KEMBAR78
Configure and Enable BitLocker On Windows Server - 4sysops | PDF | Group Policy | Computer Engineering
0% found this document useful (0 votes)
27 views44 pages

Configure and Enable BitLocker On Windows Server - 4sysops

The document provides a comprehensive guide on configuring and enabling BitLocker on Windows Server, highlighting its importance for data protection in server environments. It details the installation process, requirements, and steps for both GUI and PowerShell methods for enabling BitLocker on operating system and fixed data drives. Additionally, it emphasizes the necessity of backing up BitLocker recovery information to Active Directory for recovery purposes.

Uploaded by

konguepnk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views44 pages

Configure and Enable BitLocker On Windows Server - 4sysops

The document provides a comprehensive guide on configuring and enabling BitLocker on Windows Server, highlighting its importance for data protection in server environments. It details the installation process, requirements, and steps for both GUI and PowerShell methods for enabling BitLocker on operating system and fixed data drives. Additionally, it emphasizes the necessity of backing up BitLocker recovery information to Active Directory for recovery purposes.

Uploaded by

konguepnk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Home (https://4sysops.com) / Blog (https://4sysops.

com/archives/) / Configure and enable BitLocker on Windows Server

4sysops - The online community for sys and AI ops

Powe
Get-
Proce
Mana
proce
Kyle Beckman
Thu, Apr 30 2015 (https://4sysops.com/archives/configure-and-enabling-
(https://
bitlocker-on-windows-server/)
Subscribe to Newsletter
twitter.com/4sysops/)
encryption, security, bitlocker 11

BitLocker isn’t just a feature for Windows desk-


(https://
top, laptop, and tablet computers. It’s also avail-
www.facebook.com/4sysops)
PowerShell Security
able for Windows Server as an installable feature.
It is a great way to protect servers if you deal with
Free eBook remote locations or hard-to-secure server closets,
Limit language or if you just want to protect the drives of racked (https://
Secure connection servers. In this article, I’ll cover installing www.linkedin.com/
Track abuse BitLocker and configuring it on Windows Server company/4sysops/)
2012 R2.
Download now!

(https://4sysops.com/
Powe
feed/) Get-
Proce
Mana
proce
Windows Server 2025

Free eBook

Installation
New Features
Administration

Download now!

Read 4sysops without ads for free (/join)

Powe
Get-
Contents CLOSE Proce
Mana
proce
01 Requirements

02 Installing BitLocker

Using the GUI


Using PowerShell
Unspecified error

03 Configuring backup of BitLocker recovery infor-


mation

04 Enabling BitLocker

Enable BitLocker with PowerShell on the operat-


ing system drive
Enable BitLocker with the GUI on a fixed data
drive
Enable BitLocker with PowerShell on a fixed data
drive

05 View BitLocker recovery passwords

Powe
Author Recent Posts Get-
Proce
Mana
proce
Kyle Beckman
(Https://4sysops.Com/Members/
Kyle-Beckman/)
Kyle Beckman works as a systems administrator
(https://4s
in Atlanta, GA supporting Office 365 in higher ed-
ysops.co ucation. He has 17+ years of systems administra-
m/ tion experience.
mem-
bers/kyle-
beck-
man/)

BitLocker Drive Encryption gets a lot of attention


when it comes to end-user devices such as tablets,
laptops, and desktop computers. However, it doesn’t
get as much attention when it comes to protecting
data on Windows Servers. Do you have a strategy in
place to protect the data stored on your servers using
disk encryption?

Powe
Get-
Proce
Mana
proce

Read 4sysops without ads for free (/join)


Most of us tend to have server racks, which makes
unauthorized physical access for things such as re-
moving or stealing servers a much harder proposition
than with smaller user-type devices. But, since most
rack mount servers have hot-swappable hard drives,
it becomes very easy for someone with malicious in-
tent to pull hard drives that could contain sensitive
data.

Protecting server data can also be problematic if you


have to deal with shared rooms/closets where telco
equipment or even office supplies may be stored, es-
pecially if those are remote/satellite offices without a
full-time IT person on staff or where multiple people
have access to the room. In these situations, you can
use BitLocker to protect your company’s data.

