Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Automatically enable Bitlocker encryption with Microsoft Intune
    Intune

    Automatically enable Bitlocker encryption with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkNovember 11, 2020Updated:November 11, 2020113 Mins Read

    Once in a while, I get the question from a community member why their devices are not automatically starting the encryption of the operating system drive. They configure some BitLocker settings in Microsoft Intune and deploy these to their devices. But the encryption isn`t automatically started and different sorts of error messages are seen on the device.

    Where it is no problem to respond to each person separate, I thought let`s share the configuration which works for me to auto start BitLocker encryption.

    Before we move over to the settings itself, some ‘notes from the field‘, otherwise your below setup might not work and you still see errors like described in this previous post:

    • Outdated BIOS and TPM firmware/ drivers might cause issues. So updates these drivers.
    • Make sure Secure Boot is turned on!
    • And while testing, use real hardware and no virtual machines.

    Below settings do work for Azure AD and Hybrid Azure AD joined devices. But there is a big difference. On AAD joined devices encryption starts already during Autopilot enrollment, where encryption on HAADJ devices starts as soon as the first user signs in.

    Let`s move over to the configuration part.

    Configure Endpoint Protection profile

    At the moment of writing, I still use an Endpoint Protection profile in Microsoft Intune to configure encryption settings as I haven`t tested the BitLocker settings yet which are found on the Endpoint Security tab.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – Windows
    • On the Configuration Profiles tab click +Create profile
    • Choose Windows 10 and later as Platform
    • Choose Endpoint Protection as Profile type
    • Click Create
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Click Next

    Under Windows Encryption it is important to at least configure these settings for silent encryption to work for the OS drive. Key in this is to allow standard users to enable encryption and to only allow (require) TPM startup (and block the other options):

    BitLocker base settings

    • Encrypt Devices – Require
    • Warning for other disk encryption – Block
    • Allow standard users to enable encryption during Azure AD Join – Allow
    • Configure encryption methods – Enable
    • Encryption for operating system drives – Choose your preferred algorith

    BitLocker OS drive settings

    • Additional authentication at startup – Require
    • BitLocker with non-compatible TPM chip – Block
    • Compatible TPM startup – Require TPM
    • Other Compatible TPM options – Do Not allow

    Additional settings to configure, related to BitLocker recovery information.

    This should do the trick. If needed you can also configure the settings related to fixed drive and removable data-drive, but it`s not needed for the OS drive.

    Thank for reading and let me know when you have any questions related to this post.

    BitLocker Intune MEM Microsoft Endpoint Manager Security Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Intune RBAC – Create country based device groups with Logic Apps

    March 24, 2022

    Secure personal mobile devices with Microsoft Intune and Lookout

    November 9, 2019

    Restrict access to email attachments and SharePoint files with Conditional Access

    January 20, 2019
    View 11 Comments

    11 Comments

    1. Pablo on December 15, 2020 03:14

      Hi Peter, nice to greet you. Thanks for your posts. I would like to know if there is a way to remove disk encryption from Intune on a Windows 10 PC. Thank you.

      Reply
      • Peter Klapwijk on December 15, 2020 22:08

        Hi Pablo,

        No, I`m not aware of that option.

        Reply
    2. Niko on December 16, 2020 13:54

      You can do it with Intune by deploying a powershell script to the PC’s where you want bitlocker to be removed. You can set it up from Devices -> Policy -> Scripts

      Reply
    3. Guus van Berge on January 6, 2021 13:17

      Hi Peter,

      Thanks for another great post. I was wondering one thing. A little while now you can also configure the bitlocker in the “endpoint protection” node as well. I read somewhere that this is the new place to configure your security and that the configuration profile for bitlocker will become absolute. What is you reason for still using the config profile?

      Reply
      • Peter Klapwijk on January 13, 2021 10:43

        Hi Guus,

        At the moment I tested the settings from the Endpoint Protection node, not all settings which I needed could already be configured via that node. After that moment, I did another short test but wasn’t really sure about a few settings. So I`m still using these settings, as I know for sure this works as expected (at least in the tenants I`m managing).

        Reply
    4. Matt on February 16, 2021 18:12

      Thanks for this post, it is very useful and answers the question I had!
      Do you know what would happen if an existing policy that prompts the user for Bitlocker settings was changed to the one you have outlined above?

      Reply
      • Peter Klapwijk on February 19, 2021 20:44

        If you mean that the user’s device is already encrypted, nothing should change in this.

        Reply
    5. Rakib on April 28, 2021 15:35

      Hi, is there a way to enable bitlocker the opposite way. From script locally to enable bitlocker for Intune, since intune saves recovery keys and such.

      Reply
    6. Camiel Verhelst on October 22, 2021 14:00

      Is there also a way to set a predefined Bitlocker pin through intune? Instead of having the end user setting it up?

      Reply
      • Peter Klapwijk on October 26, 2021 16:51

        No, not by a policy. You end up by setting this using a PowerShell script for example.

        Reply
    7. Habibz on April 7, 2022 19:51

      Thanks Peter for the clear demonstration.
      I Have question in mind, How to enroll my domain joined devices?

      Note:
      I am having my on-prem AD and using AD Connect to replicate to Azure AD.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}