Edit

Share via


Setting the BitLocker encryption algorithm for Windows Autopilot devices

BitLocker automatically encrypts internal drives during the out-of-box experience (OOBE) for devices that support Modern Standby or meet the Hardware Security Testability Specification (HSTI). By default, BitLocker uses XTS-AES 128-bit used space only for automatic encryption.

With Windows Autopilot, BitLocker encryption settings can be configured to apply before automatic encryption starts. This configuration makes sure the default encryption algorithm or type isn't applied automatically. A device that receives these settings after encrypting automatically needs to be decrypted before changing the encryption algorithm.

Encryption algorithm

BitLocker uses the specified BitLocker encryption algorithm when BitLocker is first enabled. During Windows Autopilot, BitLocker will be enabled after the device setup portion of the enrollment status page. The following encryption algorithms are available:

  • AES-CBC 128-bit.
  • AES-CBC 256-bit.
  • XTS-AES 128-bit (default).
  • XTS-AES 256-bit.

For more information about the recommended encryption algorithms to use, see BitLocker Configuration Service Provider (CSP).

Full disk or used space-only encryption

There are two types of encryption, full disk or used space-only. Configuration of silent enablement and hardware support for modern standby automatically determines the type of encryption used. The type of encryption used can be enforced by configuring the SystemDrivesEncryptionType setting. Like the encryption algorithm, BitLocker uses the encryption type when BitLocker is first enabled. For more information on the expected encryption type behavior, see Manage BitLocker policy.

Configure a BitLocker policy for Windows Autopilot devices

To make sure both the desired BitLocker encryption algorithm and the encryption are set before automatic encryption occurs for Windows Autopilot devices, follow these steps:

  1. Sign into the Microsoft Intune admin center.

  2. In the Home screen, select Endpoint security in the left hand pane.

  3. In the Endpoint security | Overview screen, expand Manage, and then select Disk encryption.

  4. In the Endpoint security | Disk encryption screen. Select + Create Policy.

  5. In the Create a profile page that opens:

    1. Under Platform, select Windows.

    2. Under Profile, select BitLocker.

    3. Select the Create button.

  6. In the Basics page of the Create Policy screen, enter a Name and optional Description, and then select the Next button.

  7. In the Configuration settings page, configure the various BitLocker settings as desired, including the Encryption method and cipher and Encryption type settings:

    • Encryption method and cipher

      1. Expand the BitLocker Drive Encryption section.

      2. For Choose drive encryption method and cipher strength, select Enabled.

      3. For each of the drive types (Fixed data drives, Operating system drive, Removable data drives), select the desired encryption method and cipher from the drop-down menu. The default for each type is XTS-AES 128-bit.

    • Encryption type

      1. Expand the Operating System Drives section.

      2. For Enforce drive encryption type on operating system drives, select Enabled.

      3. For Select the drive encryption type, select the desired encryption type, either Full encryption or Used Space Only encryption, from the drop-down menu. The default is Allow user to choose.

    Once all BitLocker settings are configured as desired, select the Next button.

  8. In the Scope tags page, select the Next button.

    Note

    Scope tags are optional. If a custom scope tag needs to be specified, do so at this page. For more information about scope tags, see Use role-based access control and scope tags for distributed IT.

  9. In the Assignments page, use the Search by group name... search box to find and add the Windows Autopilot device group. Once the Windows Autopilot device group is added and is listed under Group, make sure Target type is set to Include, and then select the Next button. For more information about assigning a policy, see Assign policies in Microsoft Intune.

    Important

    Make sure that the Windows Autopilot device group selected in this step is a device group and not a user group.

  10. In the Review + create page, review the settings to verify they're configured as desired, and then select the Save button.

  11. Configure and assign an Enrollment Status page (ESP) for the Windows Autopilot device. If an ESP isn't enabled, the BitLocker policy doesn't apply before encryption starts. For more information, see one of the following articles: