computers, a secondary authentication can be required at startup-either a USB key or a startup PIN, but not both. |
Allow Enhanced PINs For Startup | Enhanced PINs permit the use of characters including uppercase and lowercase letters, symbols, numbers, and spaces. By default, enhanced PINs are disabled. |
Operating System Drives \Configure Minimum PIN Length For Startup | Enables you to require a minimum PIN length. |
Operating System Drives \Choose How BitLocker- Protected Operating System Drives Can Be Recovered | Enabling this policy allows you to control which recovery mechanisms the user can choose and whether recovery information is stored in the AD DS. Disabling the recovery password will disable saving to a folder or printing the key because these actions require the 48-digit recovery password. Disabling the 256-bit recovery key will disable saving to a USB key. |
Operating System Drives \Configure TPM Platform Validation Profile | Enabling this policy allows detailed configuration of the PCR indices. Each index aligns with Windows features that run during startup. |
Fixed Data Drives\Configure Use Of Smart Cards On Fixed Data Drives | Enables or requires smart cards for BitLocker to protect non-operating system volumes. |
Fixed Data Drives\Deny Writer Access To Fixed Drives Not Protected By BitLocker | Requires drives to be BitLocker-protected before users can save files. |
Fixed Data Drives\Allow Access To BitLocker-Protected Fixed Data Drives From Earlier Versions Of Windows | Allows you to prevent the BitLocker To Go Reader from being copied to fixed data drives, preventing users of earlier versions of Windows (including Windows Server 2008, Windows Vista, and Windows XP SP2 or SP3) from entering a password to access the drive. |
Fixed Data Drives\Configure Use Of Passwords For Fixed Drives | Requires passwords to access BitLocker-protected fixed drives and configures password complexity. |
Fixed Data Drives\Choose How BitLocker-Protected Fixed Drives Can Be Recovered | Enabling this policy allows you to control which recovery mechanisms the user can choose and whether recovery information is stored in the AD DS. Disabling the recovery password will disable saving to a folder or printing the key because these actions require the 48-digit recovery password. Disabling the 256-bit recovery key will disable saving to a USB key. |
For information about BitLocker To Go policies (which are configured in the Removable Data Drives node), refer to the section titled "BitLocker To Go" earlier in this tutorial.
In this tutorial:
- Managing Disks and File Systems
- Overview of Partitioning Disks
- How to Choose Between MBR or GPT
- Converting from MBR to GPT Disks
- GPT Partitions
- Choosing Basic or Dynamic Disks
- Working with Volumes
- How to Create a Simple Volume
- How to Create a Spanned Volume
- How to Create a Striped Volume
- How to Resize a Volume
- How to Delete a Volume
- How to Create and Use a Virtual Hard Disk
- File System Fragmentation
- Backup And Restore
- How File Backups Work
- File and Folder Backup Structure
- How System Image Backups Work
- How to Start a System Image Backup from the Command Line
- How to Restore a System Image Backup
- System Image Backup Structure
- Best Practices for Computer Backups
- How to Manage Backup Using Group Policy Settings
- Previous Versions and Shadow Copies
- How to Manage Shadow Copies
- How to Restore a File with Previous Versions
- How to Configure Previous Versions with Group Policy Settings
- Windows ReadyBoost
- BitLocker Drive Encryption
- How BitLocker Encrypts Data
- How BitLocker Protects Data
- TPM with External Key (Require Startup USB Key At Every Startup)
- TPM with PIN (Require PIN At Every Startup)
- TPM with PIN and External Key
- BitLocker To Go
- BitLocker Phases
- Requirements for Protecting the System Volume with BitLocker
- How to Enable the Use of BitLocker on the System Volume on Computers Without TPM
- How to Enable BitLocker Encryption on System Volumes
- How to Enable BitLocker Encryption on Data Volumes
- How to Manage BitLocker Keys on a Local Computer
- How to Manage BitLocker from the Command Line
- How to Recover Data Protected by BitLocker
- How to Disable or Remove BitLocker Drive Encryption
- How to Decommission a BitLocker Drive Permanently
- How to Prepare AD DS for BitLocker
- How to Configure a Data Recovery Agent
- How to Manage BitLocker with Group Policy
- The Costs of BitLocker
- Windows 7 Encrypting File System
- How to Export Personal Certificates
- How to Import Personal Certificates
- How to Grant Users Access to an Encrypted File
- Symbolic Links
- How to Create Symbolic Links
- How to Create Relative or Absolute Symbolic Links
- How to Create Symbolic Links to Shared Folders
- How to Use Hard Links
- Disk Quotas
- How to Configure Disk Quotas on a Single Computer
- How to Configure Disk Quotas from a Command Prompt
- How to Configure Disk Quotas by Using Group Policy Settings
- Disk Tools
- EFSDump
- SDelete
- Streams
- Sync
- MoveFile and PendMoves