Enable 256-bit BitLocker Full Disk Encryption during Autopilot
There are many moving pieces that can determine which BitLocker encryption method a device will end up using. Because of HSTI, most new devices these days have the capability to automatically encrypt once a user signs in during OOBE. This automatic encryption will use 128-bit used space only by default – even for AADJ or Enterprise devices. While certainly a great security feature to ensure devices are encrypted by default, it can be a bit tricky to change that encryption method to 256-bit full disk, if we have some rule requiring that. So in today’s post, we’ll be covering the settings I use to enable 256-bit full disk encryption on a Surface Go running Windows 11 during Autopilot.
Settings Catalog
Go to endpoint.microsoft.com > Devices > Configuration profiles > +Create profile to create a new Settings Catalog, or Edit an existing profile:
Add in the Enforce drive encryption type on operating system drives setting, with Select the encryption type: (Device) set to Full encryption:
In your assignments, target the Settings Catalog profile to a devices group (for example, your Autopilot Dynamic Devices group):
Save that policy and we’re done with the settings catalog!
Endpoint Security – Disk Encryption
Go to endpoint.microsoft.com > Endpoint Security > Disk encryption > +Create policy to create a new disk encryption policy, or Edit an existing policy:
Configure the following settings, which allow AES 256bit XTS & support silent encryption for standard users during Autopilot:
Perfect! And just like the settings catalog, this profile needs to be targeted to a devices group:
And with that, we’re good to go!
End User Experience
During Autopilot, when a device hits the ESP (which is required for this to work), the Settings Catalog and Disk Encryption profiles will process during the Device setup portion:
This is crucial, because in Windows 10 1809, automatic encryption was delayed until after this step – meaning the device has the opportunity to consume the settings from MEM and apply the BitLocker encryption settings we want to use during Device setup.
When the device is finished with the rest of ESP, depending on how many apps have installed/the size of the disk, it may still be encrypting. Run manage-bde -status to check the status:
Here we can confirm – it’s Fully Encrypted using XTS-AES 256! All without any user interaction, and during Autopilot. 🔐
The experience is changed, and for me at least, now it’s less clear than ever.. did you plan to update the article?