Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows » Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Posted on 27/04/202205/11/2024 Christian By Christian No Comments on Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?
Screenshot-2022-04-27-at-02.18.50

Once a drive is encrypted by BitLocker, it can only be unlocked or decrypted with a Bitlocker password or the Bitlocker Recovery Key. And anyone without proper authentication will be denied access even if the computer has been stolen or the hard disk is taken. In this article, you will learn Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices. Please see how to uninstall your current version of MBAM and run setup again.

BitLocker uses Advanced Encryption Standard (AES) encryption algorithm with 128-bit or 256-bit keys for encrypting data in the entire drive or only used space of the drive.

We employ Group Policy Object to enforce BitLocker drive encryption on client computers in an enterprise environment. Here are some related guides: How to fix the MBAM Client Deployment is only supported on MBAM 2.5 SP1. See how to remove RDS Client Access Licenses from RDS Server.

When would you encounter this issue?

  • By default, if you do not specify a different encryption method other than AES-128-bit. BitLocker will use the default encryption method (AES 128-bit). You will find more information in this Deploy management agent guide.
  • If you disable or don’t configure these settings, BitLocker will use the default encryption method (AES 128-bit).
  • You have already enabled BitLocker to protect my personal device and now there is an organization-wide policy to protect devices with MBAM to ensure compliance by all devices.

MBAM doesn’t re-encrypt drives that are already protected with BitLocker Drive Encryption. If you deploy a BitLocker management policy that doesn’t match the drive’s current protection, it reports as non-compliant. The drive is still protected.

For example, you have used BitLocker to encrypt the drive with AES-XTS 128 encryption algorithm, but the MBAM or the Configuration Manager policy requires AES-XTS 256. The drive is non-compliant with the policy, even though the drive is encrypted. Therefore, if a different encryption algorithm is not used, MBAM will not automatically re-encrypt the device.

Kindly refer to these related guides: How to unlock a fixed drive protected by BitLocker. How to deploy Microsoft BitLocker Administration and Monitoring Tool, and how to correctly disable Microsoft BitLocker Administration and Monitoring encrypted devices,

Resolution to MBAM not automatically re-encrypt Bitlocker-protected devices?

To work around this issue, you will need to first disable BitLocker on the device. Then deploy a new policy with the new settings that will apply the AES-XTS 256 encryption algorithm.

MBAM or the Configuration Manager is capable of taking over a BitLocker-protected device if it is automatically encrypted with the same encryption key (encryption algorithm).

Please see, Deploy a Static Website to Azure Storage from VSCode, how to Get your free Microsoft 365 E5 Sandbox today, and Microsoft Desktop Optimization Pack [MDOP] at a glance (AGPM, MBAM, App-V, DaRT, MED-V, and UE-V).

MBAM Drawback

The following are the things MBAM cannot do. You may want to see this guide for what MBAM cannot do such as “Effect of renaming an MBAM or BitLocker protected Computer“. The following are the things MBAM cannot do.

  • Decrypt systems and re-encrypt with the right algorithms. We have already seen this multiple times.
  • Automatically update a device that is renamed to a new name.
  • Force users to change the PIN in XX number of days.
  • Force a change to the recovery key in an xx number of days etc.”

FAQs on MBAM/BitLocker Protection on Windows

How do TPM, Secure Boot, and Kernel DMA Protection work together to secure BitLocker keys and defend against startup and runtime attacks on Windows devices?

TPM stores Bitlocker keys and other secrets and key material while Secure Boot verifies signatures on boot software (UEFI firmware, EFI applications and the OS itself)
to ensure that they haven’t been subverted by a root kit.
– Boot Direct Memory Access (DMA) protection is part of Kernel DMA Protection which protects Bitlocker keys and other secrets stored in memory while the OS is running. Starting with Windows 10 version 1803, Intel-based devices have kernel protection against Boot DMA attacks via Thunderbolt3 ports enabled by default.
– During the boot process. We rely on security features implemented as part of the device hardware and firmware, TPM and Secure Boot. Newer devices have TPM and Secure Boot to mitigate any form of startup attack.

What are the three possible methods for implementing BitLocker

– Pre-boot Authentication
– Authentication after the user is unlocked
– BitLocker activation without a PIN (Password).

The Pre-boot Authentication” and “Authentication after the user is unlocked” can result in inconveniences. Users can forget their PIN or lose their startup key and will be denied access to their data. Until they are able to contact the support team to obtain a recovery key.

BitLocker PBA is good against memory attacks. This is because it stores the encryption keys in memory only after pre-boot authentication is completed. PBA is designed to prevent the encryption keys from being loaded to system memory. Without the trusted user supplying another authentication factor such as a PIN or a startup key.

I hope you found this blog post on “Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?” helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Bitlocker, Enable BitLocker, Encryption, encrytp, Full Disk Encryption, Microsoft BitLocker Administration and Monitoring, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: How to create a BitLocker System Partition [Part 2]
Next Post: ​​​​​Install HTML Web Client for Microsoft RDS

Related Posts

  • How to Install RSAT on Windows 11
    How to Install and Uninstall RSAT on Windows 11 Windows
  • Determine GPO from GUID or Name
    How to determine GPO from GUID or Name Windows
  • Using the Command Prompt to add and modify the Windows registry
    How to add and modify the Windows Registry from the Command Prompt Windows
  • ETWindows
    An Overview of Event Tracing for Windows Windows
  • How to Fix Scanning and Repairing Drive on Every Boot
    How to Fix Scanning and Repairing Drive on Every Boot Windows
  • BitLocker Loop fix
    Bypassing BitLocker Loop by Unlocking or Disabling or PC Reset Windows

More Related Articles

How to Install RSAT on Windows 11 How to Install and Uninstall RSAT on Windows 11 Windows
Determine GPO from GUID or Name How to determine GPO from GUID or Name Windows
Using the Command Prompt to add and modify the Windows registry How to add and modify the Windows Registry from the Command Prompt Windows
ETWindows An Overview of Event Tracing for Windows Windows
How to Fix Scanning and Repairing Drive on Every Boot How to Fix Scanning and Repairing Drive on Every Boot Windows
BitLocker Loop fix Bypassing BitLocker Loop by Unlocking or Disabling or PC Reset Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Exchange password
    How to block the Change Password Feature for All Users via the Exchange Administrative Center Network | Monitoring
  • screenshot 2020 02 13 at 22.47.41
    Active Directory Flexible Single-Master Operations Roles [FSMO] Windows Server
  • Feature image Wakeonlan
    How to download and use the NirSorf WakeonLan tool Network | Monitoring
  • image 28
    How to monitor your website uptime and status using Uptime Configuration Management Tool
  • How to create an Advanced Windows Scheduled Task Windows Server
  • Screenshot 2022 03 21 at 18.06.30
    How to Configure Virtual Host for Apache HTTP Web Server to Host Several Domains on Ubuntu 20.04 LTS Linux
  • screenshot 2020 03 19 at 19.17.42
    SG300 Firmware Upgrade Copy: Illegal software format Network | Monitoring
  • Create Password Policies via GPO
    How to Create a Password Policy with Group Policy Object Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,821 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.