Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » How to Enable BitLocker without Compatible TPM
  • article 1280x720.78eff5c4
    How to reset your built-in Local Administrator password in Windows 10 Windows Server
  • image 64
    Windows Local Account Authorization and Access Control Windows
  • Install Packages to Amazon Virtual Machine Using Terraform
    How to Install Packages to Amazon VM using Terraform AWS/Azure/OpenShift
  • App Locker
    Harden your Veeam Backup Server with Microsoft AppLocker Windows
  • rrd
    How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
  • image 25
    ESXI 6.7 ALARM: Seat disk exhaustion on 10 Virtualization
  • MSIEXEC returned 1602
    Fix MSIEXEC returned 1602: Trellix Setup cannot use this account Windows Server
  • feature image mongo
    How to Install MongoDB on a Linux System Linux

How to Enable BitLocker without Compatible TPM

Posted on 30/12/202024/10/2024 Christian By Christian No Comments on How to Enable BitLocker without Compatible TPM

Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software attack tool against it or by transferring the computer’s hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. In this article, you will learn How to Enable BitLocker without Compatible TPM. Please see how to stay protected on Windows 10 and 11 device with Windows Security, and how to fix unable to find compatible TPM.

BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. Since I have tested an FDE solution with PBA, kindly take a look at how to download and install DriveLock.

BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC). Let’s walk through a few simple steps on how to Enable BitLocker without Compatible TPM via the Group Policy.

Please see “Insight on Full Disk Encryption with PBA / without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption“.

Enable BitLocker without Compatible TPM

It can also be configured through Group Policy settings. This is particularly useful for organizations that have a compliance mandate to enable BitLocker encryption for all endpoint devices.

You can also use MBAM (Microsoft Bitlocker Administration and Monitoring), SCCM (Microsoft System Center Configuration Manager), or Intune to roll out Bitlocker to your users.

See the following guide on how to enable FileVault disk encryption on a Mac device and BitLocker Drive Encryption architecture and implementation scenarios.

BitLocker with Active Directory Relationship

BitLocker integrates with AD DS to provide centralized key management. By default, no recovery information is backed up to Active Directory (AD).

Administrators can configure the following Group Policy setting for each drive type to enable backup of BitLocker recovery information.

By default, only Domain Admins have access to BitLocker recovery information, but access can be delegated to others. The following recovery data is saved for each computer object:

  • Recovery Password: A 48-digit recovery password used to recover a BitLocker-protected volume. Users enter this password to unlock a volume when BitLocker enters recovery mode.
  • Key Package Data: With this key package and the recovery password, you will be able to decrypt portions of a BitLocker-protected volume if the disk is severely damaged. Each key package will only work with the volume it was created on, which can be identified by the corresponding volume ID.

Part A: Enable BitLocker via the Local Group Policy Editor

To get started, launch the Local Group Policy Editor as shown below. 

Note: You can also search for “gpedit.msc” from the Windows search box

This will open up the Local Group Policy Editor and please navigate through as shown below.

Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives

In the right pane, double-click Require additional authentication at startup. A pop-up box will open.

Make sure the Enabled option is selected for all of the other options listed below to be active. 

For more on this, see this guide “how to fix your device cannot use a Trusted Platform Module: Allow BitLocker without a compatible TPM”.

Note: If you do NOT want to configure BitLocker to support devices without TPM, you can clear the "Allow BitLocker without a compatible TPM" check box.
Enable BitLocker without Compatible TPM
  • For the “Configure TPM start:” option, select “Allow TPM”.
  • For the option “Configure TPM system start PIN:” select “Start PIN required for TPM”.
  • For the “Configure TPM startup key:” option, select “Allow startup key with TPM”.
  • For the “Configure TPM startup key and PIN:” option, select “Allow startup key for TPM”.
  • Click the Apply button, then click the OK button to save the changes in the Local Group Policy Editor. For more information on Group Policy, please see the following guide on what a Group Policy Object.

As you can see below, the Settings have been configured.

Create a BitLocker PIN via the Command Line

Launch the CMD with administrator rights and perform the following below. Enter the command below.

manage-bde -protectors -add c: -TPMAndPIN

You will be prompted to enter the PIN. 
– Enter a number between four and seven digits. The cursor does not register the keystrokes when you enter the number.
– Press Enter to save the PIN and you will be asked to re-enter the PIN to confirm. 
– Press Enter again to save the PIN verification.
– Next, enter the command to view the status of the Bitlocker Data Encryption. The BitLocker Drive Encryption Status shows the “Key Protectors:” as “Numeric Password”, “TPM and PIN”.

manage-bde -status

Note: Every time the user boots the system, a BitLocker pre-boot security prompt is displayed, requiring the PIN to be entered before access to the operating system is granted. See these guides for more information on how to enable or disable BitLocker on Windows 10 or this link.

Part B – Link BitLocker via Group Policy

We will start by opening Server Manager, click on Tools, followed by Group Policy Management as shown below.

