The Windows 10 BitLocker menu didn't show the USB drive as an option and I didn't have the BitLocker option when right-clicking the USB drive. Strange I thought. So I grabbed a couple more random drives I had laying around and it didn't seem like anything would work with BitLocker.
Important Notes Password / recovery key is needed to unlock your encrypted drive. Make sure you store your password and recovery key in a safe and separate place other than your computer. To avoid data corruption/lost during the encryption process, it is recommended that a new or nearly new device be used for encryption and not to interrupt the encryption process. |
- This tutorial will show you how to use the BitLocker Repair Tool (repair-bde) to recover the contents of a damaged drive encrypted by BitLocker in Windows 7, Windows 8, and Windows 10. You must be signed in as an administrator to use the BitLocker Repair Tool.
- Several computers is my company has missing the function to encrypt external drives. My local disc is encrypt and can ativate/deativate the bitlocker, but if i plug a usb pen drive the function of manage the bitlocker to encript disapear. In control panel can't manage bitloker to go. I already check the service of bitlocker is running.
- Bitlocker is a great encryption tool integrated into Windows 10. But it’s not for everyone, as only Windows 10 Pro and Enterprise users have access to it. Sorry Windows 10 Home folks, this one’s just not for you, and you’ll need to look for an alternative.
- Turn on BitLocker To Go to Encrypt Files
- Connect your removable storage device to your computer.
- Go to “Control Panel” and select “BitLocker Drive Encryption”.
- Select the removable storage drive you want to encrypt and then click “Turn on BitLocker”.
- Wait for a while for BitLocker initialization to complete.
- Select “Use a password to unlock the drive” and define your password. Re-type the password to confirm and then click “Next”.
- Select where you want to save the recovery key which is needed to access the drive in case you have forgotten your password. It is NOT recommended to use the “Save to your cloud domain account” option as it requires your desktop PC to join the Microsoft Azure Active Directory which is not currently provisioned. Instead, you are recommended to use the “Save to a file”option, and store the recovery key in a secure place as it is your last resort of unlocking the drive. After saving your recovery key, click “Next”.
- Choose how you want to encrypt the drive. If you are using a new drive, select “Encrypt used disk space only”. If you are using a drive with data, select “Encrypt entire drive”. Then click “Next”.
- Select the encryption mode. If you will use the encrypted drive on older versions of Windows, select “Compatible mode”. If you will only use the drive on Windows 10 machine, select “New encryption mode” which is a better encryption method. Then click “Next”.
- Click “Start encrypting” when ready.
- The encryption process may take some time, depending on various factors including the speed of the storage device, performance of the PC, etc. (Microsoft estimates the encryption speed to be around 500MB/min). Interrupting the process may result in data corruption/lost.
- Click “Close” when the encryption is completed.
The next time you connect your encrypted drive to the computer, enter your password to unlock the drive.
- Use Recovery Key to Unlock the Drive
In case you have forgotten your unlock password or for whatever reasons you cannot access the encrypted drive, you can unlock the drive using the recovery key.
- Right-click the encrypted drive from file explorer, then click “Unlock Drive”.
- Click “More options” in the pop-up window.
- Make sure “Automatically unlock on this PC” is checked and click “Enter recovery key”.
- Key in the recovery key and click “Unlock”.
- The drive is unlocked.
- Change Unlock Password
- Unlock your encrypted drive with the existing password.
- Go to Control Panel and then select “BitLocker Drive Encryption”.
- Locate your encrypted drive and click “Change password”.
- Key in your old password. Define a new password and re-type it to confirm. Then click “Change password”.
- The password is changed. Click “Close”.
Use Intune to configure BitLocker Drive Encryption on devices that run Windows 10.
BitLocker is available on devices that run Windows 10 or later. Some settings for BitLocker require the device have a supported TPM.
Use one of the following policy types to configure BitLocker on your managed devices
Endpoint security disk encryption policy for Windows 10 BitLocker. The BitLocker profile in Endpoint security is a focused group of settings that is dedicated to configuring BitLocker.
View the BitLocker settings that are available in BitLocker profiles from disk encryption policy.
Device configuration profile for endpoint protection for Windows 10 BitLocker. BitLocker settings are one of the available settings categories for Windows 10 endpoint protection.
View the BitLocker settings that are available for BitLocker in endpoint protection profiles form device configuration policy.
Bitlocker To Go Windows 10 Download
Tip
Intune provides a built-in encryption report that presents details about the encryption status of devices, across all your managed devices. After Intune encrypts a Windows 10 device with BitLocker, you can view and manage BitLocker recovery keys when you view the encryption report.
You can also access important information for BitLocker from your devices, as found in Azure Active Directory (Azure AD).encryption report that presents details about the encryption status of devices, across all your managed devices.
Permissions to manage BitLocker
To manage BitLocker in Intune, your account must have the applicable Intune role-based access control (RBAC) permissions.
Following are the BitLocker permissions, which are part of the Remote tasks category, and the built-in RBAC roles that grant the permission:
- Rotate BitLocker Keys
- Help Desk Operator
Create and deploy policy
Use one of the following procedures to create the policy type you prefer.
Create an endpoint security policy for BitLocker
Sign in to the Microsoft Endpoint Manager admin center.
