Windows BitLocker Configuration
Windows BitLocker Configuration
BitLocker provides full disk encryption for Windows systems, protecting data if devices are lost or stolen. Understanding BitLocker's various modes and configuration options enables administrators to implement appropriate protection levels while maintaining usability. BitLocker integrates with Active Directory for centralized key management in enterprise environments.
Enable BitLocker through PowerShell for consistent deployment:
# Check BitLocker readiness
$BitLockerVolume = Get-BitLockerVolume -MountPoint "C:"
if ($BitLockerVolume.ProtectionStatus -eq "Off") {
# Enable TPM if available
Initialize-Tpm -AllowClear -AllowPhysicalPresence
# Add TPM protector
Add-BitLockerKeyProtector -MountPoint "C:" -TpmProtector
# Add recovery password
Add-BitLockerKeyProtector -MountPoint "C:" -RecoveryPasswordProtector
# Enable BitLocker
Enable-BitLocker -MountPoint "C:" -EncryptionMethod Aes256 -UsedSpaceOnly
}
# Backup recovery keys to AD
$RecoveryKey = (Get-BitLockerVolume -MountPoint "C:").KeyProtector | Where-Object {$_.KeyProtectorType -eq "RecoveryPassword"}
Backup-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId $RecoveryKey.KeyProtectorId
Configure BitLocker Group Policy for enterprise deployment:
# Key Group Policy settings for BitLocker
# Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption
# Operating System Drives
# - Require additional authentication at startup: Enabled
# - Allow BitLocker without a compatible TPM: Disabled
# - Configure TPM platform validation profile: PCRs 0,2,4,11
# Choose drive encryption method and cipher strength
# - Select the encryption method: AES 256-bit
# Store BitLocker recovery information in AD DS
# - Require BitLocker backup to AD DS: Enabled
# - Do not enable BitLocker until recovery information is stored in AD DS: Enabled
Implement BitLocker Network Unlock for server environments:
# Install BitLocker Network Unlock feature
Install-WindowsFeature BitLocker-NetworkUnlock -IncludeManagementTools
# Configure WDS server for Network Unlock
$Certificate = Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Subject -match "BitLocker"}
$CertificateThumbprint = $Certificate.Thumbprint
# Configure Network Unlock on domain controller
Add-BitLockerKeyProtector -MountPoint "C:" -NetworkUnlockProtector -NetworkUnlockServerCertificateThumbprint $CertificateThumbprint
Monitor BitLocker status across the enterprise:
# Query BitLocker status on remote computers
$Computers = Get-ADComputer -Filter * | Select-Object -ExpandProperty Name
$BitLockerStatus = foreach ($Computer in $Computers) {
Invoke-Command -ComputerName $Computer -ScriptBlock {
Get-BitLockerVolume | Select-Object ComputerName, MountPoint, ProtectionStatus, EncryptionPercentage
}
}
# Generate compliance report
$BitLockerStatus | Export-Csv "BitLocker_Status_$(Get-Date -Format yyyyMMdd).csv" -NoTypeInformation