Configuring and enabling BitLocker using Microsoft Intune & store keys in Microsoft Azure :
BitLocker is a disk encryption feature that protects data stored on Windows 10/11 devices against theft or loss, so that it can only be accessed by authorized persons. BitLocker uses a secure platform module (TPM) to store encryption keys and protect them against attack. BitLocker can also use other protection methods, such as a password, USB key or PIN.
Microsoft Intune is a device and application management service that enables organizations to control and secure corporate data on mobile devices and computers. Microsoft Intune and BitLocker can work together to ensure optimal data and device protection. For example, Intune can configure and manage BitLocker settings, save recovery keys in Azure AD, and apply compliance policies based on encryption status .
In this article, I'll show you how to enable and configure BitLocker using Intune and export the BitLocker key to Microsoft Azure. We will use Microsoft Intune to configure BitLocker drive encryption on devices running Windows 10 or 11. The manual explains how to deploy BitLocker using Intune for Windows devices.
I - BitLocker Intune prerequisites:
BitLocker for Intune is available on devices running Windows 10/11. Enabling BitLocker using Intune requires the following prerequisites to be in place:
You will need a valid Microsoft Endpoint Manager (Intune) license.
Devices must be connected to Azure AD or Hybrid Azure AD.
Devices must not be encrypted with third-party disk encryption tools such as McAfee Disk Encryption. If devices are already encrypted with other solutions, you will first need to decrypt them completely before deploying BitLocker using Intune.
End devices must be equipped with a TPM chip version 1.2 or higher (TPM 2.0 strongly recommended).
BIOS must be set to UEFI.
To manage BitLocker in Intune, your account must have the applicable role-based access control (RBAC) permissions.
II - BitLocker configuration and deployment methods with Intune :
Intune lets you configure and deploy BitLocker policy using two methods:
Create a device configuration profile for BitLocker and deploy it to devices.
Create an endpoint security policy for BitLocker, configure it and deploy it to devices.
You can use any of the above procedures to create the type of policy you prefer. The recommended approach is to create an endpoint security policy and configure BitLocker using Intune for Windows devices.
III - Settings required to silently enable BitLocker using Intune :
Depending on the type of policy you're using, you can silently enable BitLocker using Intune:
1 - Endpoint security disk encryption policy: Configure the following settings in the BitLocker profile:
Hide prompt about third-party encryption = Yes.
Allow standard users to enable encryption during Autopilot = Yes.
Require Key File Creation = Blocked or Allowed.
2 - BitLocker Device configuration policy: Configure the following settings in the endpoint protection template or in a custom settings profile :
Warning for other disk encryption = Block.
Allow standard users to enable encryption during Azure AD Join = Allow.
IV - Enabling and configuring Bitlocker with Intune :
We'll now look at how to use Intune to activate, configure and deploy BitLocker. This will enable BitLocker drive encryption to be configured on devices running Windows 10/11.
The high-level steps for enabling and configuring BitLocker using Intune are as follows:
Enable BitLocker with Intune
Create a configuration profile for BitLocker in Intune
Configure BitLocker policy with Intune
Monitor BitLocker encryption status
V - Create a BitLocker policy in Intune :
In this step, we'll create a new security policy for BitLocker in Intune by following these steps:
Log into the Microsoft Endpoint Manager administration center (Intune Admin Center).
Select Endpoint security > Disk encryption > Create Policy.
Set the following options:
Platform : Windows 10/11
Profile : BitLocker
Enter a name for your Policy :
in the second "Configuration Settings" window is divided into two sections:
1 - BitLocker section:
Require Device Encryption
Enabled
Allows the administrator to require encryption to be enabled using BitLocker device encryption.
Allow Warning For Other Disk Encryption
Disabled
Allows the administrator to disable all user interfaces (notification for encryption and warning prompt for encryption of other disks) and silently enable encryption on user machines.
Allow Standard User Encryption
Enabled
Enables the administrator to apply the "RequireDeviceEncryption" policy in scenarios where the policy is applied when the logged-in user is not an administrator or standard user.
Configure Recovery Password Rotation
Refresh on for Azure AD-joined devices
Allows the administrator to configure digital recovery password rotation when using the operating system and fixed drives on devices connected to the AAD and Hybrid domains.
2 - Administrative templates section :
In this section, we'll apply the following settings:
Select disk encryption method and encryption strength (Windows 10 [Version 1511] and later): Enabled
Select encryption method for removable data drives : AES-CBC 128-bit (default)
Select encryption method for operating system drives : XTS-AES 128-bit (default)
Select encryption method for fixed data drives : XTS-AES 128 bits (default)
In this section, we'll apply the following settings:
Enforce drive encryption type on operating system drives : Enabled
This policy parameter lets you configure the type of encryption used by BitLocker Drive Encryption. This setting is applied when BitLocker is enabled.
