Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Windows 10 Failed to enable Silent Encryption
    Intune

    Windows 10 Failed to enable Silent Encryption

    Peter KlapwijkBy Peter KlapwijkJanuary 31, 2019Updated:December 3, 2019124 Mins Read

    One of my latest blog posts I wrote about Modern desktop deployment. One of the paragraphs was about security and the ability to fully automate disk encryption on Azure AD joined, Intune managed devices.
    At one of our customers we are implementing Intune to manage the laptops and run into a problem with this silent encryption process. I`d like to share my findings in this blog post and what setting resolved our issue.

    Failed to enable silent encryption

    In this environment we are testing modern desktop deployment using Windows AutoPilot. So the user authenticates to Azure AD, the device is joined to the Azure AD and automatically enrolled in Intune.
    We created an Endpoint Protection policy with some Windows encryption settings. One of the encryption settings we set is Encrypt devices (to Require), which equals to the Bitlocker CSP setting RequireDeviceEncryption set to value 1.
    We also set Warning for other Disk encryption to Block, this equals BitLocker CSP AllowWarningForOtherDiskEncryption set to 0.
    As stated on Microsoft docs here, on Windows 10 1803 and newer devices Windows will attempt to silent enable BitLocker with those settings.

    Because we don`t have devices with InstanGo or HSTI hardware, but we are piloting Windows 10 1809 devices, we also set AllowStandardUserEncryption with a value of 1.

    The Intune policies are successfully applied and the first pilot devices were indeed successful encrypted without any user action. But when we tested some more devices with the same settings (and same hardware), BitLocker wasn`t enabled by default.
    In the BitLocker-API event log on these devices, we saw several errors and warnings.
    On of the errors we saw repeatedly was event 846:
    Failed to backup BitLocker Drive Encryption recovery information for volume C: to your Azure AD.

    The error was followed by a warning, event 778:
    The BitLocker volume C: was reverted to an unprotected state.

    Strange enough we looked up the device under the user his account in Azure AD and it showed us the BitLocker recovery key. And a recovery key wasn`t available once, but several times!
    Event 845 confirmed the recovery information was indeed uploaded to Azure AD, unlike event 846 told us:
    BitLocker Drive Encryption recovery information for volume C: was backed up successfully to your Azure AD.

    Because these events are completely the opposite of each other and the recovery information was written to Azure AD, we didn`t immediately had an idea where to begin with our troubleshooting. We searched on the internet for those events. We also checked online documentation if we missed a requirement to silent enable encryption. It couldn`t be a hardware requirment, the hardware is all equal and still on some hardware it worked as expected and some did not. We compared the TPM versions on several devices and noticed we have TPM 1.2 and 2.0. So we run a TPM update on some of our test devices, without luck. We went through the BIOS (which is UEFI) searching for differences. After a while we noticed Secure Boot was disabled on some devices. With that in mind I took one of the machines and opened the BitLocker API log again. I remembered I had seen an information event about BitLocker that it wasn`t able to use Secure Boot.
    BitLocker cannot use Secure Boot for integrity because the reguired UEFI variable ‘PK’ is not present.

    Because it was an Information event and not an error or warning, we didn`t paid much attention to it, but we decided to turn on Secure Boot on a few devices. And yes now the machines were able to silent start encryption without any user interaction!

    On a few devices which still didn`t work as expected, we noticed an older BIOS version. After upgrading the BIOS of those devices to the latest version, all our devices are starting silent encryption.
    Conclusion for us:
    Turn on Secure Boot and update your BIOS!
    And if you are upgrading your BIOS, update your TPM to 2.0 😉


    NB: I recommend testing silent encryption on physical hardware and NOT on a Virtual Machine. I have tested silent encryption on several VM`s and this was very unstable!

    Autopilot Azure AD BitLocker EMS Intune Microsoft 365 Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Manage Local Users and Groups with Microsoft Intune

    October 18, 2020

    Configure macOS FileVault with Microsoft Intune

    August 15, 2019

    Easily deploy Office Pro Plus with Intune

    July 25, 2017
    View 12 Comments

    12 Comments

    1. Pankash on April 13, 2019 17:35

      Thanks for sharing; this is indeed great information.
      I am too running a pilot on Windows 1803 but facing lot of issues because of admin rights, and want silent encryption for all my devices.

      Can you please tell how did you enrol your devices to Intune without giving users an admin right, in my case we have Azure hybrid AD joined and I am trying enrolment through GPO which is not working with a standard user right.