This will open up the Group Policy Management Console as shown below.

Create a Group Policy Object for BitLocker without Compatible TPM

Select the Group Policy Objects folder within the domain. Right-click and select new to create a new group policy object (GPO).

From the New GPO dialog box, I will enter my desired name “TechDirectA BitLocker GPO”. You can use any name of your choice.

The GPO has been created. We will have to right-click it and select Edit.

This will open the Group Policy Management Editor (GPME). From within GPME navigate the path below. We can set policy for some global BitLocker items, as well as the specific policy that applies to the operating system drive, fixed data drives, or removable data drives.

Enable the Group Policy Settings for BitLocker without Compatible TPM

The BitLocker Drive Encryption folder contains ten configurable settings, as well as three subfolders, each of which contains additional settings. You can see the primary collection of settings as shown below.

Computer Configuration\Policies\Administrative Templates\Windows Components\BitLocker Drive Encryption

Enable the following Options: Choose drive encryption method and cipher strength (Windows 10 Version 1511 and later)

  • Choose the drive encryption method and cipher strength (Server 2012, Win 8.1, etc…)
  • Choose how users can recover BitLocker-protected drives
  • Store BitLocker recovery information in Active Directory Domain Services
Screenshot 2020 12 30 at 17.56.19
Screenshot 2020 12 30 at 17.58.41

As you can see below, the needed Policies have been enabled.

Next, navigate down the folder into Operating System Drives and enable the following: Choose how BitLocker protected operating system drives can be recovered and enable it.

Screenshot 2020 12 30 at 17.48.39
Screenshot 2020 12 30 at 17.49.15

As we can see below the Policy has been enabled

This is not an exhaustive list, for a comprehensive list of BitLocker Group Policy settings. Next, We will have to target the GPO to our domain. You can tie this to specific OUs’ if you want.

This will start the BitLocker process to encrypt automatically. To link the GPO, right-click on your Domain and select “Link an existing GPO”. Select the GPO object in the list of GPOs and click on OK.

Screenshot 2020 12 30 at 18.17.16
Screenshot 2020 12 30 at 18.17.33

As you can see, The GPO has been linked to our Domain.

In order to make or roll out BitLocker through a Group Policy that you should run a ‘gpupdate’ on the system. For more information on Group Policy, please see the following guide on GPUpdate Switches: GPUpdate vs GPUpdate force.

Part C- Backup existing BitLocker recovery keys to AD

IDo you have already enabled BitLocker but now want to store the recovery keys in Active Directory. With the configured GPO policies above, this will allow Windows to write the recovery key to AD.

We need to use the manage-bde utility, which is a command-based utility that can be used to configure BitLocker. For more information, see the following how to backup BitLocker to AD.

I hope you found this blog post helpful. You have learned how to Enable BitLocker without Compatible TPM via the Group Policy. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Encryption, encrytp, FDE, File and Folder Encryption Software, Full Disk Encryption, GPO, GPOs, group policy, Group Policy Management Console, Group Policy Objects, Grouppolicy, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: Enable or disable BitLocker Drive Encryption on Windows
Next Post: Fix no BitLocker Recovery tab in Active Directory

Related Posts

  • Disable Open File Security Warnings on Windows
    How to Disable Open File Security Warnings on Windows Security | Vulnerability Scans and Assessment
  • Protech Synology NAS
    Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
  • images
    How to perform vulnerability scan on Microsoft SQL Server Security | Vulnerability Scans and Assessment
  • Trellix ePO Repair and reinstall
    Fix Trellix ePO DAT and Engine Packages missing Security | Vulnerability Scans and Assessment
  • Trellix configurations after ePo setup
    ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment
  • Uninstall MicrosoftDefenderUpdate
    What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment

More Related Articles

Disable Open File Security Warnings on Windows How to Disable Open File Security Warnings on Windows Security | Vulnerability Scans and Assessment
Protech Synology NAS Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
images How to perform vulnerability scan on Microsoft SQL Server Security | Vulnerability Scans and Assessment
Trellix ePO Repair and reinstall Fix Trellix ePO DAT and Engine Packages missing Security | Vulnerability Scans and Assessment
Trellix configurations after ePo setup ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment
Uninstall MicrosoftDefenderUpdate What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • article 1280x720.78eff5c4
    How to reset your built-in Local Administrator password in Windows 10 Windows Server
  • image 64
    Windows Local Account Authorization and Access Control Windows
  • Install Packages to Amazon Virtual Machine Using Terraform
    How to Install Packages to Amazon VM using Terraform AWS/Azure/OpenShift
  • App Locker
    Harden your Veeam Backup Server with Microsoft AppLocker Windows
  • rrd
    How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
  • image 25
    ESXI 6.7 ALARM: Seat disk exhaustion on 10 Virtualization
  • MSIEXEC returned 1602
    Fix MSIEXEC returned 1602: Trellix Setup cannot use this account Windows Server
  • feature image mongo
    How to Install MongoDB on a Linux System Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.