Skip to main content

Bitlocker

Purpose

To manage Bitlocker protection on endpoints.

Update Notice: 6-Sept-2024

Image

Associated Content

Auditing Content

ContentTypeFunction
Script - Bitlocker - AuditScriptGathers Bitlocker information from the target endpoint and stores it in the Custom Table - plugin_proval_bitlocker_audit.
Script - Bitlocker - AD Key Protector - AuditScriptAudits the existing backup Bitlocker key protectors from an Active Directory server.
Script - Bitlocker Recovery Password - AD BackupScriptThis script backs up Bitlocker Recovery Passwords to the associated Active Directory instance.
Dataview - Bitlocker StatusDataviewDisplays information from the Custom Table - plugin_proval_bitlocker_audit filled by the Script - Bitlocker - Audit. Additionally, it displays information about the Active Directory backup status of each key protector.
Dataview - TPM Detailed AuditDataviewDisplays information from the Custom Table - plugin_proval_tpm_audit filled by the Script - Bitlocker - Audit. Additionally, it displays information about the TPM detailed information of the Windows.
Dataview - Bitlocker Status - Retired ComputersDataviewDisplays the Bitlocker data stored in the Custom Table - plugin_proval_bitlocker_audit for the retired computers.
SEC - Encryption - Dataview - Bitlocker - AD Backup AuditDataviewDisplays Bitlocker key protectors backed up to Active Directory.
Internal Monitor - ProVal - Production - Security - Stale Bitlocker DataInternal MonitorDetects Windows computers where the Script - Bitlocker - Audit script has not executed within the last 30 days and triggers the audit script to run.
CWM - Automate - Roles - BitlockerRoleThese roles determine whether the Windows server is eligible for Bitlocker. They are also used in the Internal Monitor - ProVal - Production - Security - Stale Bitlocker Data.
CWA Dataview - Bitlocker Initialize Failure Audit [Script]Dataview (Optional)This dataview contains records of computers where the BitLocker initialization failed twice due to the Autofix script "Script - Bitlocker - Volume - Initialize [Autofix, Param] - Wrapper".

Automation

ContentTypeFunction
Script - Bitlocker - Initialize VolumeScriptEncrypts a drive with Bitlocker disk encryption.
Script - Bitlocker - Remove VolumeScriptDisables Bitlocker protection on one (or all) volumes.
Internal Monitor - Bitlocker - Missing Key ProtectorsInternal MonitorDetects computers where Bitlocker is enabled, and the drive is fully encrypted but does not have any key protectors.
Bitlocker - Volume - Add Recovery Password [Autofix]ScriptAdds a recovery password to the drive where BitLocker is enabled but a key protector is not found. It is an autofix script for the Internal Monitor - Bitlocker - Missing Key Protectors monitor set.
△ Custom - Execute Script - Bitlocker - Volume - Add Recovery PasswordAlert TemplateThis will be used with the Internal Monitor - Bitlocker - Missing Key Protectors and should execute the script Bitlocker - Volume - Add Recovery Password [Autofix].
Script - Bitlocker - Volume - Initialize [Autofix,Param] - WrapperScript (Optional)This script runs as an autofix to deploy the BitLocker initialization to the agents detected by the monitor Internal Monitor - Bitlocker - Initialize Volume Deployment.
Internal Monitor - Bitlocker - Initialize Volume DeploymentInternal Monitor (Optional)This internal monitor detects online supported Windows OS (Windows 10/11, Windows Server 2016, 2019, and 2022) that have not been updated in the plugin_proval_bitlocker_audit table in the last 7 days and do not have the keyprotectorid and protectionstatus set. It also checks if the location-EDF 'BitLocker Enable List' is set to either "AllDrive" or "SystemDrive" from the dropdown option and the computer-EDF 'BitLocker Enable Exclude' is not checked. It ensures running the Script - Bitlocker - Volume - Initialize [Autofix,Param] - Wrapper once every 7 days on the detected agents to avoid multiple reiterate attempts.
△ Custom - Execute Script - Bitlocker - Volume - Initialize [Autofix] - WrapperAlert Template (Optional)This alert template needs to be applied to Internal Monitor - Bitlocker - Initialize Volume Deployment and should execute the Script - Bitlocker - Volume - Initialize [Autofix,Param] - Wrapper.
Remote Monitor - Enable Bitlocker FeatureRemote MonitorEnables the following Bitlocker features on the Windows server if they are not already installed:
  • BitLocker Drive Encryption Administration Utilities
  • BitLocker Recovery Password Viewer
  • BitLocker Drive Encryption Tools

Other Content

ContentTypeFunction
Agnostic - Initialize-BitLockerVolumeAgnosticEncrypts a drive with Bitlocker disk encryption.
Agnostic - Unprotect-BitLockerVolumeAgnosticDisables Bitlocker protection on one (or all) volumes.
Agnostic - Get-ADBitlockerStoresAgnosticReturns objects from AD representing backed up Bitlocker key protectors.
Custom Table - plugin_proval_bitlocker_auditCustom TableStores information about Bitlocker configuration on target machines.
Custom Table - plugin_proval_ad_bitlocker_keyprotectorsCustom TableStores information about Bitlocker key protectors backed up to Active Directory.
Custom Table - plugin_proval_tpm_auditCustom TableThis table will be populated by the Script - Bitlocker - Audit. It holds all data from the Get-TPM command.

Implementation

  1. Import the following scripts using the ProSync plugin:

  2. Import the following Dataviews using the ProSync Plugin:

  3. Import the following monitors using the ProSync Plugin:

  4. Import the following Alert Templates using the ProSync plugin:

    • △ Custom - Execute Script - Bitlocker - Audit
  5. Import the following roles using the SQL provided in the CWM - Automate - Roles - Bitlocker:

    • Windows Server Bitlocker
    • Windows Server Bitlocker-Utilities
    • Windows Server BitLocker-RemoteAdminTool
  6. Reload the System Cache
    Image

  7. Execute the Script - Bitlocker - Audit against any online Windows computer with the Set_Environment parameter set to 1 to create the custom tables used by the solution.
    Image

  8. Configure the solution as follows:

Optional

Auto Encryption

  1. If the partner would like to perform the auto-deployment of the Bitlocker - Initialize volume, then only get the document below imported and implemented as mentioned:

Bitlocker - AD Backup

  1. If the partner would like their recovery keys backed up into Active Directory, a GPO must be created to support this.

Missing Key Protectors

  1. If the partner would like to ensure the monitor set detects the computer where Bitlocker is enabled, and the drive is fully encrypted but does not have any key protectors, follow the steps below to set this up: