BitLocker Step by Step
BitLocker Step by Step
This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without
notice. This document does not provide you with any legal rights to any intellectual property in any Microsoft product or product name. You may copy and use
this document for your internal, reference purposes. You may modify this document for your internal, reference purposes. 2012 Microsoft. All rights reserved.
Terms of Use (http://technet.microsoft.com/cc300389.aspx) | Trademarks (http://www.microsoft.com/library/toolbar/3.0/trademarks/en-us.mspx)
Table Of Contents
Chapter 1
BitLocker Drive Encryption Step-by-Step Guide for Windows 7
Scenario 1: Turning On BitLocker Drive Encryption on an Operating System Drive (Windows 7)
Scenario 2: Turning On BitLocker Drive Encryption on a Fixed or Removable Data Drive (Windows 7)
Scenario 3: Upgrading a BitLocker-Protected Computer from Windows Vista to Windows 7 (Windows 7)
Scenario 4: Configuring How BitLocker Is Supported on Previous Versions of Windows (Windows 7)
Scenario 5: Requiring BitLocker Protection on Data Drives (Windows 7)
Scenario 6: Specifying How to Unlock BitLocker-Protected Operating System Drives (Windows 7)
Scenario 7: Specifying How to Unlock BitLocker-Protected Fixed or Removable Data Drives (Windows 7)
Scenario 8: Specifying How BitLocker-Protected Drives Can Be Recovered (Windows 7)
Scenario 9: Configuring the Encryption Method and Cipher Strength (Windows 7)
Scenario 10: Configuring the BitLocker Identification Field (Windows 7)
Scenario 11: Recovering Data Protected by BitLocker Drive Encryption (Windows 7)
Scenario 12: Turning Off BitLocker Drive Encryption (Windows 7)
Scenario 13: Locking a Data Drive with a Smart Card (Windows 7)
Scenario 14: Using a Data Recovery Agent to Recover BitLocker-Protected Drives (Windows 7)
Scenario 15: Using the BitLocker Active Directory Recovery Password Viewer to View Recovery Passwords
Scenario 16: Using the BitLocker Repair Tool to Recover a Drive
Chapter 1
In this guide
The purpose of this guide is to help IT professionals become familiar with the BitLocker Drive Encryption feature of Windows 7. These steps are for
testingonly.ThisguideshouldnotbetheonlyresourceyouusetodeployWindowsServer2008R2orWindows7features.Reviewthefollowing
sections to familiarize yourself with the basic information and procedures that you need to start configuring and deploying BitLocker in your organization.
Scenario 1: Turning On BitLocker Drive Encryption on an Operating System Drive (Windows 7)2
Scenario 2: Turning On BitLocker Drive Encryption on a Fixed or Removable Data Drive (Windows 7)3
Scenario 3: Upgrading a BitLocker-Protected Computer from Windows Vista to Windows 7 (Windows 7)4
Scenario 4: Configuring How BitLocker Is Supported on Previous Versions of Windows (Windows 7)5
Scenario 5: Requiring BitLocker Protection on Data Drives (Windows 7)6
Scenario 6: Specifying How to Unlock BitLocker-Protected Operating System Drives (Windows 7)7
Scenario 7: Specifying How to Unlock BitLocker-Protected Fixed or Removable Data Drives (Windows 7)8
Scenario 8: Specifying How BitLocker-Protected Drives Can Be Recovered (Windows 7)9
Scenario 9: Configuring the Encryption Method and Cipher Strength (Windows 7)10
Scenario 10: Configuring the BitLocker Identification Field (Windows 7)11
Scenario 11: Recovering Data Protected by BitLocker Drive Encryption (Windows 7)12
Scenario 12: Turning Off BitLocker Drive Encryption (Windows 7)13
Scenario 13: Locking a Data Drive with a Smart Card (Windows 7)14
Scenario 14: Using a Data Recovery Agent to Recover BitLocker-Protected Drives (Windows 7)15
Scenario 15: Using the BitLocker Active Directory Recovery Password Viewer to View Recovery Passwords16
Scenario 16: Using the BitLocker Repair Tool to Recover a Drive17
A computer that meets the minimum requirements for Windows 7 or Windows Server 2008 R2.
A TPM microchip, version 1.2, turned on for use with BitLocker on operating system drives is recommended for validation of early boot components
and storage of the BitLocker master key. If the computer does not have a TPM, a USB flash drive may be used to store the BitLocker key.
