Frequently Asked Questions (FAQ)

BitLocker Policy Creation

What happens to machines under a policy when the policy is modified?

Any changes to encryption settings create a difference between the new policy and the old policy. This causes all machines under the policy to decrypt and re-encrypt with the new settings. Changes only to advanced settings, such as recovery key rotation or backup in the domain controller, are applied without decryption and re-encryption.

What happens when TPM is not detected in a machine due to hardware failure?

When TPM is not detected, the Endpoint Central agent assumes no TPM and applies encryption settings for machines without TPM. When the failure is resolved and TPM is detected, the machine is decrypted and encryption settings for TPM machines are applied.

For non-TPM machines, encryption requires a passphrase. Only after the password is provided will encryption begin.

A single policy is sufficient for both TPM and non-TPM machines.

What happens when you delete a policy?

The policy is removed from the machines but encryption remains. Machines are not decrypted on policy removal.

What happens when multiple policies are deployed to the same endpoint?

The last deployed policy takes effect. The active policy can be checked in the managed systems view.

What happens when a new BitLocker encryption policy is applied to machines that are already encrypted?

If the new policy’s encryption settings differ from the current settings, the new policy is enforced.

I have encrypted my machines using startup keys or network unlock (separate from BitLocker). What happens once I install the BitLocker management agent?

BitLocker enforces encryption status changes only on machines where a BitLocker policy is applied.

What happens when a machine is removed from a Custom group or no longer meets the criteria of a Dynamic CG?

The policy is revoked but encryption stays. The machine is not decrypted.

How can a fully decrypted computer be removed completely from BitLocker Management so it won't get prompted to encrypt?

To remove a fully decrypted computer and prevent encryption prompts:

  • Remove the target machine from the custom group (Admin → Custom Group).
  • Modify the existing BitLocker policy by re-attaching the custom group and re-deploying the policy.
What happens to encrypted data drives when "Encrypt OS Drive Only" is selected?

Encrypted data drives are decrypted. The computer remains partially encrypted.

How does changing the "Encryption Settings" of a deployed policy affect functionality?

Modifying encryption settings triggers re-encryption of the drives.

How are drives fully encrypted without deploying the policy?

Endpoint Central will not encrypt drives without a deployed policy. Full encryption can occur due to:

Is it possible to reset the TPM PIN?

Yes. Log in with the recovery key. After login, the user is prompted to reconfigure or modify the password or PIN.

What are the criteria for creating a password?
  1. TPM and PIN: 6–20 digits, no continuous sequence of 3+ digits, no repetitive 2-digit sequence.
  2. TPM and Enhanced PIN: 6–20 characters, must include 1 uppercase, 1 lowercase, 1 digit, 1 special character; no continuous sequence of 3+ characters, no repetitive 2-character sequence.
  3. Passphrase: 8–255 characters, same complexity as enhanced PIN.

BitLocker Policy Association & Deployment

When will the BitLocker encryption/decryption process begin?

The agent initiates BitLocker processes during its refresh cycle. Execution time depends on the machine. Encryption begins only after the recovery key is successfully stored on the server.

Is there any active period for deployment/starting BitLocker?

No. BitLocker can be enabled and policies deployed at any time.

What happens when the drive is in suspend protection state?

When a drive is in suspend protection mode it is encrypted but not protected. To check, go to the Endpoint Central web console, navigate to BitLocker management, find the computer under Managed Computers, and verify if Protection Status is "Disabled".

What is the outcome when a policy is applied to data drives that have already been manually protected?

If the user manually protects data drives and a BitLocker policy is later deployed, the protector changes to "Auto Unlock".

Is a system restart required for BitLocker encryption to take effect?

No. A restart is not required. Once the policy is deployed, encryption begins immediately in the background.

Is it okay to have both Group Policy configuration and BitLocker policy applied together?

Applying both simultaneously may cause conflicts. It is not recommended.

BitLocker Pre-requisites

What versions of Windows does BitLocker support?

BitLocker supports Windows 7 and above.

Why are the portable drives not getting encrypted?

Encryption of portable drives is not supported by Endpoint Central's BitLocker Management.

BitLocker Audit & Reports

How can I find the current BitLocker status for each machine?

The current status updates during the refresh cycle. On-demand status can be obtained by navigating to Insights → Managed Systems and clicking "Update Now".

Note: Agent-server communication is required for timely data updates. Interruptions can delay updates.

Why is my machine not listed under managed systems or included in the BitLocker report?

Possible reasons:

  • Endpoint Central agent is unavailable, preventing scans.
  • Agent-server communication interruptions.
  • Server is busy and data is queued; it updates later.
  • Windows version is 7 or below.
  • BitLocker is disabled via GPO.

Contact support for assistance if these issues occur.

Why is the encryption status shown as "Partially Encrypted"?

If the "Encrypt OS Drive Only" option is selected during policy creation, the encryption status is shown as "Partially Encrypted".

Why is the protection status disabled for fully encrypted drives?

Protection status indicates whether BitLocker is active. If it shows "Disabled" while fully encrypted, BitLocker is suspended. Endpoint Central does not suspend BitLocker. Possible causes include:

  • Windows Device Encryption suspending until the recovery key is backed up.
  • Manual suspension.
  • Third-party software related to BitLocker.

Deploying the encryption policy through Endpoint Central re-enables BitLocker protection.

BitLocker Recovery Key

Why is the recovery key not synced in domain controller even though the option is enabled?

If the domain controller is unreachable or permissions prevent updates, the recovery key cannot be stored there.

Will BitLocker encrypt managed machines even if the recovery key is not synced in the domain controller?

Yes. BitLocker encrypts drives even if domain controller sync does not occur.

Does the Central Server manage recovery passwords of computers encrypted by software other than BitLocker management?

Yes. The Central Server manages all recovery passwords.

How do I retrieve the Recovery Key if the server hardware fails?

Configure a scheduled database backup stored in a safe path. Instructions are here. Recovery keys can be retrieved from the backup files.

What happens if Active Directory (AD) is unreachable when updating the Recovery Key?

If AD is unreachable, ManageEngine BitLocker retries updating the Recovery Key up to five times per day during its refresh cycle until AD becomes reachable.