Select the encryption type: (Device) : Full encryption
choose "Full encryption" instead of "Used Space".
Require additional authentication at startup : Enabled
This policy setting allows you to configure whether BitLocker requires additional authentication at each computer startup, and whether you use BitLocker with or without Trusted Platform Module (TPM). If you wish to use BitLocker on a computer without TPM, check the box "Allow BitLocker without compatible TPM".
Configure TPM startup key and PIN : Allow startup key and PIN with TPM
Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive) : False
Configure TPM startup : Allow TPM
Configure TPM startup PIN : Allow startup PIN with TPM
Configure TPM startup key : Allow startup key with TPM
The next step is to create a Tag , I leave it as default
The next step is to assign a group of machines on which to apply encryption. In my case, I've chosen all devices.
You can add exclusions in the "Excluded Groups" section below.
The last step is to validate and create the encryption rule:
VI - Monitoring BitLocker from Intune:
After deploying BitLocker using Intune, the next step is to monitor the status of BitLocker encryption on devices. You can do this from the Intune Administration Center. In addition, there is a Microsoft Intune Encryption Report that allows you to view details of a device's encryption status and find options for managing the device's recovery keys.
The screenshot below shows that BitLocker profile assignment was successful on almost all the devices we targeted. Note that this is the profile assignment status, not the disk encryption status.
VII - BitLocker key recovery and use :
1 - End-user recovery:
After a machine is encrypted, the encryption key will be stored on the office 365 account of the user connected to the machine (depending on the configuration we've made).
If the laptop is locked after a motherboard change, for example, you can no longer access the data on your disk. Whether Windows, Linux or any other operating system, BitLocker does not allow any attempt to access the disk unless you have your BitLocker recovery key.
To unlock your computer, follow these steps:
Click on "Press Esc for BitLocker Recovery".
Note the 32-character recovery key identifier.
Go to another PC and connect to https://myaccount.microsoft.com/device-list
Click on : View Bitlocker Keys
Find the key ID that corresponds to the recovery key ID from step 2 and that is displayed on the locked device.
Click on "Show Recovery Key".
Copy the 48-digit Bitlocker recovery key
Return to the locked device, enter the Bitlocker recovery key copied in step 7 and press Enter.
Log in to your device with the original password
2 - Recovery as a Support Technician:
As a System Admin or Support Technician you can also recover the BitLocker key from several locations and ways, I'll just mention the way with Microsoft azure :
Open the Azure AD directory (Entra ID) in the Azure portal
Go to the All users object and search for the user account associated with the device.
Click on the user object name to display the profile properties.
Go to the "Devices" object as shown in the image below.
Select the appropriate device from the list.
If the device is registered with BitLocker encryption, the BitLocker key ID and recovery key will be visible.
Click on the Copy to clipboard button and paste the data to display the complete string.
Thank you
Aymen EL JAZIRI
System Administrator
Solutions-focused IT Professional: Specializing in system administration, enterprise mobility and security to ensure anticipated outcomes within an organization.
6moThanks! I’ve noticed that some devices have multiple BitLocker keys in Intune. Is there a way to remove the older ones?
Azure Cloud Engineer
11moAymen E. We have successfully implemented the BitLocker policy via Intune, and the policy has been applied to the devices. During the restart process, BitLocker prompts for the recovery key or PIN, and after entering it, the device allows login as expected. However, we observed that once logged in, the C: drive appears with the BitLocker icon and is unlocked automatically, without asking for any further PIN or password authentication to access the drive. Please confirm if this is the default behavior of the BitLocker policy, or if the drive should also prompt for a PIN to unlock it. Your input would be greatly appreciated.
Information Technology Help Desk at N/A
1yThank you for this. How about if a computer doesn't have TPM. Are we not able to deploy Bitlocker?
Passionate IT+Security+AI | Technical Lead at AGS IT-partner
1yHi Aymen E. - How would you like to configure BitLocker for customers with Microsoft 365 Business Premium licenses and Windows 11 Pro/Business installed on their PCs? As I recall, BitLocker management requires a Windows Enterprise E3/E5 or Education A3/A5 license. However, BitLocker can also be configured on computers running Windows 11 Pro, provided the user has a Windows E3/E5 or A3/A5 license.
SCCM Infrastructure Architect || Powershell Automation || Intune || MS-Graph
1yHow to set the custom Bit locker pin on this policy