Frequently Asked Questions (FAQ)

BitLocker Policy Creation

What happens to machines under a policy when the policy is modified?

Any changes to encryption settings create a difference between the new policy and the old policy. This causes all machines under the policy to decrypt and re-encrypt with the new settings. Changes only to advanced settings, such as recovery key rotation or backup in the domain controller, are applied without decryption and re-encryption.

What happens when TPM is not detected in a machine due to hardware failure?

When TPM is not detected, the Endpoint Central agent assumes no TPM and applies encryption settings for machines without TPM. When the failure is resolved and TPM is detected, the machine is decrypted and encryption settings for TPM machines are applied.

For non-TPM machines, encryption requires a passphrase. Only after the password is provided will encryption begin.

A single policy is sufficient for both TPM and non-TPM machines.

What happens when you delete a policy?

The policy is removed from the machines but encryption remains. Machines are not decrypted on policy removal.

What happens when multiple policies are deployed to the same endpoint?

The last deployed policy takes effect. The active policy can be checked in the managed systems view.

What happens when a new BitLocker encryption policy is applied to machines that are already encrypted?

If the new policy’s encryption settings differ from the current settings, the new policy is enforced.

I have encrypted my machines using startup keys or network unlock (separate from BitLocker). What happens once I install the BitLocker management agent?

BitLocker enforces encryption status changes only on machines where a BitLocker policy is applied.

What happens when a machine is removed from a Custom group or no longer meets the criteria of a Dynamic CG?

The policy is revoked but encryption stays. The machine is not decrypted.

How can a fully decrypted computer be removed completely from BitLocker Management so it won't get prompted to encrypt?

To remove a fully decrypted computer and prevent encryption prompts:

  • Remove the target machine from the custom group (Admin → Custom Group).
  • Modify the existing BitLocker policy by re-attaching the custom group and re-deploying the policy.
What happens to encrypted data drives when "Encrypt OS Drive Only" is selected?

Encrypted data drives are decrypted. The computer remains partially encrypted.

How does changing the "Encryption Settings" of a deployed policy affect functionality?

Modifying encryption settings triggers re-encryption of the drives.

How are drives fully encrypted without deploying the policy?

Endpoint Central will not encrypt drives without a deployed policy. Full encryption can occur due to:

Is it possible to reset the TPM PIN?

Yes. Log in with the recovery key. After login, the user is prompted to reconfigure or modify the password or PIN.

What are the criteria for creating a password?
  1. TPM and PIN: 6–20 digits, no continuous sequence of 3+ digits, no repetitive 2-digit sequence.
  2. TPM and Enhanced PIN: 6–20 characters, must include 1 uppercase, 1 lowercase, 1 digit, 1 special character; no continuous sequence of 3+ characters, no repetitive 2-character sequence.
  3. Passphrase: 8–255 characters, same complexity as enhanced PIN.

BitLocker Policy Association & Deployment

When will the BitLocker encryption/decryption process begin?

The agent initiates BitLocker processes during its refresh cycle. Execution time depends on the machine. Encryption begins only after the recovery key is successfully stored on the server.

Is there any active period for deployment/starting BitLocker?

No. BitLocker can be enabled and policies deployed at any time.

What happens when the drive is in suspend protection state?

When a drive is in suspend protection mode it is encrypted but not protected. To check, go to the Endpoint Central web console, navigate to BitLocker management, find the computer under Managed Computers, and verify if Protection Status is "Disabled".

What is the outcome when a policy is applied to data drives that have already been manually protected?

If the user manually protects data drives and a BitLocker policy is later deployed, the protector changes to "Auto Unlock".

Is a system restart required for BitLocker encryption to take effect?

No. A restart is not required. Once the policy is deployed, encryption begins immediately in the background.

Is it okay to have both Group Policy configuration and BitLocker policy applied together?

Applying both simultaneously may cause conflicts. It is not recommended.

BitLocker Pre-requisites

What versions of Windows does BitLocker support?

BitLocker supports Windows 7 and above.

Why are the portable drives not getting encrypted?

Encryption of portable drives is not supported by Endpoint Central's BitLocker Management.

BitLocker Audit & Reports

How can I find the current BitLocker status for each machine?

The current status updates during the refresh cycle. On-demand status can be obtained by navigating to Insights → Managed Systems and clicking "Update Now".

Note: Agent-server communication is required for timely data updates. Interruptions can delay updates.

Why is my machine not listed under managed systems or included in the BitLocker report?

Possible reasons:

  • Endpoint Central agent is unavailable, preventing scans.
  • Agent-server communication interruptions.
  • Server is busy and data is queued; it updates later.
  • Windows version is 7 or below.
  • BitLocker is disabled via GPO.

Contact support for assistance if these issues occur.

Why is the encryption status shown as "Partially Encrypted"?

If the "Encrypt OS Drive Only" option is selected during policy creation, the encryption status is shown as "Partially Encrypted".

Why is the protection status disabled for fully encrypted drives?