Requirements Powe
Get-
As with client systems, BitLocker requires a Trusted Proce
Platform Module (TPM) version 1.2 or later. TPM ver- Mana
sion 2.0 adds some additional features, such as proce
Connected Standby, but most servers aren’t going to
use that feature. Without the TPM, a USB startup key
or startup password is necessary for the server at ev-
ery boot.
For this tutorial, the server also needs to be domain-
joined because we need a way to back up the
BitLocker recovery keys if the server runs into trouble
and needs those keys.

Powe
Get-
Proce
Read 4sysops without ads for free (/join)
Mana
proce
For encrypting boot volumes, you’ll have to use physi-
cal hardware. BitLocker Drive Encryption is not sup-
ported for booting VHD/VHDX files (https://
technet.microsoft.com/en-us/library/
hh831507.aspx#BKMK_VHD), but it is supported for
data drives. The same is true if you’re using VMware
(http://kb.vmware.com/selfservice/microsites/
search.do?lan-
guage=en_US&cmd=displayKC&externalId=2036142
).

Installing BitLocker
BitLocker Drive Encryption is not installed by default
on Windows Server. To install it, we’ll need to either
use the GUI or run a PowerShell command.

Using the GUI

In the Server Manager, click Add roles and features.


Click Next on the Before You Begin screen and Next
again on the installation type, leaving Role-based or
feature-based installation as the default. Select
your server and click Next again. Skip Server Roles Powe
by clicking Next. Get-
Proce
On the Features window, click the BitLocker Drive Mana
Encryption check box. proce
Read 4sysops without ads for free (/join)

Powe
Get-
Proce
Mana
proce
(https://4sysops.com/wp-content/uploads/2015/04/
Install-BitLocker-Drive-Encryption-in-Add-Roles-and-
Features-Wizard.png)

Install BitLocker Drive Encryption in Add Roles and


Features Wizard Powe
Get-
When prompted, select the Include management Proce
tools (if applicable) check box and click Add Mana
Features. proce
Powe
(https://4sysops.com/wp-content/uploads/2015/04/ Get-
Proce
Include-management-tools-for-BitLocker-Drive- Mana
Encryption.png) proce
Include management tools for BitLocker Drive
Encryption

Click Next when you’re taken back to the Select


Features window. The install process will require a re-
boot; select Restart the destination server auto-
matically if required and click Install. Accept the re-
boot warning by clicking Yes, and then click Install
one last time.

Using PowerShell

To install BitLocker Drive Encryption using


PowerShell, open a PowerShell window with
Administrator rights and run the following command:

1. Install-WindowsFeature BitLocker –
IncludeAllSubFeature -
IncludeManagementTools -Restart

Unspecified error

If you try to use the BitLocker GUI tools by going to


Control Panel > BitLocker Drive Encryption or by go-
ing to the Start screen and searching for the Powe
BitLocker tools by typing “BitLocker,” you may receive Get-
Proce
some variation of the error C:\Users\%username%
Mana
\AppD… proce
\Classic_{886EDAFC-1051-483F-8AE2-904087A7E5
80}.settingcontent-ms – Unspecified error.
(https://4sysops.com/wp-content/uploads/2015/04/
Unspecified-Error-when-using-BitLocker-GUI-
tools.png)

Unspecified Error when using BitLocker GUI tools

Michael (https://4sysops.com/michael-pietroforte/) en-


countered this error (https://4sysops.com/forums/
topic/manage-bitlocker-gui-does-not-start-with-
unspecified-error-on-windows-server-201/) in a
VirtualBox VM, and I was able to confirm it on a
Hyper-V VM. Both of us think this is most likely just a
bug because you can resolve it by rebooting after the
Powe
initial reboot that is needed to install BitLocker on
Get-
Windows Server 2012 R2. Proce
Mana
proce
Configuring backup of BitLocker re-
covery information
Escrowing your BitLocker recovery information is an
incredibly important step in encrypting your servers.
Should something happen to a server that requires
this information, not having it means you’ll have to re-
cover the system from a backup. If the machine is in
Active Directory, we can configure a few settings in
Group Policy to ensure that the recovery information
is saved.

