I guess they mean use the password as part of the encryption key, or encrypt the key with the password. Bitlocker doesn’t use the user’s password in that way, which is why it can boot an encrypted system without user interaction. That part always seemed very sketchy to me.
I mean, if it’s a corporate device then it’s really a policy IT should be setting - this can be easily be done via a GPO or Intune policy, where an elevated script can prompt the end-user for a password.
Yarp. And when they forget it we use the 48 numerical recovery key found using the recovery ID that shows on the screen when you hit escape (from the bitlocker screen)
I guess they mean use the password as part of the encryption key, or encrypt the key with the password. Bitlocker doesn’t use the user’s password in that way, which is why it can boot an encrypted system without user interaction. That part always seemed very sketchy to me.
FYI: You can set it to require a PIN + TPM, or even just a password eg using
manage-bde -on c: -password
.https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde-on
Thanks, that sounds really useful. I’m guessing it won’t work unless you’re local admin though.
Yep, you’ll need local admin of course.
Which kind of makes it useless in many corporate environments where it’s most needed, since the users won’t be able to set their own password.
I mean, if it’s a corporate device then it’s really a policy IT should be setting - this can be easily be done via a GPO or Intune policy, where an elevated script can prompt the end-user for a password.
Yarp. And when they forget it we use the 48 numerical recovery key found using the recovery ID that shows on the screen when you hit escape (from the bitlocker screen)
It would be insane to let non admin change settings like this.