Encrypted hard drives (2024)

  • Article
  • Applies to:
    Windows 11, ✅ Windows 10, ✅ Windows Server 2022, ✅ Windows Server 2019, ✅ Windows Server 2016

Overview

Encrypted hard drives are a class of hard drives that are self-encrypted at the hardware level and allow for full disk hardware encryption while being transparent to the user. These drives combine the security and management benefits provided by BitLocker Drive Encryption with the power of self-encrypting drives.

By offloading the cryptographic operations to hardware, encrypted hard drives increase BitLocker performance and reduce CPU usage and power consumption. Because encrypted hard drives encrypt data quickly, BitLocker deployment can be expanded across enterprise devices with little to no impact on productivity.

Encrypted hard drives provide:

  • Better performance: Encryption hardware, integrated into the drive controller, allows the drive to operate at full data rate with no performance degradation
  • Strong security based in hardware: Encryption is always on and the keys for encryption never leave the hard drive. User authentication is performed by the drive before it unlocks, independently of the operating system
  • Ease of use: Encryption is transparent to the user, and the user doesn't need to enable it. Encrypted hard drives are easily erased using on-board encryption key; there's no need to re-encrypt data on the drive
  • Lower cost of ownership: There's no need for new infrastructure to manage encryption keys, since BitLocker uses your existing infrastructure to store recovery information. Your device operates more efficiently because processor cycles don't need to be used for the encryption process

Encrypted hard drives are supported natively in the operating system through the following mechanisms:

  • Identification: The operating system identifies that the drive is an encrypted hard drive device-type
  • Activation: The operating system disk management utility activates, creates and maps volumes to ranges/bands as appropriate
  • Configuration: The operating system creates and maps volumes to ranges/bands as appropriate
  • API: API support for applications to manage encrypted hard drives independent of BitLocker drive encryption
  • BitLocker support: Integration with the BitLocker Control Panel provides a seamless BitLocker user experience

Warning

Self-encrypting hard drives and encrypted hard drives for Windows are not the same type of devices:

  • encrypted hard drives for Windows require compliance for specific TCG protocols as well as IEEE 1667 compliance
  • self-encrypting hard drives don't have these requirements

It's important to confirm that the device type is an encrypted hard drive for Windows when planning for deployment.

When the operating system identifies an encrypted hard drive, it activates the security mode. This activation lets the drive controller generate a media key for every volume that the host computer creates. The media key, which is never exposed outside the disk, is used to rapidly encrypt or decrypt every byte of data that is sent or received from the disk.

If you're a storage device vendor who is looking for more info on how to implement encrypted hard drive, see the encrypted hard drive device guide.

System Requirements

To use encrypted hard drives, the following system requirements apply:

For an encrypted hard drive used as a data drive:

  • The drive must be in an uninitialized state
  • The drive must be in a security inactive state

For an encrypted hard drive used as a startup drive:

  • The drive must be in an uninitialized state
  • The drive must be in a security inactive state
  • The computer must be UEFI 2.3.1 based and have the EFI\_STORAGE\_SECURITY\_COMMAND\_PROTOCOL defined. This protocol is used to allow programs running in the EFI boot services environment to send security protocol commands to the drive
  • The computer must have the compatibility support module (CSM) disabled in UEFI
  • The computer must always boot natively from UEFI

Warning

All encrypted hard drives must be attached to non-RAID controllers to function properly.

Windows edition and licensing requirements

The following table lists the Windows editions that support Encrypted hard drive:

Windows ProWindows EnterpriseWindows Pro Education/SEWindows Education
YesYesYesYes

Encrypted hard drive license entitlements are granted by the following licenses:

Windows Pro/Pro Education/SEWindows Enterprise E3Windows Enterprise E5Windows Education A3Windows Education A5
YesYesYesYesYes

For more information about Windows licensing, see Windows licensing overview.

Configure encrypted hard drives as startup drives

To configure encrypted hard drives as startup drives, use the same methods as standard hard drives:

  • Deploy from media: configuration of encrypted hard drives happens automatically through the installation process
  • Deploy from network: this deployment method involves booting a Windows PE environment and using imaging tools to apply a Windows image from a network share. With this method, the Enhanced Storage optional component needs to be included in the Windows PE image. Enable this component using Server Manager, Windows PowerShell, or the DISM command line tool. If the component isn't present, configuration of encrypted hard drives doesn't work
  • Deploy from server: this deployment method involves PXE booting a client with encrypted hard drives present. Configuration of encrypted hard drives happens automatically in this environment when the Enhanced Storage component is added to the PXE boot image. During deployment, the TCGSecurityActivationDisabled setting in unattend.xml controls the encryption behavior of encrypted hard drives
  • Disk duplication: this deployment method involves use of a previously configured device and disk duplication tools to apply a Windows image to an encrypted hard drive. Images made using disk duplicators don't work

Configure hardware-based encryption with policy settings

There are three policy settings to manage how BitLocker uses hardware-based encryption and which encryption algorithms to use. If these settings aren't configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:

  • Configure use of hardware-based encryption for fixed data drives
  • Configure use of hardware-based encryption for removable data drives
  • Configure use of hardware-based encryption for operating system drives

Encrypted hard drive architecture

Encrypted hard drives utilize two encryption keys on the device to control the locking and unlocking of data on the drive. These encryption keys are the Data Encryption Key (DEK) and the Authentication Key (AK):

  • the Data Encryption Key is used to encrypt all the data on the drive. The drive generates the DEK and it never leaves the device. It's stored in an encrypted format at a random location on the drive. If the DEK is changed or erased, data encrypted using the DEK is irrecoverable.
  • the AK is the key used to unlock data on the drive. A hash of the key is stored on the drive and requires confirmation to decrypt the DEK

When a device with an encrypted hard drive is in a powered-off state, the drive locks automatically. As a device powers on, the device remains in a locked state and is only unlocked after the AK decrypts the DEK. Once the AK decrypts the DEK, read-write operations can take place on the device.