A Trusted Computing Group (TCG)-compliant BIOS for use with BitLocker on operating system drives.
A BIOS setting to start up first from the hard drive, not the USB or CD drives.
Note
For any scenario that includes using a USB flash drive to provide a BitLocker key (such as a startup key or a recovery key), your BIOS must
support reading USB flash drives at startup.
Important
We strongly recommend that you do not run a kernel debugger while BitLocker is enabled, because encryption keys and other sensitive data can be
accessed with the debugger. However, you can enable kernel debugging before you enable BitLocker. If you enable kernel debugging or boot
debugging (kernel debugging with the bcdedit /debug option), after you have enabled BitLocker the system will automatically start the recovery
process every time you restart the computer.
Additional resources
For help with BitLocker Drive Encryption, choose one of the support options listed on the Microsoft Help and Support Web site18
(http://go.microsoft.com/fwlink/?LinkId=76619).
For additional documentation about BitLocker, see BitLocker Drive Encryption19 (http://go.microsoft.com/fwlink/?LinkId=76553).
For more information about User Account Control, see User Account Control20 (http://go.microsoft.com/fwlink/?LinkId=66018).
Links Table
1http://go.microsoft.com/fwlink/?LinkId=72757
2http://technet.microsoft.com/en-us/library/ee424299(v=ws.10).aspx
3http://technet.microsoft.com/en-us/library/ee424323(v=ws.10).aspx
4http://technet.microsoft.com/en-us/library/ee424325(v=ws.10).aspx
5http://technet.microsoft.com/en-us/library/ee424310(v=ws.10).aspx
6http://technet.microsoft.com/en-us/library/ee424316(v=ws.10).aspx
7http://technet.microsoft.com/en-us/library/ee424319(v=ws.10).aspx
8http://technet.microsoft.com/en-us/library/ee424320(v=ws.10).aspx
9http://technet.microsoft.com/en-us/library/ee424303(v=ws.10).aspx
10http://technet.microsoft.com/en-us/library/ee424301(v=ws.10).aspx
11http://technet.microsoft.com/en-us/library/ee424309(v=ws.10).aspx
12http://technet.microsoft.com/en-us/library/ee424308(v=ws.10).aspx
13http://technet.microsoft.com/en-us/library/ee424315(v=ws.10).aspx
14http://technet.microsoft.com/en-us/library/ee424307(v=ws.10).aspx
15http://technet.microsoft.com/en-us/library/ee424312(v=ws.10).aspx
16http://technet.microsoft.com/en-us/library/ee523220(v=ws.10).aspx
17http://technet.microsoft.com/en-us/library/ee523219(v=ws.10).aspx
18http://go.microsoft.com/fwlink/?LinkId=76619
19http://go.microsoft.com/fwlink/?LinkId=76553
20http://go.microsoft.com/fwlink/?LinkId=66018
2012Microsoft.Allrightsreserved.
3. After the TPM is initialized, the BitLocker setup wizard prompts you to choose how to store the recovery key. You can choose from the following
options:
Save the recovery key to a USB flash drive. Saves the recovery key to a USB flash drive.
Save the recovery key to a file. Saves the recovery key to a network drive or other location.
Print the recovery key. Prints the recovery key.
Use one or more of these options to preserve the recovery key. For each option that you select, follow the wizard steps to set the location for
saving or printing the recovery key. When you have finished saving the recovery key, click Next.
Important
The recovery key is required if the encrypted drive is moved to another computer or changes are made to the system startup information. This
recovery key is so important that it is recommended that you make additional copies of the key and store the key in safe places so that you
can readily find the key if needed to recover access to the drive. You will need your recovery key to unlock the encrypted data on the drive if
BitLocker enters a locked state. This recovery key is unique to this particular drive. You cannot use it to recover encrypted data from any
other BitLocker-protected drive.
For maximum security, you should store recovery keys apart from the computer.
4. The BitLocker setup wizard asks if you are ready to encrypt the drive. Confirm that the Run BitLocker system check check box is selected, and
then click Continue.
5. Confirm that you want to restart the computer by clicking Restart now. The computer restarts, and BitLocker checks if the computer meets
BitLocker requirements and is ready for encryption. If it is not, you will see an error message alerting you to the problem after you have logged on.
