Omitir para ir al contenido principal
  • Hacer pedidos rápida y fácilmente
  • Ver pedidos y realizar seguimiento al estado del envío
  • Cree y acceda a una lista de sus productos
  • Administre sus sitios, productos y contactos de nivel de producto de Dell EMC con Administración de la empresa.

Bitlocker Fails to Turn on or Prompts for the Recovery Key Rebooting With Windows 10, UEFI, and the TPM 1.2 Firmware

Resumen: Resolving issue with BitLocker not turning on or asking for the recovery key with Windows 10, UEFI, and TPM 1.2.

Es posible que este artículo se traduzca automáticamente. Si tiene comentarios sobre su calidad, háganoslo saber mediante el formulario en la parte inferior de esta página.

Contenido del artículo


Síntomas


On Dell systems with Windows 10 installed and configured for UEFI BIOS mode, BitLocker may experience issues with failing to turn on or prompting for the recovery key when the system is rebooted. This can occur when the system is also unable to support the TPM firmware flash from version 1.2 to version 2.0. The resolution covered in this article can be used to configure BitLocker to work with the TPM 1.2 firmware on Dell systems that support Windows 10/UEFI and that do not support the firmware upgrade to TPM 2.0.


BitLocker Fails to turn on or prompts for the Recovery Key after every reboot with Windows 10, UEFI, and the TPM 1.2 Firmware

The Latitude 12 Rugged (7202) is an example of a tablet that ships with Windows 10/UEFI and the TPM 1.2 firmware. By default, BitLocker does not work in this configuration and this platform does not support TPM 1.2<->2.0 mode changes. The resolution below has been tested for the 7202 and allows the use of BitLocker with TPM 1.2 in UEFI mode by modifying which PCR indexes are in the BitLocker profile to the default UEFI selections.

NOTE: PCR (Platform Configuration Register) settings secure the BitLocker encryption key against changes to the Core Root of Trust of Measurement (CRTM), BIOS, and Platform Extensions (PCR 0), the Option ROM Code (PCR 2), the Master Boot Record (MBR) Code (PCR 4), the NTFS Boot Sector (PCR 8), the NTFS Boot Block (PCR 9), the Boot Manager (PCR 10), and the BitLocker Access Control (PCR 11). The default values in the BitLocker profile are different for UEFI and standard BIOS.

Some other system models ship with a Windows 7 downgrade and the TPM 1.2 firmware and fully support the upgrade to Windows 10, yet do not allow TPM 1.2<->2.0 mode changes.

NOTE: While BitLocker may work in Legacy boot mode with the TPM 1.2 firmware, Dell continues to recommend and ship Windows 10 in UEFI from the factory.

 

Causa

Not Applicable

Resolución

Steps to resolve the issue

  1. Disable BitLocker from the Manage BitLocker pane if enabled and wait for decryption to complete:
    • Click Start and type manage BitLocker and select the top search result (Figure 1):

      Manage bitlocker search results
      Figure 1: Manage BitLocker search results

    • From the BitLocker Drive Encryption Control Panel pane, select Turn-off BitLocker (Figure 2):

      BitLocker Drive Encryption Control Panel
      Figure 2: BitLocker Drive Encryption Control Panel

    • Click Turn off BitLocker to confirm (Figure 3):

      Turn off BitLocker confirmation
      Figure 3: Turn off BitLocker confirmation

  2. Go to Start and search for gpedit.msc and click the top search result to open the Local Group Policy Editor in a new window.
  3. In the left column browse to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives (Figure 4):

    Operating System Drives folder
    Figure 4: Operating System Drives folder

  4. Then on the right side, double-click Configure TPM platform validation profile to open up the configuration (Figure 5):

    Configure TPM platform validation profile setting
    Figure 5: Configure TPM platform validation profile setting

  5. Select the radio button that says Enabled.
  6. Clear all PCRs except 0, 2, 4, and 11 (Figure 6):

    Enabled PCR settings
    Figure 6: Enabled PCR settings

    NOTE: BitLocker must be disabled before changing the PCR values. If any of these components change while BitLocker protection is in effect, the TPM will not release the encryption key to unlock the drive and the computer will instead display the BitLocker Recovery console.
  7. Select Apply and OK to close out gpedit.
  8. Turn on BitLocker and reboot after encryption finishes.

Información adicional

Propiedades del artículo


Producto comprometido

Latitude 7202 Rugged Tablet, OptiPlex 7010 (End of Life), Precision T1700

Fecha de la última publicación

03 ene 2024

Versión

7

Tipo de artículo

Solution