Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?

Posted on 27/04/202205/11/2024 Christian By Christian No Comments on Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?
Screenshot-2022-04-27-at-02.18.50

Once a drive is encrypted by BitLocker, it can only be unlocked or decrypted with a Bitlocker password or the Bitlocker Recovery Key. And anyone without proper authentication will be denied access even if the computer has been stolen or the hard disk is taken. In this article, you will learn Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices. Please see how to uninstall your current version of MBAM and run setup again.

BitLocker uses Advanced Encryption Standard (AES) encryption algorithm with 128-bit or 256-bit keys for encrypting data in the entire drive or only used space of the drive.

We employ Group Policy Object to enforce BitLocker drive encryption on client computers in an enterprise environment. Here are some related guides: How to fix the MBAM Client Deployment is only supported on MBAM 2.5 SP1. See how to remove RDS Client Access Licenses from RDS Server.

When would you encounter this issue?

  • By default, if you do not specify a different encryption method other than AES-128-bit. BitLocker will use the default encryption method (AES 128-bit). You will find more information in this Deploy management agent guide.
  • If you disable or don’t configure these settings, BitLocker will use the default encryption method (AES 128-bit).
  • You have already enabled BitLocker to protect my personal device and now there is an organization-wide policy to protect devices with MBAM to ensure compliance by all devices.

MBAM doesn’t re-encrypt drives that are already protected with BitLocker Drive Encryption. If you deploy a BitLocker management policy that doesn’t match the drive’s current protection, it reports as non-compliant. The drive is still protected.

For example, you have used BitLocker to encrypt the drive with AES-XTS 128 encryption algorithm, but the MBAM or the Configuration Manager policy requires AES-XTS 256. The drive is non-compliant with the policy, even though the drive is encrypted. Therefore, if a different encryption algorithm is not used, MBAM will not automatically re-encrypt the device.

Kindly refer to these related guides: How to unlock a fixed drive protected by BitLocker. How to deploy Microsoft BitLocker Administration and Monitoring Tool, and how to correctly disable Microsoft BitLocker Administration and Monitoring encrypted devices,

Resolution to MBAM not automatically re-encrypt Bitlocker-protected devices?

To work around this issue, you will need to first disable BitLocker on the device. Then deploy a new policy with the new settings that will apply the AES-XTS 256 encryption algorithm.

MBAM or the Configuration Manager is capable of taking over a BitLocker-protected device if it is automatically encrypted with the same encryption key (encryption algorithm).

Please see, Deploy a Static Website to Azure Storage from VSCode, how to Get your free Microsoft 365 E5 Sandbox today, and Microsoft Desktop Optimization Pack [MDOP] at a glance (AGPM, MBAM, App-V, DaRT, MED-V, and UE-V).

MBAM Drawback

The following are the things MBAM cannot do. You may want to see this guide for what MBAM cannot do such as “Effect of renaming an MBAM or BitLocker protected Computer“. The following are the things MBAM cannot do.

  • Decrypt systems and re-encrypt with the right algorithms. We have already seen this multiple times.
  • Automatically update a device that is renamed to a new name.
  • Force users to change the PIN in XX number of days.
  • Force a change to the recovery key in an xx number of days etc.”

FAQs on MBAM/BitLocker Protection on Windows

How do TPM, Secure Boot, and Kernel DMA Protection work together to secure BitLocker keys and defend against startup and runtime attacks on Windows devices?

TPM stores Bitlocker keys and other secrets and key material while Secure Boot verifies signatures on boot software (UEFI firmware, EFI applications and the OS itself)
to ensure that they haven’t been subverted by a root kit.
– Boot Direct Memory Access (DMA) protection is part of Kernel DMA Protection which protects Bitlocker keys and other secrets stored in memory while the OS is running. Starting with Windows 10 version 1803, Intel-based devices have kernel protection against Boot DMA attacks via Thunderbolt3 ports enabled by default.
– During the boot process. We rely on security features implemented as part of the device hardware and firmware, TPM and Secure Boot. Newer devices have TPM and Secure Boot to mitigate any form of startup attack.

What are the three possible methods for implementing BitLocker

– Pre-boot Authentication
– Authentication after the user is unlocked
– BitLocker activation without a PIN (Password).

The Pre-boot Authentication” and “Authentication after the user is unlocked” can result in inconveniences. Users can forget their PIN or lose their startup key and will be denied access to their data. Until they are able to contact the support team to obtain a recovery key.

BitLocker PBA is good against memory attacks. This is because it stores the encryption keys in memory only after pre-boot authentication is completed. PBA is designed to prevent the encryption keys from being loaded to system memory. Without the trusted user supplying another authentication factor such as a PIN or a startup key.

I hope you found this blog post on “Why does MBAM not automatically re-encrypt MBAM or Bitlocker-protected devices?” helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Bitlocker, Enable BitLocker, Encryption, encrytp, Full Disk Encryption, Microsoft BitLocker Administration and Monitoring, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: How to create a BitLocker System Partition [Part 2]
Next Post: ​​​​​Install HTML Web Client for Microsoft RDS

Related Posts

  • MSDTworkaround
    Microsoft Support Diagnostic Tool Vulnerability Fix Windows
  • screenshot 2020 03 14 at 10.13.38
    How to Hide the Action Center Taskbar Icon In Windows 10 Windows
  • Ping 4
    Perform continuous ping on OSes and network Appliances Mac
  • RDP
    The connection was denied because the user is not authorized for remote Login: Enable Remote Desktop Connection on Windows 11 for non-administrators or selected users Windows
  • win10 usb
    How to prevent installation of removable devices Windows
  • get computer specific model information
    How to get Windows PC specific Model information Windows

More Related Articles

MSDTworkaround Microsoft Support Diagnostic Tool Vulnerability Fix Windows
screenshot 2020 03 14 at 10.13.38 How to Hide the Action Center Taskbar Icon In Windows 10 Windows
Ping 4 Perform continuous ping on OSes and network Appliances Mac
RDP The connection was denied because the user is not authorized for remote Login: Enable Remote Desktop Connection on Windows 11 for non-administrators or selected users Windows
win10 usb How to prevent installation of removable devices Windows
get computer specific model information How to get Windows PC specific Model information Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • screenshot 2020 02 08 at 15.53.31
    Enable Automatic Logon on Windows Windows Server
  • Fix Network related MSSQL instance error
    Fix a network-related or instance-specific error occurred while establishing a connection to SQL Server [Part 2] Oracle/MSSQL/MySQL
  • Rport
    RPORT the free and open source remote management tool Linux
  • Webp.net resizeimage 2
    Add or Remove Network Interface from a VM in Azure AWS/Azure/OpenShift
  • Azure Backup 1
    How to Install Azure Backup Agent AWS/Azure/OpenShift
  • Account restrictions are preventing this user from signing in
    Resolve Account restrictions are preventing this user from signing in: User Account Password has expired Windows
  • Integrate WordTune on Microsft Word
    Integrate WordTune with Microsoft Word on Mac Microsoft Exchange/Office/365
  • SQL Error
    Fix “the server was not found or was not accessible: Verify that the instance name is correct and that SQL Server is configured to allow remote connections” Oracle/MSSQL/MySQL

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,821 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.