Select Endpoint security > Disk encryption > Create Policy.
Set the following options:
- Platform: Windows 10 or later
- Profile: BitLocker
On the Configuration settings page, configure settings for BitLocker to meet your business needs.
If you want to enable BitLocker silently, see Silently enable BitLocker on devices, in this article for additional prerequisites and the specific setting configurations you must use.
Select Next.
On the Scope (Tags) page, choose Select scope tags to open the Select tags pane to assign scope tags to the profile.
Select Next to continue.
On the Assignments page, select the groups that will receive this profile. For more information on assigning profiles, see Assign user and device profiles.
Select Next.
On the Review + create page, when you're done, choose Create. The new profile is displayed in the list when you select the policy type for the profile you created.
Create a device configuration profile for BitLocker
Sign in to the Microsoft Endpoint Manager admin center.
Select Devices > Configuration profiles > Create profile.
Set the following options:
- Platform: Windows 10 and later
- Profile type: Endpoint protection
Select Settings > Windows Encryption.
Configure settings for BitLocker to meet your business needs.
If you want to enable BitLocker silently, see Silently enable BitLocker on devices, in this article for additional prerequisites and the specific setting configurations you must use.
Select OK.
Complete configuration of additional settings, and then save the profile.
Manage BitLocker
To view information about devices that receive BitLocker policy, see Monitor disk encryption.
Silently enable BitLocker on devices
You can configure a BitLocker policy that automatically and silently enables BitLocker on a device. That means that BitLocker enables successfully without presenting any UI to the end user, even when that user isn't a local Administrator on the device.
Device Prerequisites:
Bitlocker To Go Windows 10
A device must meet the following conditions to be eligible for silently enabling BitLocker:
- If end users log in to the devices as Administrators, the device must run Windows 10 version 1803 or later.
- If end users log in to the the devices as Standard Users, the device must run Windows 10 version 1809 or later.
- The device must be Azure AD Joined
- Device must contain TPM (Trusted Platform Module) 2.0
- The BIOS mode must be set to Native UEFI only.
BitLocker policy configuration:
The following two settings for BitLocker base settings must be configured in the BitLocker policy:
- Warning for other disk encryption = Block.
- Allow standard users to enable encryption during Azure AD Join = Allow
The BitLocker policy must not require use of a startup PIN or startup key. When a TPM startup PIN or startup key is required, BitLocker can't silently enable and requires interaction from the end user. This requirement is met through the following three BitLocker OS drive settings in the same policy:
- Compatible TPM startup PIN must not be set to Require startup PIN with TPM
- Compatible TPM startup key must not set to Require startup key with TPM
- Compatible TPM startup key and PIN must not set to Require startup key and PIN with TPM
View details for recovery keys
Intune provides access to the Azure AD blade for BitLocker so you can view BitLocker Key IDs and recovery keys for your Windows 10 devices, from within the Intune portal. To be accessible, the device must have its keys escrowed to Azure AD.
Sign in to the Microsoft Endpoint Manager admin center.
Select Devices > All devices.
Select a device from the list, and then under Monitor, select Recovery keys.
Hit Show Recovery Key. Selecting this will generate an audit log entry under 'KeyManagement' activity.
When keys are available in Azure AD, the following information is available:
- BitLocker Key ID
- BitLocker Recovery Key
- Drive Type
When keys aren't in Azure AD, Intune will display No BitLocker key found for this device.
Information for BitLocker is obtained using the BitLocker configuration service provider (CSP). BitLocker CSP is supported on Windows 10 version 1703 and later, and for Windows 10 Pro version 1809 and later.
IT admins need to have a specific permission within Azure Active Directory to be able to see device BitLocker recovery keys: microsoft.directory/devices/bitLockerRecoveryKeys/read
. There are some roles within Azure AD that come with this permission, including Cloud Device Administrator, Helpdesk Administrator, etc. For more information on which Azure AD roles have which permissions, see Azure AD role descriptions.
All BitLocker recovery key accesses are audited. For more information on Audit Log entries, see Azure Portal audit logs.
Download Bitlocker For Windows 10 Home
Rotate BitLocker recovery keys
You can use an Intune device action to remotely rotate the BitLocker recovery key of a device that runs Windows 10 version 1909 or later.
Bitlocker To Go Windows 7
Prerequisites
Devices must meet the following prerequisites to support rotation of the BitLocker recovery key:
Devices must run Windows 10 version 1909 or later
Azure AD-joined and Hybrid-joined devices must have support for key rotation enabled via BitLocker policy configuration:
- Client-driven recovery password rotation to Enable rotation on Azure AD-joined devices or Enable rotation on Azure AD and Hybrid-joined devices
- Save BitLocker recovery information to Azure Active Directory to Enabled
- Store recovery information in Azure Active Directory before enabling BitLocker to Required
To rotate the BitLocker recovery key
Windows 7 Bitlocker To Go
Sign in to the Microsoft Endpoint Manager admin center.
Select Devices > All devices.
In the list of devices that you manage, select a device, select More, and then select the BitLocker key rotation device remote action.
On the Overview page of the device, select the BitLocker key rotation. If you don’t see this option, select the ellipsis (…) to show additional options, and then select the BitLocker key rotation device remote action.