In a Group Policy Object (GPO) that is linked to the


Organizational Unit (OU) where your servers are lo-
cated, right-click the GPO and choose Edit. Go to
Computer Configuration > Policies > Administrative
Templates > Windows Components > BitLocker Drive
Encryption > Operating System Drives > Choose how
BitLocker-protected operating system drives can be
recovered and set it to Enabled.

Powe
Get-
Proce
Mana
proce
(https://4sysops.com/wp-content/uploads/2015/04/ Powe
Choose-how-BitLocker-protected-operating-system- Get-
drives-can-be-recovered.png) Proce
Mana
Choose how BitLocker-protected operating system proce
drives can be recovered

In addition to the default settings, select the Do not


enable BitLocker until recovery information is
stored to AD DS for operating system drives
check box. I also like to select Omit recovery op-
tions from the BitLocker setup wizard.

Next, we’ll need to do the same thing for fixed/data


drives. Go to Computer Configuration > Policies >
Administrative Templates > Windows Components >
BitLocker Drive Encryption > Fixed Data Drives >
Choose how BitLocker-protected fixed drives can be
recovered and set it to Enabled.

Powe
Get-
Proce
Mana
proce

(https://4sysops.com/wp-content/uploads/2015/04/
Choose-how-BitLocker-protected-fixed-drives-can-be-
recovered.png)
Choose how BitLocker-protected fixed drives can be
recovered

Like you did for the operating system drives, select


the Do not enable BitLocker until recovery infor-
mation is stored to AD DS for fixed data drives
check box. I also like to select Omit recovery op-
tions from the BitLocker setup wizard for fixed/
data drives.

Enabling BitLocker
The last step in setting up BitLocker on our server is
encrypting the drive. As with installing BitLocker, we
can accomplish this with either the GUI or
PowerShell.
Powe
Enable BitLocker with the GUI on the operating Get-
system drive Proce
Mana
To encrypt the operating system drive in the GUI, go proce
to the Control Panel, change the view to Large (or
Small) icons, and go to BitLocker Drive Encryption.
Click Turn on BitLocker in the Operating System
Drive section.
(https://4sysops.com/wp-content/uploads/2015/04/
Turn-on-BitLocker-using-the-GUI-for-the-Operating-
system-drive.png)
Turn on BitLocker using the GUI for the operating
system drive

Next, you’ll need to select whether you want to Powe


Get-
Encrypt used disk space only or Encrypt entire Proce
drive. If you’re working with a brand-new server, used Mana
disk space will encrypt the drive must faster. If you’re proce
working with a server that has been in use, the entire
drive option is the preferred option so that all space
(including free space) is encrypted. Click Next after
you’ve made your selection.
(https://4sysops.com/wp-content/uploads/2015/04/
Choose-how-much-of-your-drive-to-encrypt-Used-
space-or-entire-drive-Operating-system-drive.png)
Choose how much of your drive to encrypt: used
Powe
space or entire drive Get-
Proce
On the last screen, you can choose to run a hardware Mana
system check by selecting the Run BitLocker sys- proce
tem check check box. If you select this box, you’ll
have to reboot. Click Start encrypting to start the en-
cryption process.
(https://4sysops.com/wp-content/uploads/2015/04/
Start-encrypting-after-choosing-to-Run-BitLocker-
system-check.png)
Start encrypting after choosing to “Run BitLocker sys-
Powe
tem check” Get-
Proce
Enable BitLocker with PowerShell on the op- Mana
proce
erating system drive

To enable BitLocker on the operating system drive,


run the following PowerShell command:

1. Enable-BitLocker -MountPoint "C:" -


UsedSpaceOnly -RecoveryPasswordProtector
(https://4sysops.com/wp-content/uploads/2015/04/
Enabling-BitLocker-with-the-Enable-BitLocker-cmdlet-
on-an-operating-system-drive.png)

Enabling BitLocker with the Enable-BitLocker cmdlet


on an operating system drive

If you’re working with an existing server that’s been in


use, you can omit -UsedSpaceOnly so that all drive
space on C:\ is encrypted in case any old data is lin-
Powe
gering on now-unused portions of the disk. You can
Get-
also add -SkipHardwareTest to remove the required Proce
reboot for a hardware check. Mana
proce
Enable BitLocker with the GUI on a fixed
data drive

To encrypt a fixed data drive in the GUI, go to the


Control Panel, change the view to Large (or Small)
icons, and go to BitLocker Drive Encryption. Click
Turn on BitLocker in the Fixed Data Drives section.