Warning
One of the items that BitLocker checks is the configuration of the system partition. BitLocker requires a minimum system partition size of 100
MB, and the Windows Recovery Environment requires 200 MB. When the operating system is installed, the system partition is automatically
created by the setup process with a default size of 300 MB. However, this default partition size can be changed by computer manufacturers or
system administrators when they install the operating system. If the system partition is exactly 100 MB, BitLocker setup assumes that you have
a Windows Recovery DVD for use with your computer and the system check is completed without any errors. However, if you have a system
partition size between 101 MB and 299 MB, the following error message will be displayed: "You will no longer be able to use Windows Recovery
Environment unless it is manually enabled and moved to the system drive." If you have a Windows 7 DVD that contains the Windows Recovery
Environment or you have another system recovery process in place, you may disregard this message and continue with BitLocker setup.
Otherwise, you should check your system partition and verify that you have at least 200 MB of free space on your system partition so that the
Windows Recovery Environment can be retained on the system drive along with the BitLocker Recovery Environment and other files that
BitLocker requires to unlock the operating system drive. For more information about the Windows Recovery Environment, see Windows Recovery
Environment2.
6. If it is ready for encryption, the Encrypting status bar is displayed, which shows the progress of the drive encryption. You can monitor the
ongoing completion status of the disk drive encryption by moving the mouse pointer over the BitLocker Drive Encryption icon in the notification
area, at the far right of the taskbar. Encrypting the drive will take some time. You can use your computer during encryption, but performance
might be slower. A completion message is displayed when encryption is finished,
By completing this procedure, you have encrypted the operating system drive and created a recovery key that is unique to this drive. The next time you
log on, you will see no change. If the TPM ever changes or cannot be accessed, if there are changes to key system files, or if someone tries to start the
computer from a disk to circumvent the operating system, the computer will switch to recovery mode and prevent Windows from starting.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2http://technet.microsoft.com/en-us/library/dd744536(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
3. The BitLocker setup wizard will ask you how you want to unlock this drive. Fixed data drives can be configured to automatically unlock when the
operating system drive is encrypted, to unlock after a password is supplied, or to unlock after a smart card is inserted. Removable data drives can
be configured to unlock after a password is supplied or to unlock after a smart card is inserted. If you want the removable data drive to
automatically unlock, you can specify that option after encryption has occurred by clicking Manage BitLocker from the BitLocker Drive
Encryption Control Panel item or by selecting the Automatically unlock on this computer from now on check box when you unlock the drive.
4. Before BitLocker encrypts the drive, the BitLocker setup wizard prompts you to choose how to store the recovery key. You can choose from the
following options:
Save the recovery key to a USB flash drive. Saves the recovery key to a USB flash drive. This option cannot be used with removable
drives.
Save the recovery key to a file. Saves the recovery key to a network drive or other location.
Print the recovery key. Prints the recovery key.
Use one or more of these options to preserve the recovery key. For each option that you select, follow the wizard steps to set the location for
saving or printing the recovery key. When you have finished saving the recovery key, click Next.
Important
The recovery key is required when a BitLocker-protected fixed data drive configured for automatic unlocking is moved to another computer, or
the password or smart card associated with unlocking the fixed or removable drive is not available, such as when a password is forgotten or a
smart card is lost. You will need your recovery key to unlock the encrypted data on the drive if BitLocker enters a locked state. This recovery
key is unique to this particular drive. You cannot use it to recover encrypted data from any other BitLocker-protected drive.
For maximum security, you should store recovery keys apart from the drives they are associated with.
5. The BitLocker setup wizard asks if you are ready to encrypt the drive. Click Start Encrypting.
6. The Encrypting status bar is displayed. You can monitor the ongoing completion status of the drive encryption by moving the mouse pointer over
the BitLocker Drive Encryption icon in the notification area, at the far right of the taskbar.
By completing this procedure, you have encrypted a fixed or removable data drive, associated a key protector with an unlock method for the drive, and
created a recovery key that is unique to this drive.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
2012Microsoft.Allrightsreserved.
Note
A similar policy setting is available for use with fixed data drives.
2012Microsoft.Allrightsreserved.
To require BitLocker protection on data drives before permitting data to be saved on them
1. Click Start, type gpedit.msc in the Search programs and files box, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
3. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Fixed Data Drives.
