Bitlocker Policy Association & Deployment

The policies created in the BitLocker module must be associated with specific targets for deployment. To know more about creating and configuring BitLocker policies, refer to this page. This document outlines the steps for creating and configuring BitLocker policies, as well as automating BitLocker deployment.

Once a policy is created, associate it with specific targets. Supported target types include static computer groups (CG), static unique CG, and dynamic CG. To learn more about custom groups and their configuration, refer to this page. Kindly follow these steps to deploy Bitlocker policies:

  1. Navigate to Policy Deployment under the BitLocker module in the Endpoint Central web console.
  2. Click Associate Policy

    Bitlocker Policy Deployment

  3. Select the custom group for BitLocker policy deployment.
    To automate BitLocker deployment, select All Computers Group.
    Automatic Encryption Select CG
    Once a new computer is added to the network, it automatically joins this custom group, enabling automatic BitLocker deployment.
  4. Choose the BitLocker policy to associate with the group. Only one policy can be associated per group.

    Automatic Encryption Select Policy

  5. Click Deploy. The policy will be deployed during the next refresh cycle (90 minutes). Selecting Deploy Immediately will deploy the policy instantly;

    Point to note: There is an upper limit of 250 computers for this option

After deployment, you can view the list of associated computers and their policy deployment status. This section also includes remarks or reasons for any failures. Ensure that encryption is either in progress or fully completed.

You can check the encryption status for each machine in the Managed Computers section.

Managed Computers

If a machine remains fully decrypted even after successful policy deployment, it may be due to two reasons: The encryption setting requires user input of a PIN or passphrase, or it is a non-TPM machine where a passphrase is mandatory. Encryption failures may also arise from environmental issues, leading us to the next section, Encryption Pre-requisites.

In the encryption pre-requisites section, you can view machines that cannot proceed with encryption due to errors such as BIOS mode incompatibility, WMI failures, or TPM ownership issues. Each case is documented, with remediation steps provided. The machines are also differentiated based on the errors.

 

If you have any further questions, please refer to our Frequently Asked Questions section for more information.