Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Query MBAM-protected Client for non-compliance [Part 2]
  • powershell01
    How to create a KDS root key using PowerShell Scripts
  • Convert PEM to PPK 1
    Convert a PEM Key to a PPK Key on a Linux and Windows AWS/Azure/OpenShift
  • dc
    Fix MDT accidental OS deletion Windows Server
  • Cloud Cost
    How to Control Cloud Cost Using Azure VM AWS/Azure/OpenShift
  • User profile in Windows
    How to delete User Profile in Windows Windows
  • Remote Desktop Connection Windows 10 min
    Fix Remote Desktop Connection issues (Error 0x204) Windows
  • appp
    How to automatically reopen Windows Apps and Folders upon Startup Windows
  • MacOS Catalina Desktop
    Mac FileVault Encryption: How to enable FileVault disk encryption Security | Vulnerability Scans and Assessment

Query MBAM-protected Client for non-compliance [Part 2]

Posted on 20/12/202520/12/2025 Christian By Christian No Comments on Query MBAM-protected Client for non-compliance [Part 2]
BitLocked suspended and resumed

IT support teams face numerous BitLocker compliance alerts daily from remote, and home/hybrid deployments. But without remote WMI queries etc., each ticket demands time-consuming VPN/RDP sessions, physical dispatches, or endless “reboot due to upgrades and updates. In this article, we shall discuss how to query MBAM-protected Client for non-compliance [Part 2]. Please, see how to determine why an MBAM-protected device is non-compliant, and SQL Server 2025 Upgrade Requirements and Compatibility.

Windows updates frequently cause TPM/BitLocker protector mismatches according to Microsoft. MBAM dashboards show ‘Unknown’ for 30-50% of remote laptops due to offline agents. WMI queries help reveal true compliance instantly.

Unfortunately, MBAM (Microsoft BitLocker Administration and Monitoring) is currently in extended support until April 14, 2026, after which Microsoft will no longer provide updates or support.

As a result, organizations are encouraged to start planning for a replacement to ensure continued management of BitLocker encryption. Potential alternatives include Microsoft Endpoint Configuration Manager, which can integrate with MBAM features and provide a more streamlined management solution. Please, see “MBAM extended support ends April 2026: Find alternative solution“, I have done a fantastic job on your behalf.

Please, see “Manage TPM Protector: How to encrypt additional drives on an MBAM-protected device, and “how to enable or disable a Remote WMI Connection in Windows“.

Why a Remote MBAM-protected PC is non-compliant

Oftentimes, when you get a support query due to errors that a device is not protected. This means, BitLocker protection is suspended and that the encryption is temporarily paused. This allows access to the drive without requiring authentication, thereby impacting data security.

In theory, “BitLocker protection of C: is stopped” to avoid recovery key prompts. This is an ideal behaviour which means that “BitLocker is protecting the drive”. See the image below and associated icon for more information.

Suspended bitlocker drive

When this is the case, you head over to the MBAM Enterprise Reporting Services to view more details. As you can see, most times, this is not comprehensive enough. If you wish to setup MBAM in your own environment. Please, see Unable to install Microsoft Bitlocker Administration: Uninstall your current version of MBAM and run setup again, and how to deploy MBAM for BitLocker Administration.

Also, see Understanding Microsoft BitLocker Administration and Monitoring Roles, and how to deploy MBAM Client as part of a Windows Deployment.

Complaince status

Because of this, you might want to query the device remotely to get more information.

manage-bde -status -computer testPC1
Query BitLocker

Note: While the drive remains encrypted, the decryption keys are accessible. This means that the system can boot without requiring a PIN or recovery key. This exposes your data to potential unauthorized access until BitLocker is resumed gain. This is why you will have to ensure fast resolution to this concern.

Please, see Query and display Windows information via WMI Explorer, and “Remote WMI Connection: How to enable or disable WMI Traffic Using Firewall UI“.

Inspecting WMI Using PowerShell for Analysis

To be honest, this issue does not require further troubleshooting as it clearly states a reboot is required. Considering the background of this issue which emanated due to upgrade to Windows 11 25H2. It does, there are pending updates and reboot needed for sure.

You can use your preferred method to view WMI, such as Command line or PowerShell to connect remotely to the device.

Get-WmiObject -Class mbam_volume -Namespace root\microsoft\mbam -ComputerName "192.168.1.100"

With credentials, run the following command and do not forget to replace the IP address with your IP address or hostname.

Get-WmiObject -Class mbam_volume -Namespace root\microsoft\mbam -ComputerName "192.168.1.100" -Credential (Get-Credential)

For Physical device you are directly connected to, run the command below.

gwmi -class mbam_volume -Namespace root\microsoft\mbam
Remotely query reason for non-complaince

You can filter for non-complaince only as you wish as shown below

Get-WmiObject -Class mbam_volume -Namespace root\microsoft\mbam -ComputerName "192.168.1.100" | Where-Object {$_.Compliant -ne 1} | Select VolumeName, ReasonsForNoncompliance

Please, see “How to fix importing the project failed: Project namespace path can contain only letters, digits, etc“, and “Windows Management Instrumentation Commands“.

