Introduction to BitLocker: Protecting Your System Disk (2024)

Introduction to BitLocker: Protecting Your System Disk (1)

January 20th, 2020 by Oleg Afonin
Category: «Security»

If you are a Windows user and ever considered protecting your data with full-disk encryption, you have probably heard about BitLocker. BitLocker is Microsoft’s implementation of full-disk encryption that is built into many versions of Windows. You maybe even using BitLocker without realizing that you do – for example, if you have a Surface or a similar thin-and-light Windows device. At the same time, BitLocker encryption is not available by default on desktops if you are using the Home edition of Windows 10. Activating BitLocker on your system disk can be tricky and may not work right away even if your Windows edition supports it. In this article, we are offering an introduction to BitLocker encryption. We’ll detail the types of threats BitLocker can effectively protect your data against, and the type of threats against which BitLocker is useless. Finally, we’ll describe how to activate BitLocker on systems that don’t meet Microsoft’s hardware requirements, and evaluate whether it’s worth it or not security-wise.

Threats Covered by BitLocker Encryption

BitLocker encryption is not the be-all and end-all type of protection. While BitLocker securely encrypts your data with industry-standard AES encryption, it can only protect your data against a set of very specific threats.

BitLocker can effectively protect your data in the following circ*mstances.

Your hard drive(s) are removed from your computer

If, for any reason, your hard drives (or SSD drives) are removed from your computer, your data is securely protected with a 128-bit encryption key (users requiring higher-level security can specify 256-bit encryption when setting up BitLocker).

How secure is this type of protection? If you’re using TPM protection (more on that later), it is very secure; just as secure as the AES algorithm itself (in layman view, 128-bit or 256-bit encryption are equally strong).

If, however, you have enabled BitLocker on a computer without TPM, then BitLocker encryption will be just as secure as the password you set. For this reason, make sure to specify a reasonably strong, reasonably long and absolutely unique password.

The entire computer is stolen

If your entire computer is stolen, the security of your data depends on the type of BitLocker protection you are using as well as on the strength of your Windows password. The most convenient method is “TPM only” (more on that later); this is the least secure method as well, because your computer will decrypt the hard drive(s) before you sign in to Windows.

If you are using “TPM only” protection policy, anyone who knows your Windows account password (or your Microsoft Account password, if you are using a Microsoft Account as your Windows 10 login) will be able to unlock your data.

TPM + PIN is significantly more secure; in a way, it is practically as secure as a bare hard drive.

If you set up BitLocker protection without a TPM or Intel PTT installed, you’ll be forced to using the password. In this case, the data will be as secure as your password. BitLocker is designed to slow down brute-force attacks, so even a 8-character password can provide secure protection to your data.

Other users on the same computer

If anyone can log in to your computer and access their account, the disk volume has been already decrypted. BitLocker does not protect against peer computer users.

Malware/ransomware and online threats

BitLocker does nothing to protect your data against malware, ransomware or online threats.

In other words, BitLocker is great when protecting your data against the removal of the hard drive(s); it’s perfect if you want to protect your data if you sell or RMA your hard drives. It’s somewhat less effective (depending on your policies) when protecting your data if the entire computer is stolen. This is it; other usage cases are not covered.

System Requirements

Most of us are used to “System Requirements” being a mere formality. This is not the case with BitLocker. In order to protect your boot device with BitLocker, you must be running Windows 10 Professional or higher. Windows 10 Home does not support BitLocker system encryption.

To make things more confusing, Microsoft does support BitLocker device protection even on devices with Windows 10 Home. Effectively, this is the same encryption, just with some limitations. BitLocker device protection is available on thin and light devices (e.g. Microsoft Surface) supporting Connected standby and equipped with solid-state storage. Those devices must be equipped with a TPM2.0 module or Intel PTT technology.

If you are using Windows 10 Professional or higher with TPM2.0 or Intel PTT, you can enable BitLocker straight away. However, most computers are not equipped with TPM modules, and only newer-generation computers (think Intel 8th and 9th Gen motherboards; some higher-end motherboards may support Intel PTT with older processors) support Intel Platform Trust Technology. Intel PTT is not even enabled in BIOS by default; you must manually enable the thing to use it for BitLocker protection.

