How to Enable a Pre-Boot BitLocker PIN on Windows

This guide will walk you through the detailed steps to enable a Pre-Boot PIN for your BitLocker-encrypted Windows system drive. Kindly see How and where to find your BitLocker recovery key on Windows, and Enable BitLocker AES-XTX 256 Encryption. Enhancing the security of your Windows system drive is crucial to protect your data. Also, see When Should I Use TPM or TPM + PIN.
BitLocker encryption is a powerful tool to achieve this and adding a Pre-Boot Personal Identification Number (PIN) provides an extra layer of security. This PIN is separate from your login PIN, which is entered after Windows boots up.
This feature prevents the encryption key from automatically loading into system memory during boot, safeguarding against certain attacks.
Here is a guide on the Concept of DriveLock with a focus on Encryption. Learn How to Change BitLocker Password in Windows, and UEFI, TPM, BitLocker FAQs: Disable Sleep Mode.
Prerequisites and Compatibility:
- BitLocker encryption with a Pre-Boot PIN is available on Windows Professional and Enterprise editions. See Upgrade Windows 11 Pro to Enterprise and vice Versa.
- Modern computers typically have Trusted Platform Modules (TPMs) required for BitLocker, but if your computer lacks a TPM, you will need to use a startup password instead. See Enable TPM: Determine if TPM is present.
- Home versions of Windows do not support BitLocker. Device Encryption, available on some Home versions, functions differently and does not allow the use of a startup key.
Enabling a Pre-Boot BitLocker PIN on Windows
Before configuring a Pre-Boot PIN, ensure you have BitLocker enabled for your system drive. If prompted to create a startup password, this step is only necessary when enabling BitLocker on computers with TPMs.
See Enable BitLocker without Compatible TPM, How to sync your passwords across iOS and Mac devices, and how to sync your passwords across iOS and Mac devices.
Configuring Group Policy for a Pre-Boot PIN:
Press Win + R, type “gpedit.msc” into the Run dialog, and press Enter.

Navigate to the following path:
Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives
Double-click the “Require Additional Authentication at Startup” option.

Select “Enabled” and configure the “Configure TPM Startup PIN” option to “Require Startup PIN With TPM.” Click “OK” to save changes.

To ensure your modifications are applied, launch the command prompt with administrator privileges and run the following command: “gpupdate.” Wait until your computer successfully applies the group policy update, or you can opt to restart your system instead.

Adding a Pre-Boot PIN to Your Drive:
Launch Command Prompt as Administrator. Please see How to Block ZIP/RAR Attachments in Outlook 2016 – 2007

Run the following command, replacing “c:” with the appropriate drive letter if necessary:
manage-bde -protectors -add c: -TPMAndPIN

To verify its successful completion, run the status command:
manage-bde -status c:

You’ll be prompted to enter your PIN, which will be required during boot.
Changing Your BitLocker PIN:
To change your PIN in the future, run the following command as Administrator in Command Prompt:
manage-bde -changepin c:

Removing the PIN Requirement:
Change the Group Policy setting back to “Allow Startup PIN With TPM.” Open Command Prompt as Administrator and run:
manage-bde -protectors -add c: -TPM

This will replace the “TPMAndPIN” requirement with “TPM” and remove the PIN requirement.
To verify its successful completion, run the status command once more:
manage-bde -status c:

Conclusion
By following this comprehensive guide, you can enhance the security of your BitLocker-encrypted Windows system drive with a Pre-Boot PIN and manage it effectively. Ensure you follow the steps carefully and understand the implications of these security measures.
Please see “Create Task Manager Shortcuts: How to add access, pin the Task Manager on Windows 11“, and how to fix DISM “Failed to open image” CWimImageInfo Mount(hr:0x8007000d): Fix Error DISM WIM Provider.
FAQs
No, a Pre-Boot PIN is not mandatory for all BitLocker-encrypted drives. It is an optional security feature that adds an extra layer of protection by preventing the automatic loading of the encryption key during boot. You can choose to enable or disable it based on your security requirements.
If you forget your Pre-Boot PIN, you will need to provide the BitLocker recovery code that you should have saved when you initially enabled BitLocker for your system drive. It’s essential to keep this recovery code in a safe place because it is your last resort to regain access to your encrypted drive in case of forgotten PINs or other issues.
This issue could be a result of external factors and not MBAM itself. Oftentimes, BitLocker(MBAM) will monitor for system configuration changes. Therefore, when it detects a new device in the boot list or an attached external storage device (USB etc.), this behavior (recovery window) could be prompted.
In theory, here are some possibilities that could also cause this issue.
– BIOS-related change or upgrade.
– Changes in the Platform Configuration Registers (PCRs) used by the TPM validation profile
– Failing the TPM self-test
– Attempting to change the boot order during the boot process with any of the hotkeys on the keyboard.
– A depleted battery could also prompt the recovery mode and also prevent BitLocker(MBAM) from encrypting the drive.
In order to determine the root cuse of this issue, kindly check the MBAM Client event logs? This is located in Event Viewer – Applications and Services Logs – Microsoft – Windows – MBAM – Operational path.
I hope you found this article useful on how to Enable a Pre-Boot BitLocker PIN on Windows. Please feel free to leave a comment below.