New-CMBLEncryptionMethodWithXts
Create a policy to configure the algorithm and cipher strength used by BitLocker Drive Encryption on Windows 10 devices.
Syntax
New-CMBLEncryptionMethodWithXts
[-PolicyState <State>]
[-OSDriveEncryptionMethod <WindowsTenEncryptionMethod>]
[-FixedDriveEncryptionMethod <WindowsTenEncryptionMethod>]
[-RemovableDriveEncryptionMethod <WindowsTenEncryptionMethod>]
[-DisableWildcardHandling]
[-ForceWildcardHandling]
[<CommonParameters>]
Description
Create a policy to configure the algorithm and cipher strength used by BitLocker Drive Encryption on Windows 10 devices. This policy is applied when you turn on BitLocker. If the drive is already encrypted, or if encryption is in progress, changing the encryption method has no effect.
For Windows 8.1 devices, use the New-CMBLEncryptionMethodPolicy cmdlet.
Examples
Example 1: New disabled policy
This example creates a Windows 10 policy that's disabled. Since the general policy specified with the New-CMBLEncryptionMethodPolicy cmdlet specifies AES-256, BitLocker uses that same encryption method on all devices.
New-CMBLEncryptionMethodPolicy -PolicyState Enabled -EncryptionMethod AES256
New-CMBLEncryptionMethodWithXts -PolicyState Disabled
Example 2: New enabled policy with XTS-CBC 128-bit encryption
This example creates a policy that's enabled and specifies XTS-CBC 128-bit encryption on all drive types.
New-CMBLEncryptionMethodWithXts -PolicyState Enabled -OSDriveEncryptionMethod AesCbc128 -FixedDriveEncryptionMethod AesCbc128 -RemovableDriveEncryptionMethod AesCbc128
Parameters
-DisableWildcardHandling
This parameter treats wildcard characters as literal character values. You can't combine it with ForceWildcardHandling.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-FixedDriveEncryptionMethod
Specify an encryption method for fixed data drives.
Type: | WindowsTenEncryptionMethod |
Accepted values: | AesXts128, AesXts256, AesCbc128, AesCbc256 |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ForceWildcardHandling
This parameter processes wildcard characters and may lead to unexpected behavior (not recommended). You can't combine it with DisableWildcardHandling.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-OSDriveEncryptionMethod
Specify an encryption method for the OS drive.
Type: | WindowsTenEncryptionMethod |
Accepted values: | AesXts128, AesXts256, AesCbc128, AesCbc256 |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PolicyState
Use this parameter to configure the policy.
Enabled
: If you enable this policy, separately configure an encryption algorithm and key cipher strength for fixed data drives, OS drives, and removable data drives. For fixed and OS drives, the XTS-AES algorithm is recommended. If you'll use a removable drive in a Windows 8.1 device, use AES-CBC 128-bit or AES-CBC 256-bit.Disabled
orNotConfigured
: If you disable or don't configure this policy, BitLocker uses AES with the same bit strength as a policy that you specify with the New-CMBLEncryptionMethodPolicy cmdlet. If you don't enable that policy, BitLocker uses the default encryption method of XTS-AES 128-bit.
Type: | State |
Accepted values: | Enabled, Disabled, NotConfigured |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RemovableDriveEncryptionMethod
Specify an encryption method for removable drives.
Type: | WindowsTenEncryptionMethod |
Accepted values: | AesXts128, AesXts256, AesCbc128, AesCbc256 |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
None
Outputs
Microsoft.ConfigurationManagement.AdminConsole.BitlockerManagement.PolicyObject