Share via

After updating BIOS, system required BitLocker recovery key on every startup due to a protector error. Disabled BitLocker, now cannot reenable it.

Rosalind 20 Reputation points
2026-04-06T05:00:46.4833333+00:00

System details:

  • OS: Windows 11 Pro 25H2, build 26200.8117
  • CPU: AMD Ryzen 7 7800X3D
  • Motherboard: Gigabyte B650 AORUS Elite AX V2, BIOS F39
  • TPM?: Enabled, TPM Management says it is ready for use
  • Secure Boot?: Enabled
  • System Mode: User
  • BitLocker details: Full drive encryption of C: drive using new encryption method, no PIN

Issue:

Yesterday, I updated my computer's BIOS. Before doing so, I received a message about suspending BitLocker to avoid TPM issues, which I'm sure I did. I ran the update without issues, and when the computer rebooted, I entered in my BitLocker recovery key, which I have on previous occasions where I've updated the BIOS.

Later, I put the computer to sleep. When I came back and rebooted it, it required the recovery key again, which it hasn't done before. It did the same thing this morning, both on being booted up and on being awakened from sleep. I investigated and found this message:

IMG_20260406_135228_141

(My apologies if anything's unnecessarily obscured, I wasn't sure what counted as private details.)

I did some research and followed the steps in this thread. I checked the TPM status and secure boot settings, all of which seemed normal. I suspended and resumed BitLocker using the command prompts, and while suspending BitLocker temporarily solved the issue, resuming it caused it to start again. I checked the boot order and that the BIOS was fully up to date, and I checked the group policies and unchecked 'Allow BitLocker without a compatible TPM (requires a password or USB key at startup)' (Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives → Require additional authentication at setup). Finally, I decided to disable BitLocker and reenable it.

When reenabling BitLocker, I chose full drive encryption using the new encryption method. It asked me to shut down the system so it could determine whether BitLocker could encrypt my drive. I did so. Upon rebooting, I received this message:IMG_20260406_141625_201

Evidently, there is some issue with the TPM that seems to have arisen as a result of the BIOS update, despite the fact that I suspended BitLocker as requested. However, I am not certain where to proceed from here, especially as TPM management says the TPM is ready to use. I recall that when I first built this computer, I had to go into the BIOS to customise the TPM, mainly to turn on Secure Boot and switch the system mode to user, and I also made a number of changes to group policies. But I don't know if this would have had an impact.

What would be best for me to do to fix this issue?

Thank you kindly for your help.

Windows for home | Windows 11 | Security and privacy
0 comments No comments

Answer accepted by question author
  1. Lychee-Ng 17,350 Reputation points Microsoft External Staff Moderator
    2026-04-07T10:57:22.4466667+00:00

    Hi Rosalind,

    BitLocker repeatedly asking for the recovery key after a BIOS update, and then refusing to re‑enable, likely points to a TPM trust‑chain break scenario. The TPM now still holds old PCR expectations from before the BIOS update, which the system cannot provide anymore. You need to reset the TPM so BitLocker can create a fresh trust relationship.

    1 - Before touching TPM, confirm BitLocker is fully OFF

    • Open Command Prompt / PowerShell as Administrator
    • Run: manage-bde -status C: > make sure it’s Fully Decrypted

    2 - Clear the TPM from Windows

    • Open Windows Security > Device security > Security processor details
    • Choose Security processor troubleshooting > Click Clear TPM > Confirm
    • If you’re warned about cryptographic reset, accept it and let system restart.

    3 - Try setting up BitLocker again

    • After reboot, enter BIOS and confirm:
      • TPM / fTPM is Enabled
      • Secure Boot is Enabled
      • Secure Boot Mode is Standard
      • Boot mode > UEFI only
    • If everything is normal, boot into Windows.

    In some cases, you might not see the option to clear TPM in Windows Security due to system blocks. Let me know if that happens and we will check out some more advanced options!


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.

    1 person found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-06T05:01:19.6366667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The BIOS update has changed the boot/firmware measurements that BitLocker stores in the TPM (PCR values). As a result, the TPM can no longer release the key reliably, which is why recovery is triggered and why BitLocker now refuses to bind to the TPM when trying to turn it back on.

    To restore a stable BitLocker/TPM configuration, follow these steps in order:

    1. Verify which PCRs BitLocker is trying to use
      Open an elevated Command Prompt and run:
         manage-bde -protectors -get %systemdrive%
      
      On systems that use Secure Boot correctly, the PCR validation profile should show PCR 7, 11 (using Secure Boot for integrity validation). If it instead shows something like PCR 0, 2, 4, 11, BitLocker is not using Secure Boot correctly and is more sensitive to firmware changes.
    2. Make sure Secure Boot is correctly configured
      Since the issue started after a BIOS update, confirm in firmware setup that:
      • Secure Boot is enabled.
      • Secure Boot keys are correctly installed (many boards have an option to load factory/default keys).
        If Secure Boot is disabled or keys are missing, BitLocker cannot use PCR 7 and will fall back to other PCRs, which causes recovery after firmware changes.
    3. If the TPM is in a locked or inconsistent state, reset it in firmware
      If BitLocker still cannot enable after several attempts, treat the TPM as potentially locked or inconsistent:
      • Reboot and enter the UEFI/BIOS setup.
      • Disable the TPM in firmware, save changes, and boot into Windows once. In Windows, the TPM management console will show a message like “Compatible TPM cannot be found,” which is expected while it is disabled.
      • Reboot again, enter UEFI/BIOS, and re‑enable the TPM.
      • Boot back into Windows and try enabling BitLocker again.
      If BitLocker/TPM preparation still fails after disabling and re‑enabling the TPM, the next step is to clear the TPM. Clearing removes existing TPM keys and can cause data loss on any drive still protected by those keys, so only do this after confirming that the system drive is decrypted and that no other data depends on the TPM. Then follow the guidance in “Troubleshoot the TPM: Clear all the keys from the TPM.”
    4. Turn BitLocker back on and confirm the PCR profile
      After the TPM is working and Secure Boot is correctly configured:
      • Turn BitLocker on for the OS drive again.
      • Once encryption is enabled, run again:
             manage-bde -protectors -get %systemdrive%
        
      • Confirm that the PCR validation profile now shows PCR 7, 11, indicating that BitLocker is using Secure Boot for integrity validation. This configuration is required on modern systems and is more resilient to firmware updates.
    5. Avoid future recovery loops after firmware changes
      Any time firmware, boot configuration, or Secure Boot settings are changed, BitLocker may enter recovery. Suspending BitLocker before such changes is recommended, but if the TPM is not using PCR 7/11 or Secure Boot is misconfigured, recovery can still occur. Ensuring that Secure Boot is enabled and that BitLocker is bound to PCR 7/11 minimizes these issues.

    If, after these steps, BitLocker still cannot be enabled and the TPM continues to fail to unlock the drive, this points to a persistent firmware/TPM issue on the motherboard. In that case, collect BitLocker events from Event Viewer under Application and Services Logs → Microsoft → Windows → BitLocker‑API → Management and contact the motherboard vendor with those logs for further diagnosis.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.