When data is written to the drive, it passes through an encryption engine before the write operation completes. Likewise, reading data from the drive requires the encryption engine to decrypt the data before passing that data back to the user. If the AK needs to be changed or erased, the data on the drive doesn't need to be re-encrypted. A new Authentication Key needs to be created and it re-encrypts the DEK. Once completed, the DEK can now be unlocked using the new AK, and read-writes to the volume can continue.

Reconfigure encrypted hard drives

Many encrypted hard drive devices come preconfigured for use. If reconfiguration of the drive is required, use the following procedure after removing all available volumes and reverting the drive to an uninitialized state:

  1. Open Disk Management (diskmgmt.msc)
  2. Initialize the disk and select the appropriate partition style (MBR or GPT)
  3. Create one or more volumes on the disk.
  4. Use the BitLocker setup wizard to enable BitLocker on the volume.
Encrypted hard drives (2024)

FAQs

How do I remove encryption from my hard drive? ›

  1. Type and search [Manage BitLocker] in the Windows search bar①, then click [Open]②.
  2. Click [Turn off BitLocker]③ on the drive that you want to decrypt. ...
  3. Confirm whether you want to decrypt your drive, then select [Turn off BitLocker]④ to start turning off BitLocker, and your drive will not be protected anymore.
Oct 24, 2023

What does it mean to have an encrypted hard drive? ›

Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password.

Is full disk encryption enough? ›

What Full Disk Encryption is Good For. FDE prevents unauthorized access to your entire hard drive all at once. Thousands of computers — especially laptops — are lost or stolen every week. Without full disk encryption, whoever finds (or has stolen) your computer can access the data on your drive.

Should I turn on disk encryption? ›

Full disk encryption protects the data on your device in the event it is lost or stolen. Without full disk encryption, if the data drive in the computer is removed, the data can be easily read and accessed.

How do I unlock an encrypted hard drive? ›

You can unlock a hard drive by using the appropriate software tools, passwords, or encryption keys, depending on how the drive is locked. For BitLocker, use the recovery key. If it's an operating system (OS) password, you may need to enter the correct credentials or consult the drive instructions.

Can an encrypted hard drive be recovered? ›

To access data from an encrypted storage device that has broken down, there are two factors you need on your side: the decryption credentials, and a team of data recovery experts to repair your storage device and recovery your encrypted files.

Do I need to wipe an encrypted drive? ›

While encryption is one of the most popular methods of protecting business-critical information from data theft, however, when the encrypted device is at rest and data is no longer needed, it is advisable to wipe the encrypted drive using data erasure software to prevent data compromise and any adverse impact of data ...

What is a disadvantage of encrypting a drive? ›

Drawbacks of full-disk encryption

If users forget their password and lose their recovery key, the device will be inaccessible to them, and they will be locked out just like an intruder. Data in transit isn't protected, so data shared between devices and through email is still vulnerable to hacking.

Can an encrypted hard drive be decrypted? ›

Yes, you should be able to, unless you loss the decryption key. You should not lose the key or password or paraphrase or whatever you lock your encryption with. If you do not have any one of those, then you lose the content of the hard disk.

Can an encrypted hard drive be hacked? ›

The short answer is no, encryption alone cannot prevent you from getting hacked. Let's look into how and why it can help you avoid cybersecurity threats anyway.

Is full disk encryption overkill? ›

Recommendation: You can usually safely turn on disk encryption with HDDs, as it likely won't cause many problems regarding CPU load even within HCI . However the performance penalty in throughput and IOPS can be quite tremendous compared to non-encrypted operation.

Is encryption good enough? ›

Only people with the right key can decode and see the information. It's like having a lock and key for your data, which gives you some safety. But even though encryption is strong, it's not perfect. People who want to steal data are always finding new ways to break these codes.

Does Windows 10 automatically encrypt hard drive by default? ›

When you first sign in or set up a device with a Microsoft account, or work or school account, Device Encryption is turned on and a recovery key is attached to that account.

Are Windows 10 hard drives encrypted? ›

Windows. Device encryption is available on all editions of Windows 10, but BitLocker encryption is available only on Windows 10 Pro, Enterprise or Education versions.

Does hard drive encryption slow down a computer? ›

And on modern hardware, encryption and decryption using the AES standard takes place in the CPU, which means that any impact on data transfer speeds is negligible.

How to unencrypt hard drive? ›

Enable Device Encryption
  1. Sign in to Windows with an administrator account.
  2. In the Settings app on your Windows device, select Privacy security > Device encryption or use the following shortcut: Device encryption. ...
  3. Use the toggle button to turn Device Encryption On.

How do I turn off encryption on my external hard drive? ›

Step 1. Access the Control Panel and navigate to "System and Security" > "BitLocker Drive Encryption". Step 2. Click on "Turn off BitLocker" for the specific drive you wish to decrypt.

How do I remove encryption from my WD external hard drive? ›

Steps to Remove WD Unlocker
  1. Download and install WD Drive Utilities. WD Drive Utilities for Windows. WD Drive Utilites for macOS. ...
  2. Open WD Drive Utilities.
  3. Enter unknown Password. Click Unlock Drive. IMPORTANT: ...
  4. Enter a Volume Name. Select Format. ...
  5. Click Close.
Oct 6, 2023

Top Articles
The Most Reliable Estimate is
What Credit Score Is Needed For Chase Credit Cards? | Bankrate
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 6739

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.