4. To require BitLocker protection on fixed data drives before allowing users to save data to them, in the details pane, double-click Deny write
access to fixed drives not protected by BitLocker to open the policy setting.
5. Click Enabled, click Apply to apply the setting, and then close the dialog box.
6. Restart the computer.
7. Click Start, type gpedit.msc in the Search programs and files box, and then press ENTER.
8. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
9. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Removable Data Drives.
10. To require the use of BitLocker To Go on removable data drives before allowing users to save data to them, in the details pane, double-click Deny
write access to removable drives not protected by BitLocker to open the policy setting.
11. Click Enabled, click Apply to apply the setting, and then close the dialog box.
Note
Enabling this policy setting means that you cannot support the use of startup keys, recovery keys, or BitLocker protection of operating system
drives without a TPM because these features require an unencrypted removable data drive on which to store the BitLocker key.
2012Microsoft.Allrightsreserved.
Note
If you require removable drives to be BitLocker-protected, you cannot use a startup key with your operating system drive.
If you require the use of a TPM, a startup key, and a PIN to unlock the operating system drive, you must use the Manage-bde.exe commandline tool to choose that authentication method and enable BitLocker. Use the following command to add the TPM, PIN, and startup key
authentication method, replacing VolumeName with the drive letter of the operating system drive and RemovableDriveLetter with the letter of
the removable drive where you will be storing the startup key:
manage-bde -protectors -add -tpsk VolumeName: -tsk RemovableDriveLetter:
Use the following command to turn on BitLocker and encrypt the drive, replacing VolumeName with the drive letter of the operating system
drive:
manage-bde -on VolumeName:
7. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
8. If you are using PINs for authentication along with the TPM, you may want to enable the use of enhanced PINs to allow for increased complexity of
PINs. Enhanced PINs support the use of characters, including uppercase and lowercase letters, symbols, numbers, and spaces. Not all computers
support these characters before the operating system starts, so we recommend that users perform a system check during BitLocker setup to verify
that their computer will support the BitLocker settings they have selected before encrypting the drive. Double-click the Allow enhanced PINs for
startup policy setting, and click Enabled to provide the option of using enhanced PINs with BitLocker-protected operating system drives. If this
policy setting is disabled or not configured, enhanced PINs cannot be used.
9. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
10. Close the Local Group Policy Editor.
11. To force Group Policy to apply the changes immediately, you can click Start, type gpupdate.exe /force in the Search programs and files box,
and then press ENTER. Wait for the process to finish.
By completing this procedure, you have configured Group Policy settings to control which unlock methods can be used with operating system drives in
your organization.
2012Microsoft.Allrightsreserved.
Note
If BitLocker is enabled on the operating system drive, when you turn on BitLocker for a fixed data drive, you will have the option of allowing the drive
to be automatically unlocked when the operating system drive is unlocked. The following procedure assumes that the fixed data drive was BitLockerprotected previously and the automatic unlock method was not selected. Removable data drives must have either a password or a smart card unlock
method in addition to the automatic unlock method. Automatic unlocking cannot be directly specified by policy settings.
on a removable data drive. If other unlock methods have been configured for the drive, any of those methods may be used to unlock the
drive.
Under Configure password complexity for removable data drives, you can choose to allow, require, or not allow password complexity
rule enforcement with BitLocker removable data drive passwords.
If you choose Require password complexity, you must have also configured the Password must meet complexity requirements policy
setting located in Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy, and the
computer must be connected to the domain when BitLocker is turned on so that the domain controller can validate that the password
specified for the drive meets the complexity rules.
If you choose Allow password complexity, BitLocker will attempt to connect to the domain controller to validate the password, but if a
connection is not possible it will accept the password and encrypt the drive by using the password regardless of whether the password is
compliant with the complexity rules defined by the password policy.
If you choose Do not allow password complexity, BitLocker will not attempt to validate whether or not the password specified is a
complex password.
Under Minimum password length for fixed data drive, you can specify a number between 8 and 99 that defines how long the password
specified for the drive must be. Passwords must always be at least 8 characters.
10. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
11. Close the Local Group Policy Editor.
12. To force Group Policy to apply the changes immediately, you can click Start, type gpupdate.exe /force in the Search programs and files box,
and then press ENTER. Wait for the process to finish.
