What causes BitLocker Recovery Mode? (2024)

Sysadmins often ask us about BitLocker Recovery Mode. They have implemented BitLocker as their endpoint encryption solution which means that the IT service desk now has to issue recovery keys. Here’s where it gets complicated – the recovery keys are 25-digit hexadecimal numbers which are awkward to read, but also hear over a phone line.

This blog will look at the root causes of BitLocker Recovery Mode, and how your organization can mitigate the issue with self-service key recovery.

What causes BitLocker Recovery Mode? (2)

Minimize encryption lockout calls to the service desk with self-service key recovery

What is BitLockerDrive Encryption?

Let’s start with an overview of BitLocker.BitLocker Drive Encryption, which is commonly referred to simply as BitLocker, allows Windows users to encrypt hard drives in an effort to keep data secure. BitLocker has been a part of the Windows operating systemsince 2007but Microsoft greatly enhanced BitLocker in Windows 10 version 1511, by introducing new encryption algorithms and making it possible to configure group policy settings separately for fixed data drives, removable data drives, and operating system drives.

BitLockerauthenticationmethodscantriggeruserlockouts. The most common authentication method is using the Trusted Protection Module (TPM), a microchip that is built into some laptops and desktops. It automatically decrypts hard drives on startup, without requiring the use of a PIN code, USB, or other form of authentication. This method does not require the user to do anything, and it is the least secure.

Microsoft recommends using the TPM with a BitLocker PIN or startup key loaded on a USB to uplift security. Both options require user interaction and can lead to lockouts in the event of a forgotten PIN, or lost USB.

Authenticating to BitLocker

Let’s start with an overview of BitLocker authentication methods since they can trigger lockouts. The most common authentication method is using the Trusted Protection Module (TPM), a microchip that is built into some laptops and desktops. It automatically decrypts hard drives on startup, without requiring the use of a PIN code, USB, or other form of authentication. This method does not require the user to do anything, and it is the least secure.

Microsoft recommends using the TPM with a BitLocker PIN or startup key loaded on a USB to uplift security. Both options require user interaction and can lead to lockouts in the event of a forgotten PIN, or lost USB.

Causes of BitLocker Recovery Mode

BitLocker Recovery Mode can occur for many reasons, including:

Authentication errors:

  • Forgetting the PIN
  • Entering incorrect PIN too many times (activating the anti-hammering logic of the TPM)
  • Using a keyboard with a different layout that doesn’t enter the PIN correctly, or one that doesn’t map as assumed by the pre-boot environment
  • Losing the USB flash drive containing the startup key

Boot/BIOS changes:

  • Turning off BIOS support for reading USB devices in the pre-boot environment when using USB-based keys
  • Changing the BIOS boot order to boot another drive ahead of the hard drive (such as giving a CD or DVD drive boot sequence priority)
  • Upgrading critical early startup components such as BIOS upgrades
  • Changes to the master boot record (MBR) on the disk
  • Changes to the boot manager (bootmgr) on the disk
  • Failing to boot from a network drive before booting from the hard drive
  • Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive

Hardware, software and firmware changes:

  • Inserting or removing a CD/DVD
  • Docking or undocking a portal computer if the computer was (respectively) undocked or docked when BitLocker was turned on
  • Changes to NTFS partition table on the disk including: Creating, Deleting, Resizing primary partition
  • Turning off, disabling, deactivating, or clearing the TPM
  • Updating option ROM firmware
  • Upgrading TPM firmware
  • Adding or removing hardware
  • Adding or removing add-in cards (such as video or network cards), or upgrading firmware on add-in cards

Other triggers:

  • Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile
  • Hiding the TPM from the operating system
  • Moving the BitLocker-protected drive to a different system
  • Upgrading the motherboard to a new one with a new TPM
  • Failing the TPM self-test
  • Having a BIOS or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer
  • Changing the usage authorization for the storage root key of the TPM to a non-zero value
  • Disabling the code integrity check or enabling test signing on Windows Bootmgr
  • Removing, inserting, or completely depleting the charge on a smart battery (portal computer)
  • Pressing the F8 or F10 key during the boot process

What are PCR’s?

A lot of the above reasons are self-explanatory, but Modifying the Platform Configuration Registers (PCRs) is not always fully understood, or configured correctly. Basically, these settings tell the TPM chip what to check, during the power-on cycle, that the disk is still booting inside a valid machine that hasn’t been tampered. If the check completes, the TPM chip will release the keys to allow BitLocker to boot the encrypted disk.

When a machine is encrypted it stores the state of the BIOS/UEFI settings. Any changes to this state can cause the BitLocker recovery mode to kick in. This could be something as simple as choosing a different boot device at startup if not configured correctly based on the network requirements of yourorganization. E.g. if you normally boot from Hard Disk but need to boot from a CD/NIC/USB for some reason.

In an enterprise environment the PCR settings are configured using Group Policy. For BIOS-based computers, you can find the settings here:

Computer Configuration>Polices>Administrative Templates>Windows Components > BitLocker Drive Encryption > Operating System Drives > Configure TPM platform validation profile for Bios-based firmware configurations

But don’t forget your UEFI based computers must be configured in a separate location as shown here:

Computer Configuration>Polices>Administrative Templates>Windows Components > BitLocker Drive Encryption > Operating System Drives > Configure TPM platform validation profile for native UEFI firmware configurations

If you are using MDOP MBAM to deploy and configure BitLocker, these settings can be found in the ADMX templates that are added as depicted below:

For BIOS-based settings there is a great blog post about them here:

For UEFI-based Computers, which tend to be more prevalent today. I’ll cover the PCR’s in more detail below. Microsoft recommends using PCRs 0, 2, 4 and 11. Note: PCR 11 must be enabled as this is specific to enabling BitLocker on the device.

  • PCR 0: Core System Firmware Executable Code – Checks for changes to the code on the UEFI firmware – this includes Firmware Updates!
  • PCR 1: Core System Firmware Data – Changes to usually static data (serial, model numbers), but also things like the amount of RAM and CPU type.
  • PCR 2: Extended or pluggable executable code – Option ROM checking for external devices i.e. what’s plugged in during boot and is it valid/has it changed.
  • PCR 3: Extended or pluggable firmware data – Option ROM static data i.e. optional hardware components such as network cards or firmware that might be used during the booting process.
  • PCR 4: Boot Manager – Is your device likely to boot from the same device all the time. Do you push OS deployments from the network using PXE boot? Or has dual boot enabled? Then you might not want to enable this check.
  • PCR 5: GPT/Partition Table – This will check for any changes to the Partition lists e.g. adding and removing partitions, resizing disks, etc.
  • PCR 6: Resume from S4 and S5 power state events – Checks to see if the system has resumed from Hibernation(S4) or a Soft Off (S5).
  • PCR 7: Secure Boot State – Has this changed or is this likely to change?
  • PCR 8/9/10 and 16/17/18/19/20/21/22: Reserved for future use, not defined yet.
  • PCR 11: BitLocker Access Control – this must be enabled.
  • PCR 12/13/14/15: Looks for changes to the OS Kernel, File system, libraries, network connections etc.

What isBitLocker recovery key

ABitLocker recovery key isa 48- digitnumerical passwordused to unlock your BitLocker encrypted drive whenBitLocker has triggered a lockoutThekeyisgeneratedduringaBitLocker installation.

Finding yourBitLockerrecovery keyin Windows 10

There are several places that your recovery key may be, depending on the choice that was made when activating BitLocker.These places can include:

  • Your Microsoft account: Sign into your Microsoft account from an unlocked device. If your primary device supports automated device encryption, the recovery key will likely be stored in your Microsoft account.
  • A USB flash drive: If your recovery key was stored on a USB drive, simply plug the USB device into the locked computer and follow the instructions.
  • A .txt file: If the recovery key was stored in a .txt file on a USB drive, plug the USB drive into an unlocked device to access the code.
  • In Active Directory: If the locked device was ever signed into your organization account, the recovery key may be stored in your Active Directory account. While you may be able to access it on your own, contacting a system administrator may be necessary.

Self-service Key Recovery

Because there are so many lock out triggers that can cause a system to enter BitLocker recovery mode, it is important for organizations to have a  self-service encryption key recovery solution that users can use to unlock their devices without having to contact the helpdesk (especially since MBAM is no longer available). Given the highly sensitive nature of BitLocker keys, it is critical for such a solution to include a multi-factor authentication mechanism that requires the user to do more than just answer a question. Challenge / response-based authentication systems can be easy tofool andmaybecomea point of vulnerability for the organization. 