Here’s how you activate Intel PTT on Gigabyte Z390 boards (latest BIOS):

Alternatively, you can perform a Group Policy edit to enable BitLocker without hardware protection modules.

If your computer meets the requirements (namely, the presence of a hardware TPM2.0 module or software-based Intel Platform Trust Technology), enabling BitLocker on your computer can be as easy as opening the Control Panel and launching the BitLocker Drive Encryption applet. Note that not all editions of Windows 10 can use BitLocker protection.

Once you click on “Turn on BitLocker”, Windows will prompt you to create an escrow key (BitLocker Recovery Key). It is highly advisable to do so. On a balance, storing the recovery key in your Microsoft Account might be a good enough option for most home users, while employees will store their recovery keys in their company’s Active Directory. Saving the key into a file or printing it out are also valid options that will provide just as much security as your personal safe box.

Thin and light devices (such as Windows tablets and ultrabooks) may be protected with device encryption as opposed to BitLocker Drive Encryption. The algorithm is essentially the same; however, the compatibility requirements are different. Device encryption is available for thin and light devices running any Windows 10 edition, while BitLocker Drive Encryption is not available to Windows 10 Home users. If you have data to protect, you’ll need to pay a fee for an in-place upgrade to Windows 10 Professional.

What if you already have Windows 10 Professional but don’t have a hardware TPM2.0 module? If you are using one of the latest boards based on Intel chip sets, you may be able to activate Intel Platform Trust Technology (How To Enable BitLocker With Intel PTT and No TPM For Better Security) or perform the following Group Policy edit to enable BitLocker:

  1. Open Group Policy Editor (type gpedit.msc in the Windows Search box)
  2. Open Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives
  3. Edit the Require additional authentication at startup policy
  4. Set the policy to Enabled and check Allow BitLocker without a compatible TPM as shown on the screen shot

Speaking of the policies, BitLocker supports various methods of authentication, each offering a unique trade-off between security and convenience.

  • TPM only. Your system will boot to login prompt; the data will be decrypted with a key stored in the TPM (or Intel PTT) module. This is the most convenient option that effectively protects hard drives, but offers weaker protection if the intruder has access to the whole system (computer with TPM and the hard drive).
  • TPM + PIN. In this mode, the TPM module will only release the encryption key if you correctly type the PIN code during pre-boot phase. Even though the PIN code is short, entering the wrong PIN several times makes TPM panic and block access to the encryption key. This option arguably offers the best balance between security and convenience, combining “something that you have” (the TPM module) with “something that you know” (the PIN code). At the same time, this option may not be convenient in multi-user environments.
  • TPM + USB Key. This option requires both the TPM and a USB flash drive (or CCID smartcard) to be present in order for the system to boot.
  • TPM + PIN + USB Key. Just as the name suggests, this option requires all three of the TPM, PIN code and USB key/smartcard in order to boot your computer. While this is probably the most secure option, the additional security benefits are hardly worth it compared to the TPM + PIN option if you consider the reduced convenience and reliability (you’ll have to use the recovery key if a USB key or smart card gets lost or corrupted).
  • USB Key. This option is only recommended if your computer is not equipped with a TPM module and does not support the Intel PTT.
  • Password only. Just like the previous option, “password only” authentication should only be used if no TPM or Intel PTT is available. Note that the “password” option is different from the “PIN” as there is no enforceable limit on the number of password attempts without a TPM, which allows a brute-force attack on the password.

Advanced users and system administrators can refer to BitLocker Group Policy settings in Microsoft Knowledge Base.

What caveats are there when it comes to securing data against physical extraction? The thing is, while BitLocker is nearly a 100% effective solution for protecting the bare drive, it might not be as secure if the intruder has access to the entire computer with the hard drive installed. Even if your computer is equipped with a TPM2.0/Intel PTT module, Windows will still unlock the encrypted hard drive if Secure Boot conditions are met. This in turn opens numerous vectors of attack that may allow the intruder to intercept the on-the-fly BitLocker encryption key and decrypt the hard drive. These vectors of attack include:

  1. Making a RAM image of a running computer with BitLocker volume(s) mounted. This can be done via a Thunderbolt attack (Windows, by default, does not disable Thunderbolt DMA access when locked) or a cold boot attack.
  2. Breaking or extracting your Windows logon password (e.g. extracting from your Google account, your smartphone, or from another computer you have logged in and synced your data to).
  3. Obtaining your BitLocker Recovery Key from your Microsoft Account or Active Directory.