To specify smart card usage for BitLocker-protected fixed or removable data drives
1. Click Start, type gpedit.msc in the Search programs and files box, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
3. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Fixed Data Drives.
4. By default, smart cards can be used with BitLocker to protect fixed data drives. To require or prevent the use of smart cards, in the details pane,
double-click Configure use of smart cards on fixed data drives to open the policy setting.
5. Click Disabled to prevent the use of smart cards with fixed data drives.
6. Click Enabled, and select the Require use of smart cards on fixed data drives check box if you want to require the user to insert a smart card
to turn on BitLocker.
If other unlock methods have been configured for the drive, any of those methods may be used to unlock the drive.
7. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
8. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components, click
BitLocker Drive Encryption
9. If you have multiple smart card certificates, you can specify which smart card certificates can be used with BitLocker. To do this, in the details
pane, double-click the Validate smart card certificate usage rule compliance policy setting.
By default, BitLocker uses smart card certificates that have the enhanced key usage (EKU) attribute equal to the BitLocker object identifier of
1.3.6.1.4.1.311.67.1.1, but BitLocker does not require the EKU attribute to be present for the certificate to be used with BitLocker. However,
you can set this policy to Enabled and type a value in Object identifier to require that a certificate have a certain EKU attribute before it is used
with BitLocker. If you set this policy to Disabled or Not Configured, the default object identifier is used.
10. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
11. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Removable Data Drives.
12. By default, smart cards can be used with BitLocker to protect removable data drives. To require or prevent the use of smart cards, in the details
pane, double-click Configure use of smart cards on removable data drives to open the policy setting.
13. Click Disabled to prevent the use of smart cards with removable data drives.
14. Click Enabled, and select the Require smart card for removable data drive check box if you want to require the user to insert a smart card to
turn on BitLocker.
15. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
16. Close the Local Group Policy Editor.
17. To force Group Policy to apply the changes immediately, you can click Start, type gpupdate.exe /force in the Search programs and files box,
and then press ENTER. Wait for the process to finish.
By completing the procedures in this scenario, you have specified which methods users can use to unlock BitLocker-protected drives. These policies are
enforced on drives when BitLocker is turned on.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
3. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Fixed Data Drives.
4. To configure recovery options for fixed data drives, in the details pane, double-click Choose how BitLocker-protected fixed drives can be
recovered to open the policy setting. If this policy setting is disabled or not configured, the default recovery options are supported for BitLocker
recovery. By default, a data recovery agent is allowed, the user can choose to create a recovery password or a recovery key when they turn on
BitLocker, and recovery information is not backed up to AD DS.
5. To specify different recovery options, click Enabled, and then configure the following settings as appropriate:
Select the Allow data recovery agent check box to allow specified accounts to be used to recover BitLocker-protected drives. To use a
data recovery agent, the account must be configured and added to the following location in Group Policy: Computer
Configuration\Windows Settings\Security Settings\Public Key Policies\BitLocker Drive Encryption. For more information about
setting up data recovery agents, see Using Data Recovery Agents with BitLocker1. Clear the Allow data recovery agent check box if you
do not want to allow data recovery agents to be used with BitLocker.
Under Configure user storage of BitLocker recovery information, you can choose whether or not a user is allowed, required, or not
allowed to create a 48-digit recovery password or 256-bit recovery key when they turn on BitLocker.
Select the Save BitLocker recovery information to AD DS for fixed data drives check box, and then select whether you want to Store
recovery passwords and key packages in AD DS or Store recovery passwords only. Storing recovery passwords in AD DS allows system
administrators to provide recovery passwords to users or recover BitLocker-protected drives when the user-stored recovery password or
recovery key is not available (for example, when a user loses the recovery password printout or when the stored recovery key file cannot be
accessed). Storing the key packages in addition to the recovery passwords enables administrators to use the Repair-bde command-line tool
to recover a BitLocker-protected drive that has been damaged in such a way that reading the encryption key from the drive is not possible.
Select the Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives check box to ensure that the
recovery information for all BitLocker-protected fixed data drives in your organization is stored in AD DS. Recovery information is generated
when the drive is first encrypted and is not automatically sent to AD DS after encryption has occurred. When this check box is selected,
users must be connected to the domain when they turn on BitLocker.