Remote WMI Query Syntax

Use these PowerShell commands to query MBAM compliance remotely without WinRM. Here you can use the PC name or IP Address as you wish.

Get-WmiObject -Class mbam_volume -Namespace root\microsoft\mbam -ComputerName "192.168.1.100" | Select VolumeName, Compliant, ReasonsForNoncompliance

For specific drives, please use the comamnd below. Add -Credential for domain auth; WMI uses DCOM (ports 135 + dynamic).

Get-WmiObject -Class mbam_volume -Namespace root\microsoft\mbam -ComputerName "192.168.1.100" -Credential (Get-Credential) | Where-Object {$_.VolumeName -like "C:*"} | Select ReasonsForNoncompliance

Please, see Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk, and Get MBAM BitLocker Recovery Keys from Microsoft SQL Server.

Table showing reasons for Non-Compliance

You should be able to determine various reasons from your experience with MBAM. This guide shows how to create MBAM Enterprise and Compliance, and Recovery Audit reports.

Non-Compliance CodeReason for Non-Compliance
0Cipher strength, not AES 256.
1MBAM Policy requires this volume to be encrypted but it is not.
2MBAM Policy requires this volume to NOT be encrypted, but it is.
3MBAM Policy requires this volume to use a TPM protector, but it does not.
4MBAM Policy requires this volume to use a TPM+PIN protector, but it does not.
5MBAM Policy does not allow non-TPM machines to report as compliant.
6Volume has a TPM protector but the TPM is not visible (booted with recover key after disabling TPM in BIOS?).
7MBAM Policy requires this volume to use a password protector, but it does not have one.
8MBAM Policy requires this volume NOT to use a password protector, but it has one.
9MBAM Policy requires this volume to use an auto-unlock protector, but it does not have one.
10MBAM Policy requires this volume NOT to use an auto-unlock protector, but it has one.
11Policy conflict detected preventing MBAM from reporting this volume as compliant.
12A system volume is needed to encrypt the OS volume but it is not present.
13Protection is suspended for the volume.
14AutoUnlock is unsafe unless the OS volume is encrypted.
15The policy requires minimum cipher strength is XTS-AES-128 bit, actual cipher strength is weaker than that.
16The policy requires minimum cipher strength is XTS-AES-256 bit, actual cipher strength is weaker than that.

Via CMD to determine why an MBAM-protected device is non-compliant

wmic /namespace:\root\microsoft\mbam path MBAM_Volume where "VolumeName like 'C:%'" get ReasonsForNoncompliance

WMI to determine why an MBAM-protected device is non-compliant

Namespace: root\Microsoft\MBAM
Select ReasonsForNoncompliance from MBAM_Volume where VolumeName like 'C:%'

Determine if a PC need Reboot

The error attached above shows the value of 13 “Protection is suspended for volume”. Suspension allows you to access your data without restrictions. It is crucial to resume protection promptly to maintain security.

So, let us determine if the device truly need to be rebooted.

Please, see Fast Boot Options: Fix specific Drive issue with BitLocker [MBAM], BitLocker Protection off: Update UEFI/BIOS to fix issues, and BitLocker behavior when MBAM agent is removed: No Uninstall Option in Control Panel.

Directly Connected Device (Console/Physical PC)

For console or RDP access, run the command below on a PC you are directly connected to or via RDP. As you can see, there are no pending updates for this PC.

Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending"
Pending updates
Get-ItemProperty “HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending” check for CBS pending reboots

Please, see how to fix VMware and HyperV are not compatible, and “how to configure Windows Deployment Services on Windows Server“. Here is how to Query MBAM to display the BitLocker Recovery report.

Remotely Determine if Reboot is required

You can use this PowerShell command to check the key registry location indicating a pending reboot on a remote PC.

$keys = @(
    "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending",
    "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired"
)
Invoke-Command -ComputerName "192.168.xxx.xxx" -ScriptBlock { 
    $keys | ForEach-Object { 
        if (Test-Path $_) { "Reboot pending: $_" }
    }
}

To use this above command, ensure that PSRemoting is enabled on the remote (target) PC.

Enable-PSRemoting -Force

You could also run the remote registry check using current logged-in user’s credentials automatically. Here, no credential prompt is required. This command runs on the remote machine using your current credentials, assuming WinRM is enabled and the connection is trusted.

Invoke-Command -ComputerName "192.168.1.100" { Test-Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending" }
Determine pending update remotely

Alternatively, you may want use domain admin credentials and get prompted as shown below via Get-Credential popup. Then enter your administrative creds for authentication against the remote PC. This is useful when your current account doesn’t have rights on the target system.

WMI-CIM

Both commands rely on WinRM being configured and reachable. Otherwise the connection attempt will fail as shown in the image above.

Please, see Email notifications for MBAM Enterprise and Compliance and Recovery Audit reports, how to Visualize MBAM Recovery Audit Report with Python, and Fix FileNotFoundError: [Errno 2] No such file or directory.

