Bitlocker

How to Force BitLocker Encryption on All Windows 10/11 Devices via Intune

Discription

This document outlines the steps and settings for creating a BitLocker Disk Encryption Policy Template using Microsoft Intune’s Endpoint Security node, focusing on silent encryption and key backup to Azure AD.


Intune Endpoint Security BitLocker Policy Template

This guide provides a configuration for a standard enterprise BitLocker policy designed for silent enablement on compatible Windows devices managed via Microsoft Intune (Endpoint Manager).

Prerequisites

For BitLocker to silently enable on the device, the following prerequisites must typically be met:

  1. Operating System: Windows 10/11 Pro, Enterprise, or Education.
  2. Device Join: Azure AD Joined or Hybrid Azure AD Joined.
  3. TPM: Trusted Platform Module (TPM) chip version 1.2 or higher (TPM 2.0 highly recommended and required for Windows 11).
  4. BIOS Mode: UEFI-native mode.
  5. No Startup PIN/Key: The policy must not require a TPM startup PIN or key, as this breaks silent enablement by requiring user interaction.

Policy Creation Steps (Endpoint Security)

  • Sign in to the Microsoft Intune admin center .
  • Navigate to Endpoint security > Disk encryption.
  • Click Create Policy.
  • Configure the Basics tab:
    • Platform: Windows
    • Profile: BitLocker
    • Click Create.
bitlocker

  • On the Basics tab:
    • Name: BitLocker - Windows 10/11 Silent Encryption (or a meaningful name)
    • Description: (Optional)
    • Click Next.
  • On the Configuration settings tab, configure the settings as follows (key recommended settings for silent encryption and recovery):
Setting CategorySetting NameRecommended Value
BitLocker Require Device EncryptionEnabled
Operating System DrivesEnforce drive encryption type on operating system drivesEnabled
Select the encryption type: (Device)Full Encryption
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Configure user storage of BitLocker recovery informationAllow 256-bit recovery key
Allow 48-digit Recovery password
Configure storage of BitLocker recovery information to AD DSStore recovery password only
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesTrue
Save BitLocker recovery information to AD DS for operating system drivesTrue
BitLocker – Fixed Drive SettingsEnforce drive encryption type on fixed data drivesEnabled
Select the encryption type: (Device)Full Encryption
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Configure user storage of BitLocker recovery informationAllow 256-bit recovery key
Allow 48-digit Recovery password
Configure storage of BitLocker recovery information to AD DSStore recovery password only
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesTrue
Save BitLocker recovery information to AD DS for operating system drives
True
bitlocker2
bitlocker3
  • Scope tags (Optional): Add any required scope tags and click Next.
  • Assignments: Select the Azure AD Security Groups containing the Windows devices you want to encrypt.
    • Recommended: Assign to a pilot group first, then expand.
    • Click Next.
  • Review + create: Review your settings and click Create.

Monitoring and Recovery

  • Monitoring: The encryption status can be monitored in the Microsoft Intune admin center under Devices > Monitor > Encryption report.
  • Recovery Key Access: Recovery keys are stored in Azure AD.
    1. Go to Devices > All devices.
    2. Select the device you need the key for.
    3. Select Recovery keys under the Monitor section to retrieve the 48-digit recovery password. (Access to this requires appropriate RBAC permissions, such as the BitLocker key read permission).
bitlocker5