How can I authenticate or unlock my removable data drive?
Removable data drives can be unlocked using a password or a smart card. An SID protector can also be configured to unlock a drive by using user domain credentials. After encryption has started, the drive can also be automatically unlocked on a specific computer for a specific user account. System administrators can configure which options are available for users including password complexity and minimum length requirements. To unlock by using a SID protector, use manage-bde.exe
:
Manage-bde.exe -protectors -add e: -sid <i>domain\username</i></code>
What is the difference between a recovery password, recovery key, PIN, enhanced PIN, and startup key?
For tables that list and describe elements such as a recovery password, recovery key, and PIN, see BitLocker key protectors and BitLocker authentication methods.
How can the recovery password and recovery key be stored?
The recovery password and recovery key for an operating system drive or a fixed data drive can be saved to a folder, saved to one or more USB devices, saved to a Microsoft Account, or printed.
For removable data drives, the recovery password and recovery key can be saved to a folder, saved to a Microsoft Account, or printed. By default, a recovery key for a removable drive can't be stored on a removable drive.
A domain administrator can also configure Group Policy to automatically generate recovery passwords and store them in Active Directory Domain Services (AD DS) for any BitLocker-protected drive.
Is it possible to add an additional method of authentication without decrypting the drive if I only have the TPM authentication method enabled?
The Manage-bde.exe
command-line tool can be used to replace TPM-only authentication mode with a multifactor authentication mode. For example, if BitLocker is enabled with TPM authentication only and PIN authentication needs to be added, use the following commands from an elevated command prompt, replacing 4-20 digit numeric PIN with the desired numeric PIN:
manage-bde.exe -protectors -delete %systemdrive% -type tpmmanage-bde.exe -protectors -add %systemdrive% -tpmandpin <4-20 digit numeric PIN>
When should an additional method of authentication be considered?
New hardware that meets Windows Hardware Compatibility Program requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book don't have external DMA ports to attack.For older hardware, where a PIN may be needed, it's recommended to enable enhanced PINs that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on the risk tolerance and the hardware anti-hammering capabilities available to the TPMs on the computers.
If I lose my recovery information, will the BitLocker-protected data be unrecoverable?
BitLocker is designed to make the encrypted drive unrecoverable without the required authentication. When in recovery mode, the user needs the recovery password or recovery key to unlock the encrypted drive.
Important
Store the recovery information in AD DS, along with in a Microsoft Account, or another safe location.
Can the USB flash drive that is used as the startup key also be used to store the recovery key?
While using a USB flash drive as both the startup key and for storage of the recovery key is technically possible, it isn't a best practice to use one USB flash drive to store both keys. If the USB flash drive that contains the startup key is lost or stolen, the recovery key will also be lost. In addition, inserting this key would cause the computer to automatically boot from the recovery key even if TPM-measured files have changed, which circumvents the TPM's system integrity check.
Can I save the startup key on multiple USB flash drives?
Yes, computer's startup key can be saved on multiple USB flash drives. Right-clicking a BitLocker-protected drive and selecting Manage BitLocker will provide the options to save the recovery keys on additional USB flash drives as needed.
Can I save multiple (different) startup keys on the same USB flash drive?
Yes, BitLocker startup keys for different computers can be saved on the same USB flash drive.
Can I generate multiple (different) startup keys for the same computer?
Generating different startup keys for the same computer can be done through scripting. However, for computers that have a TPM, creating different startup keys prevents BitLocker from using the TPM's system integrity check.
Can I generate multiple PIN combinations?
Generating multiple PIN combinations can't be done.
What encryption keys are used in BitLocker? How do they work together?
Raw data is encrypted with the full volume encryption key, which is then encrypted with the volume master key. The volume master key is in turn encrypted by one of several possible methods depending on the authentication (that is, key protectors or TPM) and recovery scenarios.
Where are the encryption keys stored?
The full volume encryption key is encrypted by the volume master key and stored in the encrypted drive. The volume master key is encrypted by the appropriate key protector and stored in the encrypted drive. If BitLocker has been suspended, the clear key that is used to encrypt the volume master key is also stored in the encrypted drive, along with the encrypted volume master key.
This storage process ensures that the volume master key is never stored unencrypted and is protected unless BitLocker is disabled. The keys are also saved to two additional locations on the drive for redundancy. The keys can be read and processed by the boot manager.
Why do I have to use the function keys to enter the PIN or the 48-character recovery password?
The F1 through F10 keys are universally mapped scan codes available in the pre-boot environment on all computers and in all languages. The numeric keys 0 through 9 aren't usable in the pre-boot environment on all keyboards.
When using an enhanced PIN, users should run the optional system check during the BitLocker setup process to ensure that the PIN can be entered correctly in the pre-boot environment.
How does BitLocker help prevent an attacker from discovering the PIN that unlocks my operating system drive?
It's possible that a personal identification number (PIN) can be discovered by an attacker performing a brute force attack. A brute force attack occurs when an attacker uses an automated tool to try different PIN combinations until the correct one is discovered. For BitLocker-protected computers, this type of attack, also known as a dictionary attack, requires that the attacker has physical access to the computer.