(https://4sysops.com/wp-content/uploads/2015/04/
Turn-on-BitLocker-using-the-GUI-for-fixed-data-
drives.png)
Turn on BitLocker using the GUI for fixed data drives Powe
Get-
Next, you’ll be asked how to unlock the fixed data Proce
Mana
drive. Because this is a server, and we don’t want to proce
have to log in every time it reboots to enter a pass-
word to unlock the data drive, select Automatically
unlock this drive on this computer and then click
Next.
(https://4sysops.com/wp-content/uploads/2015/04/
Automatically-unlock-this-drive-on-this-computer.png)
Automatically unlock this drive on this computer

Next, you’ll need to select whether you want to Powe


Get-
Encrypt used disk space only or Encrypt entire
Proce
drive. If you’re working with a brand-new server, used Mana
disk space will encrypt the drive must faster. If you’re proce
working with a server that has been in use, the entire
drive option is the preferred option so that all space
(including free space) is encrypted. Click Next after
you’ve made your selection.
(https://4sysops.com/wp-content/uploads/2015/04/
Choose-how-much-of-your-drive-to-encrypt-used-
space-or-entire-drive-fixed-data-drive.png)
Choose how much of your drive to encrypt: used
Powe
space or entire drive Get-
Proce
On the last screen, click Start encrypting to start the Mana
encryption process. proce
(https://4sysops.com/wp-content/uploads/2015/04/
Start-encrypting.png)

Start encrypting
Powe
Get-
Enable BitLocker with PowerShell on a fixed Proce
data drive Mana
proce
To enable BitLocker on a fixed data drive, run the fol-
lowing PowerShell command:

1. Enable-BitLocker -MountPoint "D:" -


UsedSpaceOnly –RecoveryPasswordProtector
2. Enable-BitlockerAutoUnlock –Mount "D:"
(https://4sysops.com/wp-content/uploads/2015/04/
Enabling-BitLocker-with-the-Enable-BitLocker-cmdlet-
on-a-fixed-data-drive.png)
Enabling BitLocker with the Enable-BitLocker cmdlet
on a fixed data drive

The first PowerShell line is pretty much the same as


encrypting an operating system drive. If you’re using Powe
a brand-new server or a data drive that has no data, Get-
you can speed up the encryption process by omitting Proce
-UsedSpaceOnly. The second line allows the drive to Mana
be automatically unlocked when the server reboots. proce

View BitLocker recovery passwords


If you need to view the BitLocker recovery pass-
words, you’ll need to install the BitLocker Recovery
Password Viewer to use in Active Directory Users and
Computers (ADUC). If you’re using a system that
you’ve just encrypted using these instructions, the
viewer is already installed. You can also use the fol-
lowing PowerShell command:

Subscribe to 4sysops newsletter!

Subscribe

1. Install-WindowsFeature RSAT-Feature-
Tools-BitLocker

In ADUC, you can double-click any BitLocker-


encrypted system that has recovery data backed up
in AD DS and go to the BitLocker Recovery tab to
view the recovery passwords. Powe
Get-
Proce
Mana
proce
Powe
Get-
Proce
(https://4sysops.com/wp-content/uploads/2015/04/ Mana
proce
BitLocker-Recovery-Passwords-in-Computer-
Properties.png)
BitLocker recovery passwords in Computer
Properties

+4
Read 4sysops without ads for free (/join)

Hi! I am 4sysops AI, the best model for IT. Members


get free access to an augmented ChatGPT-4o
trained with the latest IT content. Register now!
IT and AI News

Introduction to GPT-4.5 – Already available for


4sysops members (https://4sysops.com/activity/
p/63131/)

OpenAI CEO Sam Altman says the company is


‘out of GPUs’ | TechCrunch (https://4sysops.com/
activity/p/63129/)

OpenAI GPT-4.5 System Card


(https://4sysops.com/activity/p/63128/)

OpenAI announces GPT-4.5, its largest and most


knowledgeable model yet – Neowin
(https://4sysops.com/activity/p/63126/)

