@Jon Resele, Thanks for posting in Q&A. In general, Intune uses the CSP windows provided to deploy policy via Synml. For the BitLocker CSP, it can apply to both windows 10 and 11 devices. Some settings only applied to specific OS version You can check more details in the following link.
We can deploy the BitLocker policy either via Endpoint security disk encryption policy, endpoint protection policy, custom policy or Setting Catalog policy. This depends on your needs. Different profiles may have different configuration.
For the policy not applied issue, here are my thoughts for your reference:
For the Encryption method we configure under endpoint protection policy, it uses "./Device/Vendor/MSFT/BitLocker/EncryptionMethodByDriveType' to deploy the setting and under the setting description, it mentioned this policy setting can be overridden by the policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" policy setting is enabled this policy setting will be ignored.
For the Encryption Type to apply, I find some version needs with KB installed to be applied which mentioned in above BitLocker CAP doc. Please check if you met.
For Enhanced PIN, on official document, it says not all computers may support enhanced PINs in the pre-boot environment.
For these BitLocker settings, based on my reexperience, if we configure the same setting in different location with different value. conflict may occur. We recommended to only configure one setting with one value to avoid this issue.
Hope the above information can help.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.