Advanced users and system administrators can read the following guide to secure their BitLocker volumes: BitLocker recovery guide

Conclusion

Reliable data protection is impossible without protecting your boot device. BitLocker is the perfect choice. It’s secure, convenient and highly configurable, allowing you balance security and convenience to your precise requirements. If you are concerned about security of your data, protecting your boot device with BitLocker is an absolutely mandatory step and the most important security layer.


BitLocker, Encryption, Intel PTT, TPM

Introduction to BitLocker: Protecting Your System Disk (2024)

FAQs

Introduction to BitLocker: Protecting Your System Disk? ›

BitLocker enables users to encrypt everything on the drive Windows is installed on, protecting that data from theft or unauthorized access. Microsoft BitLocker improves file and system protections by mitigating unauthorized data access. It uses the Advanced Encryption Standard algorithm with 128- or 256-bit keys.

Should I turn on BitLocker on system drive? ›

It depends. If you are going to store sensitive, private, and important files on your home PC, you should turn on BitLocker to protect your data from potential theft and a common criminal. If there is nothing on your computer that needs to be protected from leaks, you don't need to enable BitLocker drive encryption.

Why is my PC asking for BitLocker? ›

Windows will require a BitLocker recovery key when it detects a possible unauthorized attempt to access the data. This extra step is a security precaution intended to keep your data safe and secure.

How do I get my computer to stop asking for a BitLocker recovery key? ›

Turn this off to save yourself from entering the recovery key each time Windows locks you out.
  1. Press the Windows key on your keyboard and open "Control Panel" by searching for it.
  2. Now select "Device Encryption" under "Control Panel" to open "Bitlocker" settings.
  3. Now, click on the "turn off auto-unlock" option.
Feb 22, 2023

What is BitLocker introduction? ›

BitLocker overview

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.

What happens when BitLocker is turned on? ›

When this encryption option is selected, BitLocker automatically encrypts data as it is saved, ensuring that no data is stored unencrypted.

Does BitLocker slow down your system? ›

Enabling Bitlocker does affect the read and write speed of the hard drive, and the degree of this effect varies with the hard drive specification.

What happens if you skip BitLocker recovery key? ›

BitLocker is designed to render data inaccessible when unauthorized users who don't have the correct password or recovery key try to take advantage. If data recovery software can recover data on a BitLocker-encrypted drive without a password or recovery key, you probably need to worry about your data security.

How do I get out of BitLocker recovery loop? ›

Follow the below methods to stop the BitLocker recovery screen or BitLocker recovery loop: Method 1: Suspend BitLocker protection and resume it. Method 2: Remove the protectors from the boot drive. Method 3: Enable the secure boot.

How do I stop BitLocker from popping up? ›

How to prevent the popup message from popping up when connecting a device that is encrypted by BitLocker? Go to: Settings > System > Notifications & actions > Scroll down to BitLocker Drive Encryption > and set it to Off.

How much does BitLocker cost? ›

BitLocker is free with Microsoft Windows: Microsoft BitLocker is free to use and very easy to set up.

How does BitLocker get on a computer? ›

How does BitLocker work? The way that BitLocker works is by utilizing a hardware element known as a TPM, which stands for Trusted Platform Module. BitLocker will create a recovery key for your hard drive, so that every time you start up your computer, a specific pin number will be needed in order to gain access.

Where do I find my BitLocker pin? ›

Reset a forgotten BitLocker PIN/password
  1. Restart your computer and press the Esc key in the BitLocker logon screen.
  2. In the BitLocker recovery screen, find the Recovery key ID. ...
  3. Contact your administrator and give them the Recovery key ID. ...
  4. In the BitLocker recovery screen, enter the recovery key.

Can a virus cause BitLocker? ›

If the PC does not have a 'data partition' other than the operating system partition, the malware is able to create (and encrypt with BitLocker) a file containing a virtual partition (VHD) and move all the user's documents into this 'virtual partition' (this is referred to as 'VHD Locker Ransomware').

Is it good to turn off BitLocker? ›

While it's vital to keep BitLocker encryption enabled on your PC to keep data secure, sometimes you need to disable or suspend it temporarily. Ensure you turn it back on after you complete the computer operation to keep your data safe.

How do I know if my computer is using BitLocker? ›

Checking BitLocker Status (Command Line)

Press and hold the Windows button on the keyboard and R , type cmd and press Enter. Right-click Command Prompt and select "Run as Administrator." In command prompt, type manage-bde -status and press Enter. View the status of BitLocker on the drives in the computer.

Does BitLocker lock itself? ›

By default, if you encrypt a data drive using BitLocker, it will remain locked until you manually unlock it. For example, when you boot your device, you enter a password to unlock the BitLocker-encrypted system drive so that Windows can load.

Will BitLocker erase my data? ›

BitLocker encrypted disks enable you to quickly sanitize the device by deleting the encryption key, which renders the data on the drive irretrievable.

Does turning off BitLocker delete data? ›

Disabling BitLocker will decrypt all of your files, meaning your data won't be protected anymore. However, you can still encrypt your text files or encrypt all your online and offline data. Whatever you decide to do, make sure your files are protected.

Is BitLocker 100% safe? ›

BitLocker encryption is not the be-all and end-all type of protection. While BitLocker securely encrypts your data with industry-standard AES encryption, it can only protect your data against a set of very specific threats.

What can trigger the BitLocker recovery key? ›

Bitlocker recovery mode can be triggered by a number of situations, including:
  • A malicious attempt by a person or software to change the startup environment. ...
  • Moving the BitLocker-protected drive into a new computer.
  • Installing a new motherboard with a new TPM.
  • Turning off, disabling, or clearing the TPM.
Jan 30, 2023

What is the difference between BitLocker key and recovery key? ›

BitLocker is designed to make the encrypted drive unrecoverable without the required authentication. When in recovery mode, the user needs the recovery password or recovery key to unlock the encrypted drive.

Is recovery key the same as BitLocker key? ›

BitLocker recovery key (or Microsoft recovery key) is generated when a drive is encrypted using BitLocker. The recovery key can be used to unlock/decrypt the encrypted drive if the user forgets or loses their password.

Why does BitLocker ask for recovery key every boot? ›

When BitLocker sees a new device in the boot list or an attached external storage device, it prompts you for the key for security reasons. This is normal behavior. This problem occurs because boot support for USB-C/TBT and Preboot for TBT are set to On by default.

How many attempts do you get for BitLocker? ›

For each of the 32 attempts, the TPM records if the authorization value was correct or not. This inadvertently causes the TPM to enter a locked state after 32 failed attempts.

How secure is BitLocker from police? ›

According to Microsoft sources, BitLocker does not contain an intentionally built-in backdoor, i.e., there is no way for law enforcement to have a guaranteed passage to the data on the user's drives that is provided by Microsoft.

Is BitLocker free with Windows 10? ›

BitLocker is Microsoft's proprietary disk encryption software for Windows 10. Following these eight steps will make sure your data is safe and protected. Plus it's free and you don't have to install anything.

Is BitLocker tied to the motherboard? ›

Bitlocker makes use of TPM that's embedded to motherboard so you don't need to unlock a Bitlocker encrypted drive during boot. When a motherboard is replaced, the unlock key no longer exists, so you will be prompted to enter a recovery key. Therefore, you will want to make sure you have a backup Bitlocker recovery key.

Can BitLocker be tracked? ›

You can use Microsoft BitLocker Administration and Monitoring (MBAM) to determine the last known BitLocker encryption status of computers that were lost or stolen.

Is BitLocker built into Windows? ›

With Windows 11 and Windows 10, Microsoft offers BitLocker Device Encryption support on a much broader range of devices, including those devices that are Modern Standby, and devices that run Home edition of Windows 10 or Windows 11.

