Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows » Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device
  • tmutil localsnapshot
    Fix what is taking up my Mac Storage? Delete Snapshots Network | Monitoring
  • The Port used for the Virtualhost is not an Apache Listen Port
    Fix the Port used for the Virtualhost is not an Apache Listen Port Web Server
  • zabbix
    Monitoring services using Zabbix Linux
  • Create a self signed cert via IIS
    How to create a self-signed cert via IIS Windows
  • Object First OOTBI Appliance Configuration
    How to Configure Object First OOTBI Appliance Backup
  • chrome feature image light blue
    Set Chrome as default: How to set a browser as default on macOS Mac
  • Enale FIPS compliance mode on Windows
    How to enable FIPS mode on Windows Server Oracle/MSSQL/MySQL
  • 7164 1024x575 1
    How to install MDT PowerShell module on Windows Scripts

Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device

Posted on 05/02/202210/11/2023 Christian By Christian No Comments on Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device
Bitllockerextdrives

BitLocker is an encryption feature that can be used to encrypt your hard disk to protect your data against unauthorized access or being stolen. It is a native security feature built into most versions of Windows PCs including Windows 11 Pro, Education, and Enterprise editions, but not available in the Home edition. In this article, you shall learn about “Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device using the manage-bde command”. Please see how to uninstall your current version of MBAM and run setup again, and Microsoft Desktop Optimization Pack [MDOP] at a glance (AGPM, MBAM, App-V, DaRT, MED-V, and UE-V).

Once a drive is encrypted by BitLocker, it can only be unlocked or decrypted with a Bitlocker password or the Bitlocker Recovery Key. And anyone without proper authentication will be denied access even if the computer has been stolen or the hard disk is taken.

It uses Advanced Encryption Standard (AES) encryption algorithm with 128-bit or 256-bit keys for encrypting data in the entire drive or only used space of the drive.

Kindly refer to these related guides: How to unlock a fixed drive protected by BitLocker, how to deploy Microsoft BitLocker Administration and Monitoring Tool, how to correctly disable Microsoft BitLocker Administration and Monitoring encrypted devices.

BitLocker Encryption Options

There are two types of BitLocker encryption options available to you on Windows 11. They are

  • BitLocker Drive Encryption: This encryption method is used to encrypt fixed hard drives (internal hard disk) including operating system drives.
  • BitLocker To Go: This encryption method lets encrypt external drives, such as USB flash drives and external hard drives. You will need to enter the password or recovery key to unlock the device when you connect the drive to a computer.

You may also want to see these guides: How to create MBAM Enterprise and Compliance, and Recovery Audit reports, and how to determine why an MBAM protected device is non-compliant.

Encrypt additional drives on an MBAM-protected device

Before proceeding to discuss how this is done correctly without you having an issue that the drive is not being protected.

I will show you how to encrypt a drive without any password, recovery key, or any other protection. To do this, use this command.

manage-bde -on E:
Capture12-1

As you can see in the image above. The drive has been encrypted and the icon associated with the drive simply means that the drive is encrypted without any password, recovery key, or any other protections.

Note: However, you can also add protections to a drive after you encrypted it. After encryption is completed, you can also add a password, add a smart card, and back up your recovery key in the BitLocker Drive Encryption control panel.

How can we fix this issue?

The easiest way to fix this issue is to ensure that the drive is encrypted with a randomly generated recovery password. The right protection, etc. To do this, we will have to disable encryption on the drive. Kindly use the command below to do this.

manage-bde -off E:

As you can see, decryption is currently in progress.

Capture15-1
Capture16

To turn on encryption and generate a random recovery password

Now that we have decrypted the drive, we will have to encrypt the drive and have it generate a random recovery key. To do this, please use the command below.

manage-bde -on E: -RecoveryPassword
Capture17

Note: The drawback with this method is that they keys are not escrowed to the MBAM database but ONLY to Active Directory.

As you can see from the image below. The Drive has been encrypted and corrected without having an icon associated with it portraying possible non-protection of the drive.

