Information Technology Reference
In-Depth Information
enabling and disabling auto-unlock of a BitLocker volume
Data volumes and removable drives that are encrypted by BitLocker can be automatically un-
locked whenever they are present in the host computer. You can't automatically unlock the oper-
ating system volume. After a user unlocks the operating system volume, BitLocker uses encrypted
information in the registry and volume metadata to unlock any data volumes that have automatic
unlocking enabled. To enable auto-unlock of a BitLocker volume, use the BitLocker Drive En-
cryption control panel item or use the Enable-BitLockerAutoUnlock cmdlet. You can disable the
auto-unlock feature of one or more BitLocker volumes by using the Disable-BitLockerAutoUnlock
cmdlet. You can clear all automatic unlocking keys on a server with the Clear-BitLockerAutoUnlock
cmdlet. Clear BitLocker automatic unlocking keys prior to disabling BitLocker on a volume.
Disabling BitLocker encryption on a volume
When you want to remove the BitLocker encryption on a volume, you can disable BitLocker
on that volume by using the BitLocker Drive Encryption control panel item or by using
the Disable-BitLocker cmdlet. Disabling BitLocker encryption on a volume removes all key
protectors on the volume and begins decrypting the data on the volume.
Coniguring the Network Unlock feature
Beginning with Windows Server 2012 and Windows 8, BitLocker supports a new protector
option for operating system volumes called Network Unlock. Network Unlock allows for
automatic unlocking of operating system volumes on domain-joined servers and desktops
that are connected over a wired corporate network.
Network Unlock requires the server or desktop to have a Dynamic Host Configuration
Protocol (DHCP) driver implemented in Unified Extensible Firmware Interface (UEFI) firmware.
Without Network Unlock, computers protected with TPM+PIN require a PIN to be entered
whenever the computer restarts or resumes from hibernation. Therefore, enabling TPM+PIN
without Network Unlock prevents remote updating with unattended distribution of software
updates. With Network Unlock enabled, BitLocker-protected systems that use TPM+PIN can
be remotely started or restarted without direct interaction at the console.
The Network Unlock feature requires the following:
Computers running Windows 8, Windows 8.1, Windows Server 2012, or Windows
Server 2012 R2 with UEFI DHCP drivers
Windows Deployment Services (WDS) role installed on Windows Server 2012 or
Windows Server 2012 R2
BitLocker Network Unlock optional feature installed on Windows Server 2012 or
Windows Server 2012 R2
DHCP server
Properly configured public/private key pairing
Network Unlock Group Policy settings configured
 
 
Search WWH ::




Custom Search