This setting allows you to control how BitLocker-protected fixed data drives are recovered in the absence of the required credentials. This setting is applied when you turn on BitLocker.
Fixed drives require encryption
If you enable this setting, all fixed data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access.
Configure encryption methods for fixed drives
For fixed and operating system drives, we recommend XTS-AES algorithm.
Save BitLocker info on fixed data drives to Azure AD DS.
Use data recovery agents with BitLocker – fixed data drives
Data recovery agents are granted rights to decrypt data encrypted by other users as their PKI certificates have been used to create a BitLocker key protector. They can thus use their credentials to unlock BitLocker-protected drives.
Hide recovery options from BitLocker setup wizard
Prevent user from specifying recovery options when he turn on BitLocker on a drive.
Disable BitLocker until fixed data drive recovery information is stored on Azure AD DS
Prevent user from enabling BitLocker unless the computer in connected to the domain and the backup of Bitlocker recovery information to Azure AD DS succeeds.
Select recovery information to be stored on Azure AD DS
Generate recovery key
The 256-bit recovery key is system-generated and is stored on an external USB drive.
Generate recovery password
The 48 digit recovery password is system generated and it has to be either printed or stored on an external USB drive.
Removable drives require encryption
If you enable this setting, all removable data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access.
Configure encryption methods for removable drives
For removable drives, you should use AES-CBC 128-bit or AES-CBC 256-bit if the drive will be used in other devices that are not running Windows 10, version 1511.
Configure encryption methods for operating system drives
For operating system drives, we recommend XTS-AES algorithm.
Minimum length for BitLocker startup PIN
This setting allows you to configure a minimum length for a Trusted Platform Module (TPM) startup PIN. The startup PIN must have a minimum length of 6 to 20 digits.
Configure the pre-boot recovery message
Custom recovery message and URL
Configure recovery options for system drives
Choose how BitLocker-protected operating system drives can be recovered.
Save BitLocker info on OS drives to Azure AD DS.
Use data recovery agents with BitLocker – OS drives
Bitlocker data recovery agents are individuals whose public key infrastructure (PKI) certificates have been used to create a BitLocker key protector, so those individuals can use their credentials to unlock BitLocker-protected drives. Bitlocker Data recovery agents can be used to recover BitLocker-protected operating system drives, fixed data drives, and removable data drives.
Hide recovery options from BitLocker setup wizard
Prevent user from specifying recovery options when BitLocker is turned on on a drive.
Disable BitLocker until OS drive recovery information is stored on Azure AD DS
Prevent user from enabling BitLocker unless the computer is connected to the domain and the backup of Bitlocker recovery information to Azure AD DS succeeds.
Select recovery information to be stored on Azure AD DS
Generate recovery key
The 256-bit recovery key is system-generated and is stored on an external USB drive.
Generate recovery password
The 48 digit recovery password is system generated and it has to be either printed or stored on an external USB drive.
Authenticate with TPM startup pin
Requires the entry of a 6 to 20 digit personal identification number (PIN), configured by the user during BitLocker setup.
Enable BitLocker without a Trusted Platform Module (TPM)
In this mode either a password or a USB key drive is required to unlock Bitlocker-Encrypted PC
Authentication with TPM
“Required” enables a TPM only mode, wherein encryption keys are stored in the TPM chip. User will have a SSO experience without requiring a PIN or startup key during boot.
Authentication with TPM and startup key
When using a startup key, the key information used to encrypt the drive is stored on the USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible.
Authentication with TPM and PIN
Requires the entry of a 6 to 20 digit personal identification number (PIN), configured by the user during BitLocker setup.
Authentication with TPM, startup key and PIN
Required by default if the system has no TPM.