Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Posted on 27/04/202205/11/2024 IT Expert By IT Expert No Comments on Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?
Screenshot-2022-04-27-at-02.18.50

Once a drive is encrypted by BitLocker, it can only be unlocked or decrypted with a Bitlocker password or the Bitlocker Recovery Key. And anyone without proper authentication will be denied access even if the computer has been stolen or the hard disk is taken. In this article, you will learn Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices. Please see how to uninstall your current version of MBAM and run setup again.

BitLocker uses Advanced Encryption Standard (AES) encryption algorithm with 128-bit or 256-bit keys for encrypting data in the entire drive or only used space of the drive.

We employ Group Policy Object to enforce BitLocker drive encryption on client computers in an enterprise environment. Here are some related guides: How to fix the MBAM Client Deployment is only supported on MBAM 2.5 SP1. See how to remove RDS Client Access Licenses from RDS Server.

When would you encounter this issue?

  • By default, if you do not specify a different encryption method other than AES-128-bit. BitLocker will use the default encryption method (AES 128-bit). You will find more information in this Deploy management agent guide.
  • If you disable or don’t configure these settings, BitLocker will use the default encryption method (AES 128-bit).
  • You have already enabled BitLocker to protect my personal device and now there is an organization-wide policy to protect devices with MBAM to ensure compliance by all devices.

MBAM doesn’t re-encrypt drives that are already protected with BitLocker Drive Encryption. If you deploy a BitLocker management policy that doesn’t match the drive’s current protection, it reports as non-compliant. The drive is still protected.

For example, you have used BitLocker to encrypt the drive with AES-XTS 128 encryption algorithm, but the MBAM or the Configuration Manager policy requires AES-XTS 256. The drive is non-compliant with the policy, even though the drive is encrypted. Therefore, if a different encryption algorithm is not used, MBAM will not automatically re-encrypt the device.

Kindly refer to these related guides: How to unlock a fixed drive protected by BitLocker. How to deploy Microsoft BitLocker Administration and Monitoring Tool, and how to correctly disable Microsoft BitLocker Administration and Monitoring encrypted devices,

Resolution to MBAM not automatically re-encrypt Bitlocker-protected devices?

To work around this issue, you will need to first disable BitLocker on the device. Then deploy a new policy with the new settings that will apply the AES-XTS 256 encryption algorithm.

MBAM or the Configuration Manager is capable of taking over a BitLocker-protected device if it is automatically encrypted with the same encryption key (encryption algorithm).

Please see, Deploy a Static Website to Azure Storage from VSCode, how to Get your free Microsoft 365 E5 Sandbox today, and Microsoft Desktop Optimization Pack [MDOP] at a glance (AGPM, MBAM, App-V, DaRT, MED-V, and UE-V).

MBAM Drawback

The following are the things MBAM cannot do. You may want to see this guide for what MBAM cannot do such as “Effect of renaming an MBAM or BitLocker protected Computer“. The following are the things MBAM cannot do.

  • Decrypt systems and re-encrypt with the right algorithms. We have already seen this multiple times.
  • Automatically update a device that is renamed to a new name.
  • Force users to change the PIN in XX number of days.
  • Force a change to the recovery key in an xx number of days etc.”

FAQs on MBAM/BitLocker Protection on Windows

How do TPM, Secure Boot, and Kernel DMA Protection work together to secure BitLocker keys and defend against startup and runtime attacks on Windows devices?

TPM stores Bitlocker keys and other secrets and key material while Secure Boot verifies signatures on boot software (UEFI firmware, EFI applications and the OS itself)
to ensure that they haven’t been subverted by a root kit.
– Boot Direct Memory Access (DMA) protection is part of Kernel DMA Protection which protects Bitlocker keys and other secrets stored in memory while the OS is running. Starting with Windows 10 version 1803, Intel-based devices have kernel protection against Boot DMA attacks via Thunderbolt3 ports enabled by default.
– During the boot process. We rely on security features implemented as part of the device hardware and firmware, TPM and Secure Boot. Newer devices have TPM and Secure Boot to mitigate any form of startup attack.

What are the three possible methods for implementing BitLocker

– Pre-boot Authentication
– Authentication after the user is unlocked
– BitLocker activation without a PIN (Password).

The Pre-boot Authentication” and “Authentication after the user is unlocked” can result in inconveniences. Users can forget their PIN or lose their startup key and will be denied access to their data. Until they are able to contact the support team to obtain a recovery key.

BitLocker PBA is good against memory attacks. This is because it stores the encryption keys in memory only after pre-boot authentication is completed. PBA is designed to prevent the encryption keys from being loaded to system memory. Without the trusted user supplying another authentication factor such as a PIN or a startup key.

I hope you found this blog post on “Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?” helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Bitlocker, Enable BitLocker, Encryption, encrytp, Full Disk Encryption, Microsoft BitLocker Administration and Monitoring, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: How to create a BitLocker System Partition [Part 2]
Next Post: ​​​​​Install HTML Web Client for Microsoft RDS

Related Posts

  • uninstall installed Windows Update from Windows
    How to uninstall installed Windows Update Windows
  • Windows 11 New Security Features
    Smart App Control: Enabling Phishing Protection in Windows 11 Windows
  • 1 WeXxkEX0JG3oB781HD8Hrg 1
    Command Prompt in Windows: Creating Volumes Guide Windows
  • Fix Operating System Loader Failed Signature Verification
    Fix Operating System Loader failed signature verification” on Dell Safe BIOS Systems via PXE [Part 3] Windows
  • Uninstall SQL Server 2025
    Uninstall Microsoft SQL Server 2025 from Windows Oracle/MSSQL/MySQL
  • Block ZIPRAR Attachments in Outlook 2016 – 2007
    How to Block ZIP/RAR Attachments in Outlook Windows

More Related Articles

uninstall installed Windows Update from Windows How to uninstall installed Windows Update Windows
Windows 11 New Security Features Smart App Control: Enabling Phishing Protection in Windows 11 Windows
1 WeXxkEX0JG3oB781HD8Hrg 1 Command Prompt in Windows: Creating Volumes Guide Windows
Fix Operating System Loader Failed Signature Verification Fix Operating System Loader failed signature verification” on Dell Safe BIOS Systems via PXE [Part 3] Windows
Uninstall SQL Server 2025 Uninstall Microsoft SQL Server 2025 from Windows Oracle/MSSQL/MySQL
Block ZIPRAR Attachments in Outlook 2016 – 2007 How to Block ZIP/RAR Attachments in Outlook Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Screenshot 2022 04 02 at 23.08.25
    How to stop Docker from automatically starting on Mac Mac
  • image 77
    How to use the DigiCert certificate utility for Windows to create a CSR Windows
  • Webp.net resizeimage 3 1
    How To Configure VM Update Management on Azure Stack Hub AWS/Azure/OpenShift
  • BitLocker selfservice or helpdesk recovery
    Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk Windows Server
  • filezilla 1
    Connect to a FileZilla Server: How to install and configure a FileZilla Server on Windows Windows Server
  • PXE E18 Server response timeout
    Stuck at Start PXE over IPv4: PXE-E18 Server response timeout Windows
  • Repository Path In Veeam Scale Out Backup Repository
    Fix broken Repository Path in Veeam Scale-Out Backup Repository Backup
  • ansible logo600 591x296 1 1
    Ansible error: Server unreachable, ssl: auth method ssl requires a password Configuration Management Tool

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,803 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.