What is the difference between BitLocker PIN and password? ›

About Your BitLocker PIN and Passwords

The password is used to unlock drives on your computer that do not contain the operating system. BitLocker will ask for your password after the PIN is requested during startup. Each BitLocker protected hard disk on your computer has its own unique password.

Do I need a PIN code for BitLocker? ›

In addition to the protection that the TPM provides, BitLocker requires that the user enters a PIN. Data on the encrypted volume can't be accessed without entering the PIN. TPMs also have anti-hammering protection that is designed to prevent brute force attacks that attempt to determine the PIN.

Is BitLocker PIN only numbers? ›

Enhanced startup PINs permit the use of characters including uppercase and lowercase letters, symbols, numbers, and spaces. This policy setting is applied when you turn on BitLocker.

Should I encrypt system drive? ›

If a laptop is lost or stolen and the files or disk aren't encrypted, the thief can easily access the information, so it's a good practice to encrypt your sensitive data, if not your entire hard drive.

Does BitLocker slow down SSD? ›

Does BitLocker slow down an SSD? Of course. It takes processing time to decrypt the data. It ALWAYS takes more time for I/O just because of that.

Does turning off BitLocker wipe the drive? ›

BitLocker is a discrete method of protecting your data from unauthorized access. Turning off the feature won't erase any of your files, but it's still good practice to keep backup copies of your files.

Why do I have to use BitLocker on my USB drive? ›

BitLocker to Go is a feature of Windows 10 (Pro and Enterprise) that allows you to easily encrypt your personal devices and prevent unauthorized access1. Without the encryption key, the device is inaccessible. When you connect your BitLocker encrypted USB device to a Windows PC you will be prompted for your password.

What is the downside to encrypting a hard drive? ›

The main drawback with full disk encryption is that it can ensure data security only when the device is at rest. This means that the data is encrypted only when the device is locked. When the device is unlocked, anyone can open and access any files in the device.

Can an encrypted drive be hacked? ›

Hackers can break encryption to access the data using a number of different methods. The most common method is stealing the encryption key itself. Another common way is intercepting the data either before it has been encrypted by the sender or after it has been decrypted by the recipient.

Can a virus infect an encrypted hard drive? ›

When a drive is fully encrypted, there are no unencrypted blocks that the malware can write to without mounting the drive. Malware can only affect an encrypted drive if it is mounted decrypted.

How long does BitLocker take to encrypt 1tb? ›

To learn more, see the Microsoft BitLocker FAQ. However, other factors that will affect the duration of Bitlocker encryption include: The size of the drive. The performance of the drive and the server.
...
So how long will encryption take?
New disk1-5 minutes
1 TB / 300 GB used10 hours
2 TB / 1.5 TB used50 hours

How long does BitLocker take to encrypt 256gb? ›

BitLocker supports encrypted hard drives with onboard encryption hardware built in, which allows administrators to use the familiar BitLocker administrative tools to manage them. Encrypting a new flash drive can take more than 20 minutes.

Do I need BitLocker on my laptop? ›

BitLocker Drive Encryption is an integral security feature for Windows computers. It provides protection for your computer's operating system as well as the data stored it, ensuring that the data remains encrypted even if the computer is tampered with when the operating system is not running.

Can a BitLocker drive be recovered? ›

Windows Recovery Environment (RE) can be used to recover access to a drive protected by BitLocker Device Encryption. If a PC is unable to boot after two failures, Startup Repair automatically starts.

How long does it take for BitLocker to encrypt a drive? ›

How long will the encryption take? The length of time will depend on the size and speed of the hard drive in your computer. In our testing, the process has taken anywhere from 20 minutes to three hours.

How long does it take for BitLocker to decrypt a drive? ›

Disabling BitLocker

NOTE: Decryption can take anywhere from 20 minutes to a couple of hours. The time depends on the amount of data that has been encrypted, the speed of the computer, and whether the process is interrupted.

Do you have to pay for BitLocker? ›

If you want a free solution and work on Microsoft, use Windows BitLocker. That should do the job for you. Unless otherwise explicitly required for business needs, Encryption is basically a compliance requirement from an audit compliance requirement perspective.

Top Articles
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6546

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.