Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to Enable BitLocker without Compatible TPM
  • Create your own Network on AWS from Scratch
    VPC, Subnet, NACL, Security Group: Create your own Network on AWS from Scratch [Part 2] AWS/Azure/OpenShift
  • feature image
    How to Configure Advanced PAM in Linux Linux
  • ad lds 832x400 1
    Active Directory Lightweight Directory Services [AD LDS] Windows Server
  • Hub Transport 1
    Hub Transport Server: Resolving ‘Failed to Reach Running Status’ Network | Monitoring
  • Reverse Image Search
    How to Perform a Reverse Image Search on Your Browsers Network | Monitoring
  • Featured image batch file.
    Retrieve Recent Windows Update: How to create batch script files Scripts
  • WPScan Banner
    How to scan WordPress Websites With WPScan For Security Vulnerabilities Security | Vulnerability Scans and Assessment
  • multcloud
    Best Way to Backup Dropbox to Box JIRA|Confluence|Apps

How to Enable BitLocker without Compatible TPM

Posted on 30/12/202024/10/2024 Christian By Christian No Comments on How to Enable BitLocker without Compatible TPM

Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software attack tool against it or by transferring the computer’s hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. In this article, you will learn How to Enable BitLocker without Compatible TPM. Please see how to stay protected on Windows 10 and 11 device with Windows Security, and how to fix unable to find compatible TPM.

BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. Since I have tested an FDE solution with PBA, kindly take a look at how to download and install DriveLock.

BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC). Let’s walk through a few simple steps on how to Enable BitLocker without Compatible TPM via the Group Policy.

Please see “Insight on Full Disk Encryption with PBA / without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption“.

Enable BitLocker without Compatible TPM

It can also be configured through Group Policy settings. This is particularly useful for organizations that have a compliance mandate to enable BitLocker encryption for all endpoint devices.

You can also use MBAM (Microsoft Bitlocker Administration and Monitoring), SCCM (Microsoft System Center Configuration Manager), or Intune to roll out Bitlocker to your users.

See the following guide on how to enable FileVault disk encryption on a Mac device and BitLocker Drive Encryption architecture and implementation scenarios.

BitLocker with Active Directory Relationship

BitLocker integrates with AD DS to provide centralized key management. By default, no recovery information is backed up to Active Directory (AD).

Administrators can configure the following Group Policy setting for each drive type to enable backup of BitLocker recovery information.

By default, only Domain Admins have access to BitLocker recovery information, but access can be delegated to others. The following recovery data is saved for each computer object:

  • Recovery Password: A 48-digit recovery password used to recover a BitLocker-protected volume. Users enter this password to unlock a volume when BitLocker enters recovery mode.
  • Key Package Data: With this key package and the recovery password, you will be able to decrypt portions of a BitLocker-protected volume if the disk is severely damaged. Each key package will only work with the volume it was created on, which can be identified by the corresponding volume ID.

Part A: Enable BitLocker via the Local Group Policy Editor

To get started, launch the Local Group Policy Editor as shown below. 

Note: You can also search for “gpedit.msc” from the Windows search box

This will open up the Local Group Policy Editor and please navigate through as shown below.

Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives

In the right pane, double-click Require additional authentication at startup. A pop-up box will open.

Make sure the Enabled option is selected for all of the other options listed below to be active. 

For more on this, see this guide “how to fix your device cannot use a Trusted Platform Module: Allow BitLocker without a compatible TPM”.

Note: If you do NOT want to configure BitLocker to support devices without TPM, you can clear the "Allow BitLocker without a compatible TPM" check box.
Enable BitLocker without Compatible TPM
  • For the “Configure TPM start:” option, select “Allow TPM”.
  • For the option “Configure TPM system start PIN:” select “Start PIN required for TPM”.
  • For the “Configure TPM startup key:” option, select “Allow startup key with TPM”.
  • For the “Configure TPM startup key and PIN:” option, select “Allow startup key for TPM”.
  • Click the Apply button, then click the OK button to save the changes in the Local Group Policy Editor. For more information on Group Policy, please see the following guide on what a Group Policy Object.

As you can see below, the Settings have been configured.

Create a BitLocker PIN via the Command Line

Launch the CMD with administrator rights and perform the following below. Enter the command below.

manage-bde -protectors -add c: -TPMAndPIN

You will be prompted to enter the PIN. 
– Enter a number between four and seven digits. The cursor does not register the keystrokes when you enter the number.
– Press Enter to save the PIN and you will be asked to re-enter the PIN to confirm. 
– Press Enter again to save the PIN verification.
– Next, enter the command to view the status of the Bitlocker Data Encryption. The BitLocker Drive Encryption Status shows the “Key Protectors:” as “Numeric Password”, “TPM and PIN”.

manage-bde -status

Note: Every time the user boots the system, a BitLocker pre-boot security prompt is displayed, requiring the PIN to be entered before access to the operating system is granted. See these guides for more information on how to enable or disable BitLocker on Windows 10 or this link.

Part B – Link BitLocker via Group Policy

We will start by opening Server Manager, click on Tools, followed by Group Policy Management as shown below.

