Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Créez et accédez à une liste de vos produits
Certains numéros d’article ont peut-être changé. Si ce n’est pas ce que vous recherchez, essayez de faire une recherche sur tous les articles. Rechercher des articles

Automatic BitLocker Device Encryption for Dell Computers

Résumé: BitLocker encryption for Dell computers. Learn about necessary requirements, vital hardware specs, and key management steps for effective Windows security.

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Symptômes

No symptom information is available.

Cause

No cause information is available.

Résolution

Windows Encryption

Applies to: Windows 10, and Windows 11

BitLocker device encryption is supported on a broad range of devices, including those that meet Modern Standby standards and devices that run Windows 10 Home edition or Windows 11.


Key Hardware Requirements

Firmware/BIOS  
  • UEFI (for Unified Extensible Firmware Interface)
  • Enable S0 (Modern Standby), Disable S3 (Legacy)
TPM
  • Trusted Platform Module (TPM) version 2.0
Storage
  • SSD (SATA and NVMe)
  • Hybrid (Spindle HDD with NAND cache)
  • Spindle (SSHD or SSD+HD)
Note: Self-Encrypting Drives (SED) are automatically encrypted by BitLocker in Windows 10 1709 and higher. September 24, 2019—KB4516071 (OS Build 16299.1420) (Microsoft.com) This hyperlink is taking you to a website outside of Dell Technologies.

Dell computers are not encrypted at the factory but follow the recommendation from Microsoft to support automatic device encryption. BitLocker Device Encryption This hyperlink is taking you to a website outside of Dell Technologies.

After a clean installation of Windows 11 or Windows 10 is completed and the out-of-box experience (OOBE) is finished, the computer is prepared for first use. As part of this preparation, BitLocker device encryption is initialized on the Operating System drive and fixed data drives.


Check, Suspend/Pause, and Prevent the Device Encryption

Check the Current Encryption Status

Open a PowerShell or Terminal window as Administrator and type:
manage-bde -status : (replace with the drive letter, e.g., “C”)

Suspend Device Encryption

Suspend-BitLocker -MountPoint "C:" -RebootCount 0
This command suspends BitLocker encryption on the BitLocker volume that is specified by the MountPoint parameter. Because the RebootCount parameter value is 0, BitLocker encryption remains suspended until you run the Resume-BitLocker cmdlet.
To resume device encryption, use: Resume-BitLocker -MountPoint "C:"

Prevent or Disable Device Encryption

Preventing or disabling the device encryption should only be used in servicing scenarios.
The automatic BitLocker Device Encryption process can be prevented by changing the registry setting:

Key KEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BitLocker
Subkey PreventDeviceEncryption
Value True (1)

Modifying the registry key is only effective when applied to an image before installing Windows. If you want to stop encryption during OOBE and disable it permanently, use Manage-bde Off This hyperlink is taking you to a website outside of Dell Technologies..


Difference Between Suspending and Disabling Encryption

The suspension provides a quick option to temporarily disable the protection on the computer drive for service. The process only takes a few seconds to complete and ensures that the drive content is still protected from unauthorized access yet allows computer repair or maintenance to occur.

Decryption permanently removes the protection and makes the content accessible to anybody who can access the drive. Also, decrypting a drive is time-consuming: Microsoft estimates it takes approximately 1 minute per 500 MB of drive space. The device decryption should only be used before restoring a Windows image.


Preparing Your Computer for Service

Before making a change that might trigger a BitLocker Recovery Key, ensure that a recovery key was safely backed up before activating BitLocker protection. Ensure that any backed-up recovery key is accessible from another computer or phone: Finding your BitLocker Recovery Key in Windows This hyperlink is taking you to a website outside of Dell Technologies..

Device encryption should be suspended before the computer is serviced on-site or returned to a service center. The device encryption must be suspended before flashing the computer BIOS and when a motherboard or a computer drive replacement are expected.

Note: Dell BIOS installers automatically suspends BitLocker before the update is performed.

More Information

Back to Top

Informations supplémentaires

Produits concernés

Alienware, Inspiron, OptiPlex, Vostro, XPS, G Series, G Series, Alienware, Inspiron, Latitude, Vostro, XPS, Fixed Workstations, Mobile Workstations
Propriétés de l’article
Numéro d’article: 000124701
Type d’article: Solution
Dernière modification: 13 May 2024
Version:  12
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.