Capture19-1

Note: To turn on encryption, generate recovery password, and save recovery key on another drive, type the following command:

manage-bde -on E: -RecoveryPassword -RecoveryKey C:

To list all key protectors for drive E or C, type the following command

manage-bde -protectors -get C:
manage-bde -protectors -get E:

Manage-bde Protectors to manage drives on Windows device

Below are some of the manage-bde protectors’ parameters. They can be used in managing the protection methods used for the BitLocker encryption key.

manage-bde -protectors [{-get|-add|-delete|-disable|-enable|-adbackup|-aadbackup}] <drive> [-computername <name>] [{-?|/?}] [{-help|-h}]
ParameterDescription
-getDisplays all the key protection methods enabled on the drive and provides their type and identifier (ID).
-addAdds key protection methods as specified by using additional -add parameters.
-deleteDeletes key protection methods used by BitLocker. All key protectors will be removed from a drive unless the optional -delete parameters are used to specify which protectors to delete. When the last protector on a drive is deleted, BitLocker protection of the drive is disabled to ensure that access to data is not lost inadvertently.
-disableDisables protection, which will allow anyone to access encrypted data by making the encryption key available unsecured on drive. No key protectors are removed. Protection will be resumed the next time Windows is booted unless the optional -disable parameters are used to specify the reboot count.
-enableEnables protection by removing the unsecured encryption key from the drive. All configured key protectors on the drive will be enforced.
-adbackupBacks up recovery information for the drive specified to Active Directory Domain Services (AD DS). Append the -id parameter and specify the ID of a specific recovery key to back up. The -id parameter is required.
-aadbackupBacks up all recovery information for the drive specified to Azure Active Directory (Azure AD). Append the -id parameter and specify the ID of a specific recovery key to back up. The -id parameter is required.
<drive>Represents a drive letter followed by a colon.
-computernameSpecifies that manage-bde.exe will be used to modify BitLocker protection on a different computer. You can also use -cn as an abbreviated version of this command.
<name>Represents the name of the computer on which to modify BitLocker protection. Accepted values include the computer’s NetBIOS name and the computer’s IP address.
-? or /?Displays brief help at the command prompt.
-help or -hDisplays complete help at the command prompt.

Additional -add parameters to encrypt additional drives

The -add parameter can also use these valid additional parameters. I have added these parameters to enable you to learn more about this command.

manage-bde -protectors -add [<drive>] [-forceupgrade] [-recoverypassword <numericalpassword>] [-recoverykey <pathtoexternalkeydirectory>]
[-startupkey <pathtoexternalkeydirectory>] [-certificate {-cf <pathtocertificatefile>|-ct <certificatethumbprint>}] [-tpm] [-tpmandpin]
[-tpmandstartupkey <pathtoexternalkeydirectory>] [-tpmandpinandstartupkey <pathtoexternalkeydirectory>] [-password][-adaccountorgroup <securityidentifier> [-computername <name>]
[{-?|/?}] [{-help|-h}]
ParameterDescription
<drive>Represents a drive letter followed by a colon.
-recoverypasswordAdds a numerical password protector. You can also use -rp as an abbreviated version of this command.
<numericalpassword>Represents the recovery password.
-recoverykeyAdds an external key protector for recovery. You can also use -rk as an abbreviated version of this command.
<pathtoexternalkeydirectory>Represents the directory path to the recovery key.
-startupkeyAdds an external key protector for startup. You can also use -sk as an abbreviated version of this command.
<pathtoexternalkeydirectory>Represents the directory path to the startup key.
-certificateAdds a public key protector for a data drive. You can also use -cert as an abbreviated version of this command.
-cfSpecifies that a certificate file will be used to provide the public key certificate.
<pathtocertificatefile>Represents the directory path to the certificate file.
-ctSpecifies that a certificate thumbprint will be used to identify the public key certificate
<certificatethumbprint>Specifies the value of the thumbprint property of the certificate you want to use. For example, a certificate thumbprint value of a9 09 50 2d d8 2a e4 14 33 e6 f8 38 86 b0 0d 42 77 a3 2a 7b should be specified as a909502dd82ae41433e6f83886b00d4277a32a7b.
-tpmandpinAdds a Trusted Platform Module (TPM) and personal identification number (PIN) protector for the operating system drive. You can also use -tp as an abbreviated version of this command.
-tpmandstartupkeyAdds a TPM and startup key protector for the operating system drive. You can also use -tsk as an abbreviated version of this command.
-tpmandpinandstartupkeyAdds a TPM, PIN, and startup key protector for the operating system drive. You can also use -tpsk as an abbreviated version of this command.
-passwordAdds a password key protector for the data drive. You can also use -pw as an abbreviated version of this command.
-adaccountorgroupAdds a security identifier(SID)-based identity protector for the volume. You can also use -sid as an abbreviated version of this command. IMPORTANT: By default, you can’t add an ADaccountorgroup protector remotely using either WMI or manage-bde. If your deployment requires the ability to add this protector remotely, you must enable constrained delegation.
-computernameSpecifies that manage-bde is being used to modify BitLocker protection on a different computer. You can also use -cn as an abbreviated version of this command.
<name>Represents the name of the computer on which to modify BitLocker protection. Accepted values include the computer’s NetBIOS name and the computer’s IP address.
-? or /?Displays brief help at the command prompt.
-help or -hDisplays complete help at the command prompt.

