Configuring and enabling BitLocker using Microsoft Intune & store keys in Microsoft Azure :

Configuring and enabling BitLocker using Microsoft Intune & store keys in Microsoft Azure :

BitLocker is a disk encryption feature that protects data stored on Windows 10/11 devices against theft or loss, so that it can only be accessed by authorized persons. BitLocker uses a secure platform module (TPM) to store encryption keys and protect them against attack. BitLocker can also use other protection methods, such as a password, USB key or PIN.

Microsoft Intune is a device and application management service that enables organizations to control and secure corporate data on mobile devices and computers. Microsoft Intune and BitLocker can work together to ensure optimal data and device protection. For example, Intune can configure and manage BitLocker settings, save recovery keys in Azure AD, and apply compliance policies based on encryption status .

In this article, I'll show you how to enable and configure BitLocker using Intune and export the BitLocker key to Microsoft Azure. We will use Microsoft Intune to configure BitLocker drive encryption on devices running Windows 10 or 11. The manual explains how to deploy BitLocker using Intune for Windows devices.


I - BitLocker Intune prerequisites:

BitLocker for Intune is available on devices running Windows 10/11. Enabling BitLocker using Intune requires the following prerequisites to be in place:

  1. You will need a valid Microsoft Endpoint Manager (Intune) license.
  2. Devices must be connected to Azure AD or Hybrid Azure AD.
  3. Devices must not be encrypted with third-party disk encryption tools such as McAfee Disk Encryption. If devices are already encrypted with other solutions, you will first need to decrypt them completely before deploying BitLocker using Intune.
  4. End devices must be equipped with a TPM chip version 1.2 or higher (TPM 2.0 strongly recommended).
  5. BIOS must be set to UEFI.
  6. To manage BitLocker in Intune, your account must have the applicable role-based access control (RBAC) permissions.


II - BitLocker configuration and deployment methods with Intune :

Intune lets you configure and deploy BitLocker policy using two methods:

  1. Create a device configuration profile for BitLocker and deploy it to devices.
  2. Create an endpoint security policy for BitLocker, configure it and deploy it to devices.

You can use any of the above procedures to create the type of policy you prefer. The recommended approach is to create an endpoint security policy and configure BitLocker using Intune for Windows devices.


III - Settings required to silently enable BitLocker using Intune :

Depending on the type of policy you're using, you can silently enable BitLocker using Intune:

1 - Endpoint security disk encryption policy: Configure the following settings in the BitLocker profile:

  • Hide prompt about third-party encryption = Yes.
  • Allow standard users to enable encryption during Autopilot = Yes.
  • Require Key File Creation = Blocked or Allowed.

2 - BitLocker Device configuration policy: Configure the following settings in the endpoint protection template or in a custom settings profile :

  • Warning for other disk encryption = Block.
  • Allow standard users to enable encryption during Azure AD Join = Allow.


IV - Enabling and configuring Bitlocker with Intune :

We'll now look at how to use Intune to activate, configure and deploy BitLocker. This will enable BitLocker drive encryption to be configured on devices running Windows 10/11.

The high-level steps for enabling and configuring BitLocker using Intune are as follows:

  • Enable BitLocker with Intune
  • Create a configuration profile for BitLocker in Intune
  • Configure BitLocker policy with Intune
  • Monitor BitLocker encryption status


V - Create a BitLocker policy in Intune :

In this step, we'll create a new security policy for BitLocker in Intune by following these steps:

  1. Log into the Microsoft Endpoint Manager administration center (Intune Admin Center).
  2. Select Endpoint security > Disk encryption > Create Policy.
  3. Set the following options:
  4. Platform : Windows 10/11
  5. Profile : BitLocker

Enter a name for your Policy :

in the second "Configuration Settings" window is divided into two sections:

1 - BitLocker section:

  • Require Device Encryption

Enabled

Allows the administrator to require encryption to be enabled using BitLocker device encryption.

  • Allow Warning For Other Disk Encryption

Disabled

Allows the administrator to disable all user interfaces (notification for encryption and warning prompt for encryption of other disks) and silently enable encryption on user machines.

  • Allow Standard User Encryption

Enabled

Enables the administrator to apply the "RequireDeviceEncryption" policy in scenarios where the policy is applied when the logged-in user is not an administrator or standard user.

  • Configure Recovery Password Rotation

Refresh on for Azure AD-joined devices

Allows the administrator to configure digital recovery password rotation when using the operating system and fixed drives on devices connected to the AAD and Hybrid domains.

2 - Administrative templates section :

In this section, we'll apply the following settings:

  • Select disk encryption method and encryption strength (Windows 10 [Version 1511] and later): Enabled
  • Select encryption method for removable data drives : AES-CBC 128-bit (default)
  • Select encryption method for operating system drives : XTS-AES 128-bit (default)
  • Select encryption method for fixed data drives : XTS-AES 128 bits (default)

In this section, we'll apply the following settings:

  • Enforce drive encryption type on operating system drives : Enabled

This policy parameter lets you configure the type of encryption used by BitLocker Drive Encryption. This setting is applied when BitLocker is enabled.