Check for Updates and Reboot

Suspension allows you to access your data without restrictions. But it is crucial to resume protection promptly to maintain security. To fix this, please check for updates as shown below.

Check for updates

When there are more updates, install and ensure you restart when prompted.. You can also restart by click on the Start Menu, and navigate to the Power option and select “Restart”. You could also do this via the Command Prompt or PowerShell.

reboot

If you wish to manually resume BitLocker, kindly use the command below

manage-bde -resume C:

For me, BitLocker is been managed by MBAM. BitLocker will begin protecting the device automatically once all prerequisites are met, provided the machine complies with MBAM policies and the MBAM agent is functioning properly.

Please, see Hub Transport Server: Resolving ‘Failed to Reach Running Status’, how to Enable Virtualization in Windows: Fixing VirtualBox’s 32-bit Option, and Domain Name System Protocol: Client Registration Issue.

What if the issue persists

When the issue persists, you can use the following command “manage-bde -protectors -enable C:” to re-enables BitLocker protection on the C: drive after it was temporarily suspended. This forces Windows to reset the “pending reboot” state.

manage-bde -protectors -enable C:
Enable protection

You can run the following command to have your PC restarted!

shutdown /r /t 0

To check the status, please run the command below

manage-bde -status C:

To list the key protectors, use

manage-bde -protectors -get C:

Since you are administering a remote PC, you can use the comamnd below to see if the BitLocker WMI class exists on the remote PC. With “Win32_EncryptableVolume”, and “MSFT_EncryptableVolume”.

Get-CimClass -CimSession $session -Namespace "root\CIMV2\Security\MicrosoftVolumeEncryption" | Select-Object CimClassName
BitLocker WMI class exists

With this, you can use the WMI or CIM commands to administer your PC remotely. We will discuss the below steps in a subsequent article.

$session = New-CimSession -ComputerName "REMOTEPC" -SessionOption (New-CimSessionOption -Protocol Dcom)
$vol = Get-CimInstance -CimSession $session -Namespace "root\CIMV2\Security\MicrosoftVolumeEncryption" -ClassName Win32_EncryptableVolume | Where-Object { $_.DriveLetter -eq "C:" }
$vol
connect to remote machine

Next, run the command below. This sequence forces BitLocker to reset its “pending reboot” state.

Invoke-CimMethod -InputObject $vol -MethodName "EnableKeyProtectors"

I hope you found this article on “Query MBAM-protected Client for non-compliance [Part 2]” very useful. Please, feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:BitLocker Status, Check for Updates and Reboot, device compliance issues, Manage-BDE, MBAM protection status, Microsoft Windows, resolving non-compliance, troubleshooting MBAM non-compliance, Why is this volume not BitLocker protected, Windows 10, Windows 11

Post navigation

Previous Post: Configure Windows Admin Center on Windows Server 2019
Next Post: How to protect Azure Kubernetes Service (AKS) with Azure Backup

Related Posts

  • tsx
    Error Code: 0x80070035: MDT unable to access the Log share, the Network Path was not found Windows
  • original 1
    DISM “Failed to open image” CWimImageInfo Mount(hr:0x8007000d): Fix Error DISM WIM Provider Windows
  • Why you should not Upgrade Windows on an ePO Server
    Why you should not Upgrade Windows on an ePO Server Windows Server
  • 1 kajkbmlyehn0inifwrh 8w
    How to install Kerberos packages via Cygwin in Windows Windows Server
  • fdsdsd
    Configuring DHCP Scope: Post-deployment of Dynamic Host Configuration Protocol Windows Server
  • Licensing
    Manage Windows Product key with Software Licensing Manager Windows

More Related Articles

tsx Error Code: 0x80070035: MDT unable to access the Log share, the Network Path was not found Windows
original 1 DISM “Failed to open image” CWimImageInfo Mount(hr:0x8007000d): Fix Error DISM WIM Provider Windows
Why you should not Upgrade Windows on an ePO Server Why you should not Upgrade Windows on an ePO Server Windows Server
1 kajkbmlyehn0inifwrh 8w How to install Kerberos packages via Cygwin in Windows Windows Server
fdsdsd Configuring DHCP Scope: Post-deployment of Dynamic Host Configuration Protocol Windows Server
Licensing Manage Windows Product key with Software Licensing Manager Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • powershell01
    How to create a KDS root key using PowerShell Scripts
  • Convert PEM to PPK 1
    Convert a PEM Key to a PPK Key on a Linux and Windows AWS/Azure/OpenShift
  • dc
    Fix MDT accidental OS deletion Windows Server
  • Cloud Cost
    How to Control Cloud Cost Using Azure VM AWS/Azure/OpenShift
  • User profile in Windows
    How to delete User Profile in Windows Windows
  • Remote Desktop Connection Windows 10 min
    Fix Remote Desktop Connection issues (Error 0x204) Windows
  • appp
    How to automatically reopen Windows Apps and Folders upon Startup Windows
  • MacOS Catalina Desktop
    Mac FileVault Encryption: How to enable FileVault disk encryption Security | Vulnerability Scans and Assessment

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.