Skip to main content

45 docs tagged with "BitLocker"

Documents discussing BitLocker drive encryption and configuration

View all tags

Bitlocker - Volume - Add Recovery Password Autofix

This document describes a script designed to add a recovery password to a BitLocker-enabled drive that lacks a key protector. The script disables the current BitLocker protection, initializes the TPM if necessary, and re-enables the protection with a Recovery Password protector. It is intended for execution as an Autofix script and not for manual use.

BitLocker and TPM Audit

Audits BitLocker encryption status and TPM hardware details, populating detailed HTML reports into NinjaRMM custom fields.

BitLocker and TPM Audit

This solution provides a comprehensive auditing framework for BitLocker encryption and Trusted Platform Module (TPM) security status on Windows endpoints within NinjaOne. It eliminates the need for manual checks by automatically collecting granular encryption data and hardware security details, formatting them into easy-to-read HTML reports stored directly in NinjaRMM Custom Fields.

BitLocker Audit - Servers

This compound condition performs BitLocker and TPM audit once per day on Windows servers where auditing is enabled from cPVAL Enable BitLocker Audit custom field. If set to Disable, the audit will not be performed.

BitLocker Audit - Workstations

This compound condition performs BitLocker and TPM audit once per day on Windows workstations where auditing is enabled from cPVAL Enable BitLocker Audit custom field. If set to Disable, the audit will not be performed.

Bitlocker Enabled - System Drive

This document outlines the process to determine if the C: drive on an endpoint has BitLocker enabled. It includes information on accessing the data through BitLocker dataviews or the roles tab in ConnectWise Automate, along with the necessary detection string and settings.

BitLocker Initialize - NinjaOne

Automates BitLocker initialization on Windows devices using NinjaOne custom fields, including encryption method selection, key protector configuration, and secure execution with logging.

Bitlocker Initialize Failure Audit Script

This document provides a dataview containing records of computers where BitLocker initialization failed twice due to issues encountered by the Autofix script. It outlines the relevant dependencies and details about each computer, including client name, location, operating system, and the number of failed attempts.

BitLocker Key Backup

The solution outlines the process of backing up BitLocker recovery keys to Active Directory or Azure Active Directory using CW RMM.

BitLocker Recovery Key Backup

This script verifies whether the device is joined to a domain or Azure AD. For eligible devices, it attempts to back up BitLocker recovery keys to Azure AD or Local AD, depending on the join type. For each drive, it checks for RecoveryPassword protectors and tries to back up the key using the appropriate cmdlet. The output summarizes any failures, including drive letter, key substring, and platform. If all keys are backed up successfully, it reports success. If the device is not domain or Azure AD joined, or the BitLocker module is unavailable, it returns a relevant message. The output is formatted for saving into the CW RMM custom field "BitLocker Key Backup Status".

BitLocker Status and Key Audit

The solution outlines the process of auditing BitLocker encryption status and recovery keys using CW RMM with daily scheduled tasks.

BitLocker Status and Recovery Key Audit

This script collects BitLocker encryption details for each drive on the system using the Get-BitLockerVolume cmdlet. It summarizes the protection status, key protector types, encryption percentage, and recovery password (if available). The output is formatted as a single string suitable for saving into the Endpoint-Level custom field "BitLocker Status and Key".

cPVAL BitLocker Enable

Indicates whether BitLocker initialization needs to run on this device. Used for BitLocker initialization logic and compound conditions.

cPVAL BitLocker Info

Stores an HTML inventory of BitLocker volumes, including mount points, algorithms, protection status, and key protector types. Populated automatically by the BitLocker automation script.

cPVAL Enable BitLocker Audit

Select the operating system for which BitLocker auditing should be enabled. Use this setting to specify the OS where auditing policies will apply.

cPVAL EncryptionMethod

Choose the encryption algorithm BitLocker will apply to the selected volume. Use one of the supported options: Aes128, Aes256, XtsAes128, or XtsAes256.

cPVAL KeyProtectorType

Defines which BitLocker key protector method (TPM, PIN, Password, Recovery, or AD Account) will be applied during encryption.

cPVAL MountPoint

The drive or mount point targeted for BitLocker encryption. Use a drive letter (e.g., C:) or a valid path to ensure the correct volume is selected.

cPVAL Path Or ADAccount

Option for specifying the file path or Active Directory account required by certain BitLocker key protector types.

cPVAL PIN Or Password

PIN or password used for BitLocker key protectors that require user authentication at startup.

cPVAL TPM Info

Stores a detailed HTML report of the Trusted Platform Module (TPM) status, including Manufacturer, Version, Ready State, and Lockout counters. Populated via automation.

Enable BitLocker Key Backup

Select Operating System to Enable BitLocker Key Backup. The output of the Key Backup will be saved into the endpoint-level custom field "BitLocker Key Backup Status".

Enable BitLocker Status Audit

Select the Operating System to Enable BitLocker Status Audit. BitLocker status and recovery key will be stored in the device-level custom field "BitLocker Status and Key".

Initialize BitLocker

Automates BitLocker initialization on Windows via Ninja RMM custom fields. Validates parameters, sets mount point, encryption method, key protector, PIN/password, and AD/path, downloads a helper script, executes it, and logs output for auditing.