  • Select the encryption type: (Device) : Full encryption

choose "Full encryption" instead of "Used Space".

  • Require additional authentication at startup : Enabled

This policy setting allows you to configure whether BitLocker requires additional authentication at each computer startup, and whether you use BitLocker with or without Trusted Platform Module (TPM). If you wish to use BitLocker on a computer without TPM, check the box "Allow BitLocker without compatible TPM".

  • Configure TPM startup key and PIN : Allow startup key and PIN with TPM
  • Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive) : False
  • Configure TPM startup : Allow TPM
  • Configure TPM startup PIN : Allow startup PIN with TPM
  • Configure TPM startup key : Allow startup key with TPM

The next step is to create a Tag , I leave it as default

The next step is to assign a group of machines on which to apply encryption. In my case, I've chosen all devices.

You can add exclusions in the "Excluded Groups" section below.

The last step is to validate and create the encryption rule:

VI - Monitoring BitLocker from Intune:

After deploying BitLocker using Intune, the next step is to monitor the status of BitLocker encryption on devices. You can do this from the Intune Administration Center. In addition, there is a Microsoft Intune Encryption Report that allows you to view details of a device's encryption status and find options for managing the device's recovery keys.

The screenshot below shows that BitLocker profile assignment was successful on almost all the devices we targeted. Note that this is the profile assignment status, not the disk encryption status.

VII - BitLocker key recovery and use :

1 - End-user recovery:

After a machine is encrypted, the encryption key will be stored on the office 365 account of the user connected to the machine (depending on the configuration we've made).

If the laptop is locked after a motherboard change, for example, you can no longer access the data on your disk. Whether Windows, Linux or any other operating system, BitLocker does not allow any attempt to access the disk unless you have your BitLocker recovery key.

To unlock your computer, follow these steps:

  • Click on "Press Esc for BitLocker Recovery".

  • Note the 32-character recovery key identifier.

Go to another PC and connect to https://myaccount.microsoft.com/device-list

  • Click on : View Bitlocker Keys

  • Find the key ID that corresponds to the recovery key ID from step 2 and that is displayed on the locked device.

Click on "Show Recovery Key".

  • Copy the 48-digit Bitlocker recovery key

Return to the locked device, enter the Bitlocker recovery key copied in step 7 and press Enter.

  • Log in to your device with the original password

2 - Recovery as a Support Technician:

As a System Admin or Support Technician you can also recover the BitLocker key from several locations and ways, I'll just mention the way with Microsoft azure :

  1. Open the Azure AD directory (Entra ID) in the Azure portal
  2. Go to the All users object and search for the user account associated with the device.
  3. Click on the user object name to display the profile properties.
  4. Go to the "Devices" object as shown in the image below.
  5. Select the appropriate device from the list.
  6. If the device is registered with BitLocker encryption, the BitLocker key ID and recovery key will be visible.
  7. Click on the Copy to clipboard button and paste the data to display the complete string.



Thank you


Aymen EL JAZIRI

System Administrator

Jeffrey Brinston, M.S.

Solutions-focused IT Professional: Specializing in system administration, enterprise mobility and security to ensure anticipated outcomes within an organization.

1 个月

Thanks! I’ve noticed that some devices have multiple BitLocker keys in Intune. Is there a way to remove the older ones?

回复
Anil D.

Azure Cloud Engineer

6 个月

Aymen E. We have successfully implemented the BitLocker policy via Intune, and the policy has been applied to the devices. During the restart process, BitLocker prompts for the recovery key or PIN, and after entering it, the device allows login as expected. However, we observed that once logged in, the C: drive appears with the BitLocker icon and is unlocked automatically, without asking for any further PIN or password authentication to access the drive. Please confirm if this is the default behavior of the BitLocker policy, or if the drive should also prompt for a PIN to unlock it. Your input would be greatly appreciated.

回复
chunkycesaro Cesaro

Information Technology Help Desk at N/A

8 个月

Thank you for this. How about if a computer doesn't have TPM. Are we not able to deploy Bitlocker?

回复
Remi P.

Passionate IT+Security+AI | Technical Lead at AGS IT-partner

10 个月

Hi Aymen E. - How would you like to configure BitLocker for customers with Microsoft 365 Business Premium licenses and Windows 11 Pro/Business installed on their PCs? As I recall, BitLocker management requires a Windows Enterprise E3/E5 or Education A3/A5 license. However, BitLocker can also be configured on computers running Windows 11 Pro, provided the user has a Windows E3/E5 or A3/A5 license.

回复
Sathish Kumar R

System Engineering Advisor(SCCM)

10 个月

How to set the custom Bit locker pin on this policy

回复

要查看或添加评论,请登录

Aymen E.的更多文章

社区洞察

其他会员也浏览了