BitLocker is entering recovery on every startup because something in the boot configuration or TPM measurements no longer matches what BitLocker expects. After using the recovery key to boot, the protection needs to be reset so it stops asking every time.
Follow these steps after successfully unlocking with the recovery key:
- Identify why recovery is triggered
- Sign in to Windows.
- Open an elevated Command Prompt (Run as administrator).
- Run:
manage-bde.exe -status
This shows which protection mode is configured (TPM, TPM+PIN, etc.).
- Check Event Viewer for BitLocker-related events that indicate the cause (for example, boot file change, firmware/BIOS/UEFI update, Secure Boot change, TPM changes).
- Check PCR profile and configuration
- Reset BitLocker validation profile
- After identifying and correcting the root cause (for example, re‑enabling Secure Boot, completing any pending firmware/TPM updates, or reverting unintended boot changes), reset BitLocker so it relearns the current good configuration:
- Open an elevated Command Prompt.
- Suspend BitLocker:
manage-bde -protectors -disable C:
- Reboot the device once so it starts normally without recovery.
- Re‑enable BitLocker protectors:
manage-bde -protectors -enable C:
Suspending and then resuming BitLocker resets the validation profile so it should no longer prompt for recovery at every startup, assuming the underlying cause is resolved.
- If recovery is due to a forgotten PIN
- If using TPM+PIN and the PIN was forgotten, use the recovery key to unlock, then while signed in:
- Open Control Panel → BitLocker Drive Encryption.
- Expand the OS drive and select Change PIN.
- Choose Reset a forgotten PIN, provide admin credentials if prompted.
- Set a new PIN and finish the wizard.
- This prevents repeated recovery due to an unknown PIN.
- If the issue started after UEFI/TPM or firmware changes (common on Surface)
- Verify Secure Boot is enabled in UEFI and that the TPM is using the default PCR configuration (PCR 7 and 11). Surface and other Connected Standby devices must use PCR 7.
- If custom PCRs were set (for example, via Group Policy) or Secure Boot was disabled, restore them to defaults, then perform the suspend/resume steps above.
If, after correcting configuration and suspending/resuming BitLocker, the device still enters recovery at every boot, further investigation of firmware, TPM configuration, or potential malware/rootkit issues is required before re‑establishing BitLocker protection.
References: