Home > Wiki Tips

BitLocker Group Policy: What Is It & How to Configure?

Published/Updated on Thursday, August 8, 2024

M3 Software author Wilsey Young

Written by

Wilsey Young

English

Summary: This post briefly discusses Group Policy on Windows and shows what BitLocker-related changes you can make in Group Policy. It's also a step-by-step guide on how to configure BitLocker Group Policy.

BitLocker Group Policy

 

BitLocker, in general, can be set up and configured through File Explorer, BitLocker Drive Encryption panel, or the Command Prompt tool on Windows. Few people know about BitLocker Group Policy and there are various and personalized settings for you to configure BitLocker to enhance security and personalize encryption.

In this guide, we briefly introduce the Group Policy feature on Windows and we also discuss what changes you can make to BitLocker via Group Policy.

You can share this post and tell your friends how to configure BitLocker Group Policy!

 

What is Group Policy on Windows?

Group Policy is a feature included in Windows. It allows administrators to manage and configure operating systems, applications, and user settings in an Active Directory environment. In other words, Group Policy empowers administrators to enforce policies on a wide range of settings, ensuring secure configurations across all computers in the domain.

You can keep reading the following contents and learn how to configure BitLocker Group Policy.

How to configure BitLocker Group Policy?

Here we show how to open Group Policy through the “Run dialog box” and configure BitLocker group policy in the Group Policy.

  1. Press the “Windows+R” keys to open the “Run dialog box,” type “gpedit.msc” in the box, and click “OK” or hit the “Enter” key on your keyboard.
    open Local Group Policy Editor via Run dialog box
  2. Expand the folder on the left side panel according to the path: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption. You will enter the page as follows
    BitLocker Drive Encryption in Group Policy
  3. Double-click the setting you want to configure and click “Enabled”, as shown in the picture:
    BitLocker Group Policy
  4. Click “Apply” and “OK” to let the modification take effect.

What can we configure for BitLocker via Group Policy?

You can enhance security and manage encryption behavior by configuring BitLocker in versatile settings provided by Group Policy. Here we list some interesting and practical BitLocker Group Policy settings that may arouse your interest.

Require additional authentication at startup

This BitLocker Group Policy setting decides whether BitLocker requires additional authentication each time the computer boots up.

  1. Follow the steps above to open the Local Group Policy Editor
  2. Follow the path to expand the folder and double-click the setting item at last: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Require additional authentication at startup.
    BitLocker Group Policy require additional authentication at startup
  3. Click “Enabled” and adjust the settings in the “Options” section.
  4. Click “Apply” and “OK.”

Configure minimum PIN length for startup

This BitLocker Group Policy setting means you can adjust the minimum length for a TPM startup PIN (from a minimum length of 4 digits to a maximum length of 20 digits).

  1. Follow the path to expand the folder and double-click the setting item at last: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Configure minimum PIN length for startup.
    BitLocker Group Policy configure minimum PIN length for startup
  2. Switch to “Enabled,” and adjust the minimum characters in the “Options” section.
  3. Click “Apply” and “OK.”

Choose drive encryption methods and cipher strength

With this BitLocker Group Policy setting, you can configure the encryption algorithm and cipher strength, aligning with your organization's security requirements.

  1. Go to the path: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Choose drive encryption method and cipher strength. Note: You should notice the Windows versions this setting requires.
    BitLocker Group Policy choose drive encryption method and cipher strength
  2. Enable the setting and choose the encryption algorithm in the “Options” section.
  3. Click “Apply” and “OK.”

Deny write access to fixed drives not protected by BitLocker

When you enable this BitLocker Group Policy setting, all fixed data drives that are not protected by BitLocker will be mounted as read-only.

  1. Go to: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Fixed Data Drives > Deny write access to fixed drives not protected by BitLocker.
    BitLocker Group Policy deny write access to fixed drives not protected by BitLocker
  2. Click “Enabled,” “Apply,” and “OK.”

Control use of BitLocker on removable drives

Removable disk drives, by default, can be encrypted by BitLocker on your PC. You can make changes to determine whether users can use BitLocker on removable disk drives.

  1. Policy path: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Removable Data Drives > Control use of BitLocker on removable drives.
    BitLocker Group Policy control use of BitLocker on removable drives
  2. If you disable this setting, users cannot use BitLocker on removable disk drives.
  3. Click “Apply” and “OK” if any changes have been made.

You can click the buttons below to share this post!