The TPM has the built-in ability to detect and react to these types of attacks. Because different manufacturers' TPMs may support different PIN and attack mitigations, contact the TPM's manufacturer to determine how the computer's TPM mitigates PIN brute force attacks.After the TPM's manufacturer has been determined, contact the manufacturer to gather the TPM's vendor-specific information. Most manufacturers use the PIN authentication failure count to exponentially increase lockout time to the PIN interface. However, each manufacturer has different policies regarding when and how the failure counter is decreased or reset.
How can I determine the manufacturer of my TPM?
The TPM manufacturer can be determined in Windows Defender Security Center > Device Security > Security processor details.
How can I evaluate a TPM's dictionary attack mitigation mechanism?
The following questions can assist when asking a TPM manufacturer about the design of a dictionary attack mitigation mechanism:
- How many failed authorization attempts can occur before lockout?
- What is the algorithm for determining the duration of a lockout based on the number of failed attempts and any other relevant parameters?
- What actions can cause the failure count and lockout duration to be decreased or reset?
Can PIN length and complexity be managed with Group Policy?
Yes and No. The minimum personal identification number (PIN) length can be configured by using the Configure minimum PIN length for startup Group Policy setting and allow the use of alphanumeric PINs by enabling the Allow enhanced PINs for startup Group Policy setting. However, PIN complexity can't be required via Group Policy.
For more info, see BitLocker Group Policy settings.
FAQs
How do I get my computer to stop asking for a BitLocker recovery key? ›
- Press the Windows key on your keyboard and open "Control Panel" by searching for it.
- Now select "Device Encryption" under "Control Panel" to open "Bitlocker" settings.
- Now, click on the "turn off auto-unlock" option.
Some changes to hardware, firmware, or software may have conditions that BitLocker cannot distinguish from a possible attack. In these cases, Windows will ask for your BitLocker recovery key. This is to be sure that it is really an authorized user of the device who is trying to unlock it.
Why is Windows asking for my BitLocker key? ›Windows will require a BitLocker recovery key when it detects a possible unauthorized attempt to access the data. This extra step is a security precaution intended to keep your data safe and secure.
How to unlock BitLocker in Windows 10 without password and recovery key? ›Part 2. How to Unlock BitLocker Without Password and Recovery Key? If you lost not only the BitLocker password, but also the Recovery Key, there will be no way to unlock the BitLocker drive without losing all the data. You need to format the encrypted drives to remove the BitLocker.
How do I disable BitLocker when Windows won't boot? ›- Right click Bitlockered Drive (c:) in file explorer.
- Select Manage Bitlocker (this opens BL Drive Encryption)
- Click Suspend.
- Click Yes.
- Reboot.
- Repeat steps 1 & 2.
- Click Resume Protection.
- Reboot.
You are locked out
If you own the computer that has its system drive encrypted with BitLocker Device Encryption and manage to break the system's boot chain of trust, you will be unable to boot.
- Step 1: Press Win + X, K to open Disk Management.
- Step 2: Right-click on the drive or partition and click on "Format".
- Step 4: Click OK to format the BitLocker encrypted drive.
What is a BitLocker recovery key? According to the official Microsoft definition, your BitLocker recovery key is a unique 48-digit numerical password that can be used to unlock your system if BitLocker is otherwise unable to confirm for certain that the attempt to access the system drive is authorized.
How do I start my laptop without BitLocker? ›Remove BitLocker Encryption from System Drive
Step 1: Turn off your computer, remove external peripherals if connected, and then insert the USB drive. Step 2: Next, turn ON your Laptop and press the relevant key to reach the BIOS menu such as F8 or F12. Such a key is usually shown on the screen of the Laptop.
- Restart your computer and press the Esc key in the BitLocker logon screen.
- In the BitLocker recovery screen, find the Recovery key ID. ...
- Contact your administrator and give them the Recovery key ID. ...
- In the BitLocker recovery screen, enter the recovery key.
Can you bypass a BitLocker key? ›
Can BitLocker be bypassed? The answer is “Yes”. Usually, the BitLocker drive encryption doesn't ask for the recovery key on a normal startup.
How to disable BitLocker from BIOS? ›- Restart your computer.
- When the manufacturer's logo appears, press “F1,” “F2,” and “F4” (or whichever BIOS hotkeys your computer uses).
- From the menu, open “Security.”
- Next, hit “BitLocker Drive Encryption.”
- Click “Suspend Protection.” BitLocker will now be disabled.
If this value is not configured, a default value of 480 minutes (8 hours) is used. The Unlock Period Depends on the Group Policy named Standard User Lockdown Duration set by your Organization. If this value is not configured, a default value of 480 minutes (8 hours) is used.
Does BitLocker go away on its own? ›In short, you get one new attempt every 2 hours, so the message should go away at that point. (If it doesn't, try keeping the machine powered on, although it doesn't necessarily have to sit at the BitLocker PIN screen specifically.)
Can a virus cause BitLocker? ›BitLocker, developed by Microsoft Windows, is a drive encryption feature that's used to address the threats of data theft or exposure. However, since 2015, this feature is abused by hackers to make it a new kind of virus to steal your data and extort money, known as BitLocker Virus.
