Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The defaults for BitLocker are a pretty lame (i.e. anyone has access to the data on your laptop data), so here's how to do it properly.

...

Initialise the TPM in Windows

 

Initialize Initialise the TPM in Windows by running tpminit.exe

Let Windows create the password, and then save it to a USB stick for safekeeping.

...

Enable non-numeric PINs

Later on we want a PIN code will to be required for unlocking the drive. By default this can only consist of digits. For better security, we want to have For reasons that are beyond me Microsoft have chosen a PIN (only digits) to be the default, and not a password (any character). Obviously we want to be able to use all the characters. This is done by enabling the "Allow enhanced PINs for startup" setting in the Local Group Policy Editor (gpedit.msc):

Image Added

 

Enable BitLocker Drive Encryption

This is done through the BitLocker Drive Encryption control panel.  Turn it on for the C: disk:

Image Added

 

Windows will now generate a recovery key. Save a copy onto the TWO USB sticks (one backup is no backup) labelled "Bitlocker keys" in a physical key safe.

If the PIN ever gets lost/forgotten, or some boot parameters are changes, you need it to boot the computer with.

Image Added

 

Now it's time to encrypt the drive. You can run a check to make sure your laptop really can be recovered with the key that is stored on the USB stick:

 Image Added

 

This encryption will take some time, but on a modern laptop that have a CPU that does crypto in hardware, and an SSD, it takes about 15 minutes:

 

Image Added

 

Enable the PIN code

At this moment the C: partition is encrypted using the TPM. This means that the partition is unreadable when put into another computer.

The combination of the laptop and the disk (as you have it now) does not need any authentication, so not very useful.

Run the Group Policy Editor again, and enable "Require additional authentication at startup" settings.

Also, check the "Allow Bitlocker without a compatible TPM" box:

Image Added

 

Once this is done, you can finally configure a password (mistakenly called PIN):

Code Block
manage-bde -protectors -add C: -tpmandpin

 

To change the PIN/password later, simply issue:

 

Code Block
manage-bde -changepin C:

 

What do if you can't get in any more 

Sometimes if you changed to BIOS settings, your system needs the BitLocker Drive Encryption recovery key.

Once that is done, you should suspend and then resume the BitLocker protection in the BitLocker Drive Encryption control panel.