Protection status indicates whether BitLocker is active. If it shows "Disabled" while fully encrypted, BitLocker is suspended. Endpoint Central does not suspend BitLocker. Possible causes include:

  • Windows Device Encryption suspending until the recovery key is backed up.
  • Manual suspension.
  • Third-party software related to BitLocker.

Deploying the encryption policy through Endpoint Central re-enables BitLocker protection.

How to schedule and receive automated BitLocker reports?

To receive automated BitLocker reports, navigate to Scheduled Reports to configure the predefined reports to be sent.

Why does inventory show the BitLocker status incorrectly?

The BitLocker status for Inventory module is only detected through the Inventory scans. The status will only be reflected in the next Inventory scan.

BitLocker Recovery Key

Why is the recovery key not synced in domain controller even though the option is enabled?

If the domain controller is unreachable or permissions prevent updates, the recovery key cannot be stored there.

Will BitLocker encrypt managed machines even if the recovery key is not synced in the domain controller?

Yes. BitLocker encrypts drives even if domain controller sync does not occur.

Does the Central Server manage recovery passwords of computers encrypted by software other than BitLocker management?

Yes. The Central Server manages all recovery passwords.

How do I retrieve the Recovery Key if the server hardware fails?

Configure a scheduled database backup stored in a safe path. Instructions are here. Recovery keys can be retrieved from the backup files.

What happens if Active Directory (AD) is unreachable when updating the Recovery Key?

If AD is unreachable, ManageEngine BitLocker retries updating the Recovery Key up to five times per day during its refresh cycle until AD becomes reachable.

Does removing a machine affect BitLocker recovery key retention?

If the recovery key retention is enabled, the recovery key will be retained in the server upto an year even after the machine is removed. On disabling, the recovery key(s) of the removed will be discarded after 30 days. If the machine's agent was uninstalled, but is viewed as greyed out under Scope of Management (SoM) in Agent tab, its recovery key can be retrieved using the machine's name. But if the machine's agent was uinstalled and also removed under SoM, the recovery key can only be retrieved using the recovery key ID. The recovery key ID can be found in the prompted recovery key dialog box.

How to unlock a BitLocker-protected drive?

The BitLocker-protected drive can be unlocked by providing the PIN or passphrase. If you forget the unlock password, it can be unlocked by entering the recovery key.

What will happen when the recovery key is viewed in the console?

Once the recovery key is viewed in the console, a new recovery key is generated, and the agent will change the recovery key on the next startup.

What happens if the recovery key is rotated according to the configured policy while the agent is offline?

Under the current workflow, when a new recovery key is generated, it is uploaded to the server. After the server successfully stores the new key, the old recovery key is deleted. This sequence occurs during the agent refresh cycle.

If the agent is offline, it cannot upload the newly generated recovery key to the server due to lack of connectivity. As a result, the existing recovery key remains valid and unchanged. Once the agent reconnects, the rotation process continues during the next refresh cycle, generating and uploading the new recovery key to the server.

Why are multiple Recovery Key Identifiers displayed for a single drive on the "Retrieve Recovery Key" page?

When viewing the "Retrieve Recovery Key" page, you may see multiple Recovery Key Identifiers listed for the same drive. This occurs because previously rotated recovery keys are also retained and displayed. The identifier currently shown in the Managed Computers view represents the active recovery key for that drive.

Why are multiple Recovery Key Identifiers displayed for a single drive in the “Managed Computers” view?

A single drive can have multiple recovery keys associated with it. All recovery keys displayed in the Managed Computers view are valid and can be used to unlock the drive.

When unlocking a drive, Windows prompts with the Recovery Key Identifier. This identifier can be used to retrieve the corresponding recovery key in the console.

In standard scenarios, the BitLocker add-on generates one recovery key per drive. Multiple keys may appear if additional keys were created due to manual interruptions during encryption or as a result of third-party software interactions.

Why is the recovery key being requested at every startup?

If the recovery key is prompted at every boot, this is typically due to an environmental or system-related issue rather than the encryption workflow itself. It is recommended that the customer contact Microsoft Support for further assistance, as this behavior is commonly associated with operating system or hardware configuration factors.

Why are BitLocker recovery keys missing in Endpoint Central?

Verify whether the drive is currently in a locked state. If the drive is locked, Endpoint Central will not be able to retrieve the BitLocker recovery key. Unlock the drive and attempt the retrieval again. To verify if the drive is in locked state, navigate to Managed Computers and click on the specific machine. The lock status of the machine's drives will be stated.

How do I fix BitLocker issues when the recovery key is not working?
  1. Verify that the correct recovery key is being entered. The Recovery Key ID (RKI) displayed on the locked drive must match the key retrieved from the management console.
  2. If the correct recovery key still does not work, the issue is not related to Endpoint Central’s BitLocker management. BitLocker operations rely on Windows APIs to initiate encryption and decryption, so the problem is likely specific to the affected machine.