Select the Omit recovery options from the BitLocker setup wizard check box if you want the choice of recovery method to be controlled
by this policy setting and not show the recovery options to the user. To enable this option, you must select one or both of the
administrative recovery settings Save BitLocker recovery information to AD DS for fixed data drives or Allow data recovery agent to
ensure that the BitLocker-protected drive can be recovered.
6. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
7. To force Group Policy to apply the changes immediately, you can click Start, type gpupdate.exe /force in the Search programs and files box,
and then press ENTER. Wait for the process to finish.
To specify how BitLocker-protected removable data drives can be recovered
1. Click Start, type gpedit.msc in the Search programs and files box, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
3. In the console tree under Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\BitLocker
Drive Encryption, click Removable Data Drives.
4. To configure recovery options for removable data drives, in the details pane, double-click Choose how BitLocker-protected removable data
drives can be recovered to open the policy setting. If this policy setting is disabled or not configured, the default recovery options are supported
for BitLocker recovery. By default, a data recovery agent is allowed, the user can choose to create a recovery password or a recovery key when
they turn on BitLocker, and recovery information is not backed up to AD DS.
5. To specify different recovery options, click Enabled, and then configure the following settings as appropriate:
Select the Allow data recovery agent check box to allow specified accounts to be used to recover BitLocker-protected drives. To use a
data recovery agent, the account must be configured and added to the following location in Group Policy: Computer
Configuration\Windows Settings\Security Settings\Public Key Policies\BitLocker Drive Encryption. For more information about
setting up data recovery agents, see Using Data Recovery Agents with BitLocker1. Clear the check box if you do not want to allow data
recovery agents to be used with BitLocker.
Under Configure user storage of BitLocker recovery information, you can choose whether or not a user is allowed, required, or not
allowed to create a 48-digit recovery password or 256-bit recovery key when they turn-on BitLocker. By default, recovery keys are not used
with removable data drives.
Select the Save BitLocker recovery information to AD DS for removable data drives check box, and then select whether you want to
Store recovery passwords and key packages in AD DS or Store recovery passwords only. Storing recovery passwords in AD DS allows
system administrators to provide recovery passwords to users or recover BitLocker-protected drives when the user-stored recovery
password or recovery key is not available (for example, when a user loses the recovery password printout or when the stored recovery key
file cannot be accessed). Storing the key packages in addition to the recovery passwords enables administrators to use the Repair-bde
command-line tool to recover a BitLocker-protected drive that has been damaged in such a way that reading the encryption key from the
drive is not possible.
Select the Do not enable BitLocker until recovery information is stored to AD DS for removable data drives check box to ensure that
the recovery information for all BitLocker-protected removable data drives in your organization is stored in AD DS. Recovery information is
generated when the drive is first encrypted and is not automatically sent to AD DS after encryption has occurred. When this check box is
selected, users must be connected to the domain when they turn on BitLocker.
Select the Omit recovery options from the BitLocker setup wizard check box if you want the choice of recovery method to be controlled
by this policy setting and not show the recovery options to the user. To enable this option, you must select one or both of the
administrative recovery settings Save BitLocker recovery information to AD DS for removable data drives or Allow data recovery
agent to ensure that the BitLocker-protected drive can be recovered.
6. After you have made your choices, click Apply to apply the settings, and then close the dialog box.
7. Close the Local Group Policy Editor.
8. To force Group Policy to apply the changes immediately, you can click Start, type gpupdate.exe /force in the Search programs and files box,
and then press ENTER. Wait for the process to finish.
By completing the procedures in this scenario, you have configured the Group Policy settings establishing the recovery options available for operating
system drives, fixed data drives, and removable data drives.
Links Table
1http://technet.microsoft.com/en-us/library/dd875560(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
2012Microsoft.Allrightsreserved.
By completing this procedure, you have configured the identification field that will be applied to drives in your organization when BitLocker is turned on.
2012Microsoft.Allrightsreserved.
By completing the procedures in this scenario, you have used data recovery to reestablish access to a BitLocker-protected drive.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
2012Microsoft.Allrightsreserved.