Microsoft fixes Outlook drag-and-drop broken by


Windows updates (https://4sysops.com/activity/ Powe
p/63116/) Get-
Proce
Mana
proce
Read All IT Administration News (/activity/)

Join our IT community and read articles without


ads! (https://4sysops.com/join/?
utm_source=4sysops&utm_medium=end-
page&utm_campaign=NoAds)

Do you want to write for 4sysops? We are looking


for new authors (https://4sysops.com/write-
for-4sysops//?
utm_source=4sysops&utm_medium=end-
page&utm_campaign=Author)

Powe
Get-
Proce
Mana
proce
R E L AT E D A R T I C L E S

(https://4sysops.com/ (https://4sysops.com/ (https://4sysops.com/


archives/restrict-user- archives/debloat- archives/limit-logon-for-
logon-with-claims-based- windows-11-with- users-and-services-with-
authentication-policy/) winscript/) active-directory-
authentication-policies/)
Restrict user logon with Debloat Windows 11 with
claims-based WinScript Limit logon for users
authentication policy (https://4sysops.com/ and services with Active
(https://4sysops.com/ archives/debloat- Directory authentication
Powe
Get-
Proce
Mana
11 C O M M E N T S
proce
paul
Paul
10 years ago

Great write-up. I’m always wary of encrypting


servers in case there is a DR situation. Will
need to do some testing on this.

+1
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=291108#RESPOND)

Kyle Beckman (https://4sysops.com/


members/kyle-beckman/) 10 years ago

I completely agree! It’s one thing for


someone’s laptop to randomly ask for a
Recovery Key, but a server… ouch. In a
perfect world, you’re running all your
workloads in Hyper-V and a non-booting
server isn’t as big of a deal than say a SQL
server or Exchange not coming back up. In a
perfect world, your infrastructure would have
enough redundancy to handle the outage of Powe
a server that won’t boot because of a Get-
BitLocker issue. As for backups, as long as Proce
the vendor supports protection of BitLocker- Mana
encrypted volumes (most should), you proce
should be good to go.

0
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=292572#RESPOND)

sslang
Ming
9 years ago

We have mixture of computers within the


domain with and without BitLocker enabled.
These computers are sitting in the same OU.

We are looking at pushing out a startup


script gpo to disable startup repair on all
computers.

In order for BitLocker enabled


computers to stop having to use the recovery
key at each reboot, we included the two
cmdlets within the startup script to disable
and enable BitLocker. Powe
bcdedit / set … … … Get-
Proce
……… Mana
manage-bde -protector -diasable proce
manage-bde -protector -enable
We tested it. by running the above cmdlets,
computers with BitLocker no longer asking
BitLocker recovery key upon restart.
However, what impact / changes these
cmdlets would bring to the computers that
WITHOUT bitLocker enable? Does the
cmdlets make registry key changes / etc?

What could happen for those computers


that do not have BitLocker enable when run
the manage-bde xxx cmdlets?

Thank you for sharing. great post.

REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=300536#RESPOND)

Kyle Beckman (https://4sysops.com/


members/kyle-beckman/) 9 years ago

I’m a little confused as to why you would Powe


need to disable startup repair. Are your Get-
computers running startup repair every time Proce
Mana
they reboot? If so, you’ve got bigger issues
proce
because that isn’t normal behavior.

Before you run a command in a script to


make changes to BitLocker, you should be
checking to see if BitLocker is enabled first.
You’re asking for trouble running commands
against a system without first verifying that
what you’re trying to modify is/isn’t on the
box.

REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=300564#RESPOND)

sslang
Ming
9 years ago

We need to disables Startup Repair from


appearing due to shutdown failures (which
includes intentionally yanking the power
cord) / by pressing F8 key because of
security reason. we have get the bcdedit /set
cmdlets tested and working.

We then come to realised that computers Powe


Get-
with BitLocker enabled asking BitLocker
Proce
recovery key upon restart. Thus, we included Mana
these two cmdlets: proce
manage-bde -protector -diasable
manage-bde -protector -enable

However, these computers (with and without


BitLocker are sitting on the same OU).
Are you saying that by running the -disable /
-enabled on computer without BitLocker,
there may be unknown risks?