How do I remove BitLocker from Windows 10? ›Press Windows Start button. Type bitlocker. Click Manage BitLocker to enter the BitLocker Drive Encryption menu. Select Turn off BitLocker to proceed with decryption.
Is the BitLocker recovery key all numbers? ›A valid Bitlocker recovery key consists of eight exactly 6-digit decimal numbers separated by seven hyphens ( - ) or space ( ) signs.
How do I force BitLocker to start? ›Go to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives. Double-click the Require additional authentication at the startup option. Select Enabled.
How do I manually start BitLocker? ›Or, select Start > Settings > Privacy & security > Device encryption > BitLocker drive encryption. Note: You'll only see this option if BitLocker is available for your device. It isn't available on Windows 11 Home edition. Select Turn on BitLocker and then follow the instructions.
Does BitLocker require a password on boot? ›Pre-boot authentication. Pre-boot authentication with BitLocker is a policy setting that requires the use of either user input, such as a PIN, a startup key, or both to authenticate prior to making the contents of the system drive accessible.
What is the difference between BitLocker PIN and password? ›
About Your BitLocker PIN and Passwords
The password is used to unlock drives on your computer that do not contain the operating system. BitLocker will ask for your password after the PIN is requested during startup. Each BitLocker protected hard disk on your computer has its own unique password.
The recovery key is a 28-character code that you can enter that provides access to resetting a password. This does increase the security of your Apple ID account, but there's one caveat. If you forget the key and don't have access to your other Apple devices, Apple cannot help you regain access to your account or data.
What happens if you lost your recovery key? ›As long as you remember your Apple ID password and still have access to one of your trusted devices, you can sign in and create a new Recovery Key. Go to your Apple ID account page. Sign in with your password and trusted device. In the Security section, click Edit > Replace Lost Key.
How do I remove BitLocker password from startup? ›Step 1: Press Windows + X, select Command Prompt (Admin) to run command prompt as an administrator. Step 2: Type the following command as the screenshot shows: manage-bde -unlock F: -RecoveryPassword YOUR-BITLOCKER-RECOVERY-KEY . Step 3: Launch manage-bde -off f: to remove BitLocker drive encryption.
How to disable BitLocker without TPM? ›Open Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives. Edit Require additional authentication at startup policy. Set the policy to Enabled and make sure Allow BitLocker without a compatible TPM is checked.
How to decrypt BitLocker Windows 10 command line? ›- Type in command line: Manage-bde -unlock E: -password.
- And then press Enter to execute it.
Is there a way to bypass BitLocker recovery key? There is no way to bypass the BitLocker recovery key when you want to unlock a BitLocker encrypted drive without a password. However, you can reformat the drive to remove the encryption, which needs no password or recovery key.
How to disable BitLocker recovery key in BIOS? ›- Restart your computer.
- When the manufacturer's logo appears, press “F1,” “F2,” and “F4” (or whichever BIOS hotkeys your computer uses).
- From the menu, open “Security.”
- Next, hit “BitLocker Drive Encryption.”
- Click “Suspend Protection.” BitLocker will now be disabled.
Prevent BitLocker popup. How to prevent the popup message from popping up when connecting a device that is encrypted by BitLocker? Go to: Settings > System > Notifications & actions > Scroll down to BitLocker Drive Encryption > and set it to Off.
How to disable BitLocker from command prompt? ›- Open Windows Powershell in Administrator mode.
- Disable-BitLocker -MountPoint "C:"
- Verify the decryption process by using below method. Execute the command: PS C:\> Get-BitlockerVolume -MountPoint "C:" ...
- Restart your computer, before proceeding with the image creation process.
What triggers BitLocker recovery key? ›
Bitlocker recovery mode can be triggered by a number of situations, including: A malicious attempt by a person or software to change the startup environment. Rootkits are one example. Moving the BitLocker-protected drive into a new computer.
Is there any software to unlock BitLocker? ›DiskGenius supports to unlock BitLocker drives with password, recovery key or BEK file, and it can unlock BitLocker encrypted drive on computers whose system does not support BitLocker, such as Windows 10/8/7 Home edition, Windows XP and WinPE.
How do I find my BitLocker key without Microsoft account? ›You may be able to access it directly or you may need to contact a system administrator to access your recovery key. Held by your system administrator: If your device is connected to a domain (usually work or school device), ask a system administrator for your recovery key.
How to unlock BitLocker using cmd? ›- Type in command line: Manage-bde -unlock E: -password.
- And then press Enter to execute it.
Unlock BitLocker Drives from Command Prompt
Step 1: Run Command Prompt as an admin. Step 2: Execute the command: manage-bde -unlock (drive letter): -password. The drive letter here is the one of the BitLocker drive you want to unlock. Step 3: Type the BitLocker password and press Enter button to confirm your password.
- Step 1: Press Win + X, K to open Disk Management.
- Step 2: Right-click on the drive or partition and click on "Format".
- Step 4: Click OK to format the BitLocker encrypted drive.