I highly recommend you to take a look at these guides: Disable BitLocker (MBAM): How to correctly disable Microsoft BitLocker Administration and Monitoring encrypted devices, and how to deploy Microsoft BitLocker Administration and Monitoring Tool.

I hope you found this blog post on “Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device using the manage-bde command” helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Bitlocker, BitLocker Recovery Keys, MBAM, Microsoft BitLocker Administration and Monitoring, Microsoft Windows, recovery, Windows 10, Windows 11

Post navigation

Previous Post: How to unlock a fixed drive protected by BitLocker
Next Post: Enable Virtualization in BIOS: Determine if the Intel VT-x or AMD-V Virtualization Technology is enabled in BIOS

Related Posts

  • TamperProtection
    Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
  • Feature image registry editing
    How to Disable and Enable Registry Access on Windows 11 Windows
  • ADO Self hosted agent
    How to Create Self-Hosted Agent for Azure DevOps Pipelines Automation
  • Copilot Microsoft
    How to Disable Copilot in Windows and Microsoft Edge Windows
  • f97cd picture1 128
    How to disable Windows Hardware Power Button Windows
  • RDS Collection 1
    How to add and remove RDS Collection Windows

More Related Articles

TamperProtection Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
Feature image registry editing How to Disable and Enable Registry Access on Windows 11 Windows
ADO Self hosted agent How to Create Self-Hosted Agent for Azure DevOps Pipelines Automation
Copilot Microsoft How to Disable Copilot in Windows and Microsoft Edge Windows
f97cd picture1 128 How to disable Windows Hardware Power Button Windows
RDS Collection 1 How to add and remove RDS Collection Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • tmutil localsnapshot
    Fix what is taking up my Mac Storage? Delete Snapshots Network | Monitoring
  • The Port used for the Virtualhost is not an Apache Listen Port
    Fix the Port used for the Virtualhost is not an Apache Listen Port Web Server
  • zabbix
    Monitoring services using Zabbix Linux
  • Create a self signed cert via IIS
    How to create a self-signed cert via IIS Windows
  • Object First OOTBI Appliance Configuration
    How to Configure Object First OOTBI Appliance Backup
  • chrome feature image light blue
    Set Chrome as default: How to set a browser as default on macOS Mac
  • Enale FIPS compliance mode on Windows
    How to enable FIPS mode on Windows Server Oracle/MSSQL/MySQL
  • 7164 1024x575 1
    How to install MDT PowerShell module on Windows Scripts

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.