By completing the procedures in this scenario, you have a drive that is now protected by BitLocker and ready to use. Whenever the drive is inserted into
a computer running Windows 7, a dialog box will prompt users to insert their smart card to unlock the drive.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
Scenario 14: Using a Data Recovery Agent to Recover BitLockerProtected Drives (Windows 7)
Updated: August 26, 2009
Applies To: Windows 7
This scenario describes how to use a data recovery agent to recover data from a BitLocker-protected drive. Data recovery agents are individuals whose
public key infrastructure (PKI) certificates have been used to create a BitLocker key protector, so those individuals can use their credentials to unlock
BitLocker-protected drives. Data recovery agents can be used to recover BitLocker-protected operating system drives, fixed data drives, and removable
data drives. However, when used to recover operating system drives, the operating system drive must be mounted on another computer as a data drive
for the data recovery agent to be able to unlock the drive. Data recovery agents are added to the drive when it is encrypted and can be updated after
encryption occurs.
7. On the Export File Format page, verify that DER encoded binary x.509 (.CER) is selected, and then click Next.
8. On the File to Export page, click Browse to display the Save as dialog box. In File name, type BitLockerDRA. In Save as type, verify that
DER Encoded Binary X.509 (.cer) is selected, and then click Save to return to the File to Export page. The File name box on the wizard page
should now display the path to the BitLockerDRA.cer file in your document library. Click Next.
9. On the Completing the Certificate Export Wizard page, verify that the information displayed is correct, and then click Finish.
10. When the certificate has been exported, the Certificate Export Wizard dialog box will be displayed with the message The export was
successful. Click Close to close the dialog and the wizard.
To add a BitLocker data recovery agent and unlock a drive
1. Click Start, type gpedit.msc in the Search programs and files box, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
3. In the console tree under Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Public Key Policies, rightclick BitLocker Drive Encryption, and then click Add Data Recovery Agent to start the Add Recovery Agent Wizard.
4. On the Select Recovery Agents page, click Browse Folder to select the BitLockerDRA.cer file you exported in the previous procedure. If you
did not need to export a certificate because you already had deployed a PKI with the necessary certificates, click Browse directory to choose a
certificate from Active Directory Domain Services.
5. If you are prompted to install the certificate, click Yes. You can repeat this process as necessary to add multiple data recovery agents. After all
data recovery agent certificates you want to use have been specified, click Next.
6. On the Completing the Recovery Agent Wizard page, click Finish to add the data recovery agent.
7. If you have not configured the Group Policy setting to specify the BitLocker identification field, complete Scenario 10: Configuring the BitLocker
Identification Field (Windows 7)2 before continuing with this scenario.
8. Encrypt a data drive as described in Scenario 2: Turning On BitLocker Drive Encryption on a Fixed or Removable Data Drive (Windows 7)3. For a
data recovery agent to be able to unlock a drive, the BitLocker identification field must be present and match the identification field defined for
your organization.
9. To put the drive into a locked state so that you can test the data recovery agent, click Start, point to All Programs, click Accessories, rightclick Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it
displays is what you want, and then click Yes. Type the following command, replacing Volume with the drive letter of the BitLocker-protected
drive you want to lock:
ManagebdelockVolume :
Do not close the Command Prompt window.
10. Now that the drive is locked, you can unlock it by using the data recovery agent. First, you need the certificate thumbprint of the data recovery
agent. To find this, at the command prompt, type the following command, replacing Volume with the drive letter of the BitLocker-protected drive
you want to unlock:
ManagebdeprotectorsgetVolume :
The key protectors identified for the drive are displayed. Find the key protector identified as Data Recovery Agent (Certificate Based), and
record the certificate thumbprint.
11. To unlock the drive, type the following command, replacing CertificateThumbprint with the actual certificate thumbprint of the data recovery
agent recorded in the previous step:
ManagebdeunlockVolume : certctCertificateThumbprint -PIN
12. Enter your smart card PIN when prompted. The drive is unlocked.
By completing the procedures in this scenario, you have assigned data recovery agents to BitLocker and used a data recovery agent to unlock a
BitLocker-protected drive.
Links Table
1http://technet.microsoft.com/en-us/library/dd835565(v=ws.10).aspx
2http://technet.microsoft.com/en-us/library/ee424309(v=ws.10).aspx
3http://technet.microsoft.com/en-us/library/ee424323(v=ws.10).aspx
2012Microsoft.Allrightsreserved.
2012Microsoft.Allrightsreserved.
Recovery information
Value
Recovery password
062612-026103-175593-225830-027357-086526-362263-513414
F:\RecoveryKey.bek
By completing this procedure, you have used the Repair-bde command-line tool to repair a damaged BitLocker-protected drive.
2012Microsoft.Allrightsreserved.