Intune - Require Device Encryption ERROR TYPE 2 ERROR CODE 65000

Kannan Venkatachalam 5 Reputation points
2023-07-26T13:49:12.7466667+00:00

i'm trying to test/push bitlocker on autopilot hybrid join only devices somehow can't overcome from this error any suggestions?

Error Details on endpoint console:

Setting Details​

SETTING

Require Device Encryption

STATE

Error

ERROR TYPE

2

ERROR CODE

65000

SOURCE PROFILES

Source Profile

Unluckily there is no errors on the machine event log.


Windows Components > BitLocker Drive Encryption

Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)

Enabled

Select the encryption method for removable data drives:

AES-CBC 128-bit (default)

Select the encryption method for fixed data drives:

XTS-AES 128-bit (default)

Select the encryption method for operating system drives:

XTS-AES 128-bit (default)
Windows Components > BitLocker Drive Encryption > Operating System Drives

Enforce drive encryption type on operating system drives

Enabled

Select the encryption type: (Device)

Full encryption

Require additional authentication at startup

Enabled

Configure TPM startup key and PIN:

Allow startup key and PIN with TPM

Configure TPM startup:

Allow TPM

Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)

False

Configure TPM startup PIN:

Allow startup PIN with TPM

Configure TPM startup key:

Allow startup key with TPM

Configure minimum PIN length for startup

Enabled

Minimum characters:

6

Windows Components > BitLocker Drive Encryption > Fixed Data Drives

Enforce drive encryption type on fixed data drives

Enabled

Select the encryption type: (Device)

Full encryption

Choose how BitLocker-protected fixed drives can be recovered

Enabled

Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives

True

Allow data recovery agent

True

Configure storage of BitLocker recovery information to AD DS:

Backup recovery passwords and key packages

Allow 256-bit recovery key

Configure user storage of BitLocker recovery information:

Allow 48-digit recovery password

Save BitLocker recovery information to AD DS for fixed data drives

True

Omit recovery options from the BitLocker setup wizard

Windows Components > BitLocker Drive Encryption > Removable Data Drives

Control use of BitLocker on removable drives

Enabled

Allow users to apply BitLocker protection on removable data drives (Device)

True

Enforce drive encryption type on removable data drives

Enabled

Select the encryption type: (Device)

Allow user to choose (default)

Allow users to suspend and decrypt BitLocker protection on removable data drives (Device)

False

Deny write access to removable drives not protected by BitLocker

Enabled

Do not allow write access to devices configured in another organization

True

Microsoft Security Intune Other
0 comments No comments
{count} vote

10 answers

Sort by: Most helpful
  1. Anonymous
    2023-09-22T10:10:17.6566667+00:00

    Hi everyone,
    I tried to change the "full encryption" to "Used space only encryption" and the 65000 error disppeared.

    This doesn't solve the problem, but it is working while waiting for a concrete solution.

    After some research (Thanks to @Crystal-MSFT ) it seems comes from the Microsoft root TPM Certificate Authority 2014. Follow this link : https://call4cloud.nl/2023/04/are-you-there-intune-its-me-hac/

    2 people found this answer helpful.

  2. Pavel yannara Mirochnitchenko 13,331 Reputation points MVP
    2023-07-26T17:04:24.0666667+00:00

    There might be knowing issue going on now, because all of sudden, disk encryption stopped working for few enviroments I know. Go to event viewer, under Windows and Apps, look for Bitlocker-API node and look for the error code you see there. If it is about not to be able to upload keys to AzureAD, it might be it. I keep you posted.

    1 person found this answer helpful.

  3. Crystal-MSFT 53,981 Reputation points Microsoft External Staff
    2023-07-27T01:49:50.2266667+00:00

    @Kannan Venkatachalam , Thanks for posting in Q&A. From the information you provided, it seems you configure BitLocker policy in Setting Catalog profile and the recovery key is stored in AD. But it is failed.

    I notice you have checked machine event log. Could you confirm if we check the following event log?

    Applications and Service Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin

    Applications and Service Logs > Microsoft > Windows > BitLocker-API

    https://learn.microsoft.com/en-us/troubleshoot/mem/intune/device-protection/troubleshoot-bitlocker-policies

    If there's any update, feel free to let us know.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


  4. Anonymous
    2023-09-14T15:21:39.6266667+00:00

    Hi,
    I have the same problem, error 65000 type 2.

    Here is my bitlocker policies trough Endpoint security :

    User's image

    User's image

    User's image

    After looking for error message in the event viewer, i found this :
    CSP BitLocker : GetDeviceEncryptionComplianceStatus indique OSV n’est pas conforme à l’état renvoyé 0x10000 -> (BitLocker CSP: GetDeviceEncryptionComplianceStatus indicates OSV does not conform to the status returned 0x10000)

    The encryption is correctly deploy like we can see when i check with manage-bde -status command :
    User's image

    I'm a newbie with Intune and i'm a little bit lost... If you have an idee, let me know.
    Thanks in advance !

    0 comments No comments

  5. Peter West 0 Reputation points
    2023-09-18T09:31:44.2466667+00:00

    We are having the same issue here. Is there any update from Microsoft?

    We are trailing AutoPilot on Windows 11 devices. The policy seems to work without error when using AutoPilot on windows 10 devices.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.