Tyring to find out more info on, as I thought


by running -disable / -enabled on computer
without BitLocker, that computer will ignore
this cmdlets (do nothing).

Unlike if I ran -off / -on then BitLocker will be


turn ON.

thank you for your help.

REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/? Powe
REPLYTOCOM=300605#RESPOND) Get-
Proce
Mana
Kyle Beckman (https://4sysops.com/ proce
members/kyle-beckman/) 9 years ago

I still think you’ve got some other issue if


you’re having so many computers run
startup repair that you want to disable it. I
used to support an army of systems that
were all BitLocker encrypted and I can’t
recall ever having one go into startup repair.

I’m saying that (1) you should test it because


I haven’t and (2) you shouldn’t blindly run
any command against a system without
doing a sanity check to see if it is necessary.
I would never run a command like that
without checking to see if BitLocker was
enabled first and then skip the command if
BitLocker wasn’t enabled.

REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=300608#RESPOND)

sslang
Ming
9 years ago
Powe
Get-
Thanks for the ideas.
Proce
Wrote a script to run the manage-bde Mana
proce
cmdlets if a computer has BitLocker has
Protection set to Onl otherwise ignore.

manage-bde -status c: | find /I “Protection


Status: Protection On”>Nul && (
manage-bde -protectors -disable c:
manage-bde -protectors -enable c:
) || (
Echo No bitlocker
)
) || (
Echo No action required
)

0
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=300629#RESPOND)

pinnacleaccess
FH
8 years ago

We are trying to follow your post and turn on


Powe
bitlocker on several Windows 2012 R2
Get-
servers. Proce
The problem is when we try to turn on Mana
bitlocker we do not have all the option in proce
GUI, for example turning on Bitlocker on
Drive D, there is no option:”Automatically
unlock this drive on this computer” or for
drive c it requires us to save password as an
option to file or USB.
What we are seeing is that the screen shots
you posted for Windows 2012 R2, are not
available to use when we try to turn on
Bitlocker on drives. We have looked enough
everywhere so far no resolution to this.
We are wondering if you have seen this and
can tell us what we are doing wrong. Dell
server with TPM turned on.
Thank you.

0
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=316433#RESPOND)

Michael Pietroforte
(https://4sysops.com/members/michael-
pietroforte/) 8 years ago
Powe
Sounds as if Windows doesn’t recognize the Get-
Proce
TPM. Could be a driver issue. Can you see
Mana
the TPM in device manager (under security proce
devices)?

0
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=316681#RESPOND)
pinnacleaccess
FH
8 years ago

Hello:

Yes I can see TPM under security devices


with version 1.2

Has anybody seen this problem?

REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=316782#RESPOND)

m_hassan1246
Muhammad Hassan
8 years ago

Very nice post about BitLocker, see this Powe


video for complete configuration. Get-
Proce
https://youtu.be/c3Ljd8Y4S-Q (https:// Mana
youtu.be/c3Ljd8Y4S-Q) proce

0
REPLY (HTTPS://4SYSOPS.COM/ARCHIVES/CONFIGURE-AND-

ENABLING-BITLOCKER-ON-WINDOWS-SERVER/?

REPLYTOCOM=366865#RESPOND)
Leave a reply

Please enclose code in pre tags: <pre></pre>

Your email address will not be published. Required


fields are marked *

Comment

Name * Email* Website


Powe
Get-
Proce
Mana
Notify me of followup comments via e-mail. You can also proce
subscribe (https://4sysops.com/comment-subscriptions/?
srp=23007&srk=1db31ad7088fc90f90228334fe018e28&sra=s&srsrc=f)
without commenting.

POST COMMENT
Receive new post notifications

Subscribe to Follow 4sysops


Newsletter
(https://
twitter.com/4sysops/)
(https://
Subscribe www.facebook.com/4sysops)
(https://
www.linkedin.com/ Powe
company/4sysops/) Get-
Proce
Mana
proce
(https://4sysops.com/
feed/)
© 4sysops 2006 - 2025

WindowsUpdatePreventer (https://4sysops.com/windowsupdatepreventer-for-windows)

Powe
Get-
Proce
Mana
proce

You might also like