This will open up the Group Policy Management Console as shown below.

Create a Group Policy Object for BitLocker without Compatible TPM

Select the Group Policy Objects folder within the domain. Right-click and select new to create a new group policy object (GPO).

From the New GPO dialog box, I will enter my desired name “TechDirectA BitLocker GPO”. You can use any name of your choice.

The GPO has been created. We will have to right-click it and select Edit.

This will open the Group Policy Management Editor (GPME). From within GPME navigate the path below. We can set policy for some global BitLocker items, as well as the specific policy that applies to the operating system drive, fixed data drives, or removable data drives.

Enable the Group Policy Settings for BitLocker without Compatible TPM

The BitLocker Drive Encryption folder contains ten configurable settings, as well as three subfolders, each of which contains additional settings. You can see the primary collection of settings as shown below.

Computer Configuration\Policies\Administrative Templates\Windows Components\BitLocker Drive Encryption

Enable the following Options: Choose drive encryption method and cipher strength (Windows 10 Version 1511 and later)

  • Choose the drive encryption method and cipher strength (Server 2012, Win 8.1, etc…)
  • Choose how users can recover BitLocker-protected drives
  • Store BitLocker recovery information in Active Directory Domain Services
Screenshot 2020 12 30 at 17.56.19
Screenshot 2020 12 30 at 17.58.41

As you can see below, the needed Policies have been enabled.

Next, navigate down the folder into Operating System Drives and enable the following: Choose how BitLocker protected operating system drives can be recovered and enable it.

Screenshot 2020 12 30 at 17.48.39
Screenshot 2020 12 30 at 17.49.15

As we can see below the Policy has been enabled

This is not an exhaustive list, for a comprehensive list of BitLocker Group Policy settings. Next, We will have to target the GPO to our domain. You can tie this to specific OUs’ if you want.

This will start the BitLocker process to encrypt automatically. To link the GPO, right-click on your Domain and select “Link an existing GPO”. Select the GPO object in the list of GPOs and click on OK.

Screenshot 2020 12 30 at 18.17.16
Screenshot 2020 12 30 at 18.17.33

As you can see, The GPO has been linked to our Domain.

In order to make or roll out BitLocker through a Group Policy that you should run a ‘gpupdate’ on the system. For more information on Group Policy, please see the following guide on GPUpdate Switches: GPUpdate vs GPUpdate force.

Part C- Backup existing BitLocker recovery keys to AD

IDo you have already enabled BitLocker but now want to store the recovery keys in Active Directory. With the configured GPO policies above, this will allow Windows to write the recovery key to AD.

We need to use the manage-bde utility, which is a command-based utility that can be used to configure BitLocker. For more information, see the following how to backup BitLocker to AD.

I hope you found this blog post helpful. You have learned how to Enable BitLocker without Compatible TPM via the Group Policy. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Encryption, encrytp, FDE, File and Folder Encryption Software, Full Disk Encryption, GPO, GPOs, group policy, Group Policy Management Console, Group Policy Objects, Grouppolicy, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: Enable or disable BitLocker Drive Encryption on Windows
Next Post: Fix no BitLocker Recovery tab in Active Directory

Related Posts

  • SSL on WAMPServer
    Setup VirtualHost with SSL on WAMP Server Linux
  • Trellix Native Encryption
    Manage BitLocker and FileVault with Trellix Native Encryption Mac
  • Microsoft LAPS
    Configure Windows LAPS Management with Microsoft Intune AWS/Azure/OpenShift
  • Razer
    Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment
  • banner
    What is Phishing Resistant Multi-Factor Authentication? Security | Vulnerability Scans and Assessment
  • Protech Synology NAS
    Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews

More Related Articles

SSL on WAMPServer Setup VirtualHost with SSL on WAMP Server Linux
Trellix Native Encryption Manage BitLocker and FileVault with Trellix Native Encryption Mac
Microsoft LAPS Configure Windows LAPS Management with Microsoft Intune AWS/Azure/OpenShift
Razer Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment
banner What is Phishing Resistant Multi-Factor Authentication? Security | Vulnerability Scans and Assessment
Protech Synology NAS Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Create your own Network on AWS from Scratch
    VPC, Subnet, NACL, Security Group: Create your own Network on AWS from Scratch [Part 2] AWS/Azure/OpenShift
  • feature image
    How to Configure Advanced PAM in Linux Linux
  • ad lds 832x400 1
    Active Directory Lightweight Directory Services [AD LDS] Windows Server
  • Hub Transport 1
    Hub Transport Server: Resolving ‘Failed to Reach Running Status’ Network | Monitoring
  • Reverse Image Search
    How to Perform a Reverse Image Search on Your Browsers Network | Monitoring
  • Featured image batch file.
    Retrieve Recent Windows Update: How to create batch script files Scripts
  • WPScan Banner
    How to scan WordPress Websites With WPScan For Security Vulnerabilities Security | Vulnerability Scans and Assessment
  • multcloud
    Best Way to Backup Dropbox to Box JIRA|Confluence|Apps

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,831 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.