My name is Tanner Slayton and I am a Sr. Support Escalation Engineer for Microsoft on the Windows Core Team. I am writing today to shed some light on a common Bitlocker problem that we see.

 

 

* While you can accomplish most tasks via the Bitlocker Control Panel Applet, I am going to be using the manage-bde commands from an elevated command prompt.

 

Specific operations or actions will cause Bitlocker to go into Recovery Mode and ask you to enter the 48-digit Recovery Key. This can be caused by several things, and a complete list can be viewed here , but today I am going to go over the most common issues.

 

 

Scenario # 1:      When you are using a Laptop or Desktop computer and do not have the BIOS Boot order with the OS HDD listed as the first boot device. The reason for this is the boot device makes up part of the system measurement used by Bitlocker and this must remain consistent to validate the system status and unlock BitLocker. (I.e. if you have the DVD-ROM drive listed first and had a bootable media inserted, this can cause the system measurement to change.)  Some firmware will also treat PXE network boot as a change in boot order – even when the user does not choose network boot. Changing from a wireless to wired network can trigger a recovery event.  Putting the HDD first in boot order generally eliminates these issues.

 

 

                Resolution:       

 

 

o   Suspend Bitlocker drive encryption by typing "manage-bde -protectors -disable c:” from an elevated command prompt.

 

 

o   Go into the BIOS and change the Boot Order so the OS HDD is first in the list.

 

 

o    By default from most hardware vendors, the HDD is not the first boot device.

 

o    If you have a laptop with a docking station, make sure that it is plugged into the docking station, in order to make sure that the external devices presented by the docking station are present in BIOS.

 

o    Boot into the Operating System and run "manage-bde -protectors -enable c:"

 

Scenario # 2:      When you are either deploying a new system or encrypting the drive for the first time. You might pause the Bitlocker encryption process, in order to speed up the performance or while performing other tasks, so that encryption can run later or you need more than the 6 GB worth of free space to continue deploying the system.  When you run "manage-bde -pause c:" you are pausing the drive encryption of C:, but not the Bitlocker protectors on the system.

 

 

You might say to yourself, if I run "manage-bde -status c:" I see that the protection is off on that drive. The reason you see this is that the protection for the drive is not yet completed, but the clear text key still exists.

 

 

Volume C: []
[OS Volume]
    Size:                 37.17 GB
    BitLocker Version:    Windows 7
    Conversion Status:    Encryption Paused
    Percentage Encrypted: 3%
    Encryption Method:    AES 128 with Diffuser
    Protection Status:    Protection Off <--- Where it shows "Protection Off"
    Lock Status:          Unlocked
    Identification Field: None

 

 

                Resolution:       

 

 

o   When you need to pause the encryption, whether for performance or drive space reasons, you need to run "manage-bde -pause c:"

 

 

o   After encryption has been paused, you will want to run "manage-bde -protectors -disable c:"

 

 

o   Once you have completed your tasks and wish to start the encryption process again you can run "manage-bde -resume c:"

 

 

o   Once the encryption is complete, or if you have completed your tasks, you will then want to run "manage-bde -protectors -enable c:"

 

 

Scenario # 3:      The BIOS / TPM firmware are out of date on the systems.

 

 

Resolution:

 

o   Suspend Bitlocker drive encryption “manage-bde –protectors –disable c:

 

 

o   Update the BIOS on the system

 

 

o    If there is a TPM Firmware update, please follow the vendor installation instructions.

 

o   Reboot the Operating System and run “manage-bde –protectors –enable c:

 

 

Scenario # 4:      When you are installing additional language packs onto the system, and selecting the option to apply the language settings to all users and system accounts. This causes a locale change in the BCD (Boot Configuration Database), which Bitlocker with TPM interprets as a boot attack.

 

 

Resolution:

 

 

o   Suspend Bitlocker drive encryption “manage-bde –protectors –disable c:

 

 

o   Add language packs to the system and make any language settings.

 

 

o   Resume Bitlocker drive encryption “manage-bde –protectors –enable c:

 

 

Scenario # 5:      When you create or modify any of the partitions that reside on the O/S drive.

 

 

Resolution:

 

 

o   Suspend Bitlocker drive encryption “manage-bde –protectors –disable c:

 

 

o   Shrink, expand, or create any partitions on the drive.

 

 

o   Resume Bitlocker drive encryption “manage-bde –protectors –enable c:

Scenario # 6:      The TPM chip has been turned off in BIOS.

 

 

Resolution:

 

 

o   Go into BIOS and make sure the the TPM Security is enabled and on

 

 

Tanner Slayton
Senior Support Escalation Engineer
Microsoft Enterprise Platforms Support