      Reply
      • Peter Klapwijk on April 15, 2019 09:35

        Hi Pankash,
        We are now running on Windows 10 1809, Azure AD joined, Intune cloud only. At this customer the users are admin on the laptop, but everything is fully automated, no user action taken to start BitLocker. But I already implemeted this at an other environment with standard users.

        Reply
    2. Pankash on April 15, 2019 10:10

      Hello Peter,
      Thank you for replying, I am currently stuck at Win10 1803 enrollment to Intune due to hybrid AD join as it does not show up device owner in Azure AD.
      I have researching since a quite a long time but no luck with automatic device enrolment to Intune- below is the issues I am facing.
      https://social.technet.microsoft.com/Forums/en-US/d2bda796-eef4-452a-b622-7c7463218555/mdm-enrollment-error-0x8018002b-on-windows-10-1709?forum=microsoftintuneprod

      I will have this checked with standard users, as we can not give our users an admin rights due to our security policies.

      Thank you!

      Regards, Pankash

      Reply
      • Peter Klapwijk on April 15, 2019 11:09

        Hi Pankash,
        Like in the article you mentioned your devices are hybrid Azure AD joined, but not enrolled in Intune?
        As far as I know, Hybrid Azure AD joined devices don`t show an (device) owner.

        Regards,

        Peter

        Reply
    3. Pankash on May 13, 2019 14:07

      Hello Peter,

      Hope you are well.
      MS support engineer informed hybrid does not support silent encryption but the engg. was not very confident on what he was saying…
      I have a quick question for you- have you done silent encryption in Hybrid Azure AD Windows 10 devices.

      Regards,

      Pankash

      Reply
      • Peter Klapwijk on May 13, 2019 14:17

        Hi Pankash,
        Yes, Months ago I have done silent encryption in a hybrid AAD environment. First in a lab and after that worked fine, implemented it at the customer. Must I say at first it didn`t work either, but after working with a MS engineer we where both able to configure silent encryption. The encryption settings in Intune used, are exactly the same as when I do silent encryption on an AAD joined device. That MS engineer never mentioned it is not supported in a Hybrid AAD environment. The only thing we noticed, the user is unable to read the recovery key from his AAD account. When the recovery key is needed, the user need to contact an admin.

        Regards,

        Peter

        Reply
    4. Seng Phearin on May 29, 2019 04:22

      Hi Peter,

      We are now running on Windows 10 1809, Azure AD joined, Intune cloud only. At this customer the users are admin on the laptop, but everything is fully automated, no user action taken to start BitLocker.

      However, we faced issue related to BitLocker won’t silently installed. It happens on Lenovo x280. Could you share some experiences related to the problem? what would be root cause?

      But within same model x280 if we install with Windows 10 1803 then the silent BitLocker encryption is working fine.

      Thanks,
      Phearin

      Reply
      • Peter Klapwijk on May 29, 2019 08:41

        Hi Seng,

        Yes there was an known issue with 1809 not encrypting. Maybe that will fix your problem.
        Have a look at this KB: https://support.microsoft.com/en-us/help/4497934/windows-10-update-kb4497934

        Regards,

        Peter

        Reply
        • Seng Phearin on May 29, 2019 09:39

          Hi Peter,

          I have browsed to some KB files especially the version that I am currently running, yet I didn’t find what they say about the issue I had. Version 1809 (OS Build 17763.437).

          Any solutions to resolve it?

          Thanks,
          Phearin

          Reply
    5. Peter Klapwijk on May 30, 2019 12:15

      You`re not running the latest build, give installing kb4497934 a try. That article mentions fixing a Bitlocker issue.

      Reply
    6. Zeek Mowbray-Bower on December 13, 2019 15:24

      I’ve been running into this issue quite a bit at my work place.
      Secure boot is annoying. If someone leaves a USB plugged in, they will be presented with Bitlocker recovery. What should be done is setting which protectors are used for Bitlocker via group policy. I stumbled on this page when I was looking for which they were.

      There’s a requirement for Secure-boot with TPM 2.0 I think.

      There’s also an issue with some Lenovo machines that require a TPM chip firmware update to work correctly.

      Reply
    7. Zeek Mowbray-Bower on December 13, 2019 15:31

      Oh and another thing.. Major windows updates, unabashed, disable Bitlocker.
      Worse, the updates fail, and in some cases leave the computer with Bitlocker suspended.

      I first saw this notice in the bitlocker logs trying to figure out why this was happening.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}