

The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used.
#Bitlocker reader windows vista password
Disallow standard users from changing the PIN or password.Configure minimum PIN length for startup.Require additional authentication at startup.The following policy settings can be used to determine how a BitLocker-protected drive can be unlocked. BitLocker Group Policy settings include settings for specific drive types (operating system drives, fixed data drives, and removable data drives) and settings that are applied to all drives. The following sections provide a comprehensive list of BitLocker Group Policy settings that are organized by usage. After this is complete, BitLocker is compliant with the Group Policy setting and BitLocker protection on the drive can be resumed. In this situation, you need to suspend BitLocker protection by using the Manage-bde command-line tool, delete the password unlock method, and add the smart card method. Policy settings are changed to disallow passwords and require smart cards. This situation could occur, for example, if a removable drive was initially configured to be unlocked with a password and then Group If multiple changes are necessary to bring the drive into compliance, you must suspend BitLocker protection, make the necessary changes, and then resume protection. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance. If a computer is not compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. For details about those settings, see Trusted Platform Module Group Policy settings.īitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC) under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption. Note: A separate set of Group Policy settings supports the use of the Trusted Platform Module (TPM). How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed. To control what drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings.

This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