Well that’s where our enterprise solution, Specops Key Recovery, comes in! When a user is prompted for a BitLocker recovery key, they can use the solution to prove their identity with multi-factor authentication (Google Authenticator, Duo Security, SMS, etc.) without having to call the service desk.

Using the information above you should be able to find a good balance between security and usability when deploying BitLocker to your organisation.

What causes BitLocker Recovery Mode? (6)

What causes BitLocker Recovery Mode? (2024)

FAQs

Why did my computer go into BitLocker Recovery? ›

If you experiences that the computer shows BitLocker recovery screen after power on, it means that the HDD/SDD has been encrypted. (HDD/SDD is locked.) Once PC hardware components have been replaced or BIOS settings have been changed, all may cause system shows BitLocker recovery screen after power on.

What will trigger BitLocker recovery mode? ›

BitLocker recovery scenarios
  1. Entering the wrong PIN too many times.
  2. Turning off the support for reading the USB device in the preboot environment from the BIOS or UEFI firmware if using USB-based keys instead of a TPM.
  3. Having the CD or DVD drive before the hard drive in the BIOS boot order (common with virtual machines)
Jun 18, 2024

Why am I being prompted for BitLocker recovery key? ›

BitLocker stores system details when first turned on and prompts for a recovery key if major changes are detected. If prompted on every startup, one can update BitLocker's record of the system by suspending and resuming BitLocker.

Why did my BitLocker activate? ›

Windows interprets this as approval to encrypt. BitLocker encryption is often intentionally activated by or on behalf of a user with full administrative access to your device.

How to get rid of BitLocker recovery? ›

To exit the BitLocker recovery screen, you will need to enter the recovery key. The recovery key is a 48-digit code that was provided to you when you first enabled BitLocker on your device.

Is it possible to unlock BitLocker without a key? ›

If you don't have the BitLocker password and recovery key, you may need to format the drive to remove the encryption, or use the third-party tools, such as Passware Kit, Elcomsoft Forensic Disk Decryptor, and Elcomsoft Distributed Password Recovery.

What hardware changes trigger BitLocker? ›

Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. For example: Changing the BIOS boot order to boot another drive in advance of the hard drive. Adding or removing hardware, such as inserting a new card in the computer.

What turns on BitLocker? ›

Navigate to Start and open Control Panel. Under System and Security, navigate to BitLocker Drive Encryption > Operating System Drive > Turn on BitLocker.

How do I get my BitLocker recovery key when locked out? ›

There are several places that your recovery key may be, depending on the choice that was made when activating BitLocker:In your Microsoft account: Sign in to your Microsoft account on another device to find your recovery key (Here: https://account.microsoft.com/devices/recoverykey?refd=support.microsoft.com)On a ...

How to fix preparing BitLocker recovery? ›

  1. Bypass the Recovery Screen. Fix 1. Suspend BitLocker Protection...Full steps. Fix 2. Enter the BitLocker Recovery Key...Full steps.
  2. Change the Boot Way. Fix 3. Switch to the Legacy Boot...Full steps. Fix 4. ...
  3. Revise the Program or Disk. Fix 5. Remove Protectors on Startup Disk...Full steps. Fix 6. ...
  4. Disable Startup Options.
Jul 24, 2024

How to unsuspend BitLocker? ›

From the Control Panel menu, click on “System and Security”. From the System and Security menu, click on “BitLocker Drive Encryption”. Under “Operating system drive”, select “Resume protection”.

How to reset a laptop without BitLocker recovery key? ›

How to Reset PC Without BitLocker Recovery Key
  1. Click the Power icon at the bottom of your computer's screen, and then hold the Shift key and select Restart to enter WinRE.
  2. Access the Advanced options menu, and then click on Troubleshoot > Reset this PC.
Jun 13, 2024

Why am I getting BitLocker recovery every time? ›

Whenever you connect a drive to your PC and it is detected in the boot list, BitLocker will ask for the recovery key. If you're not connecting any devices and it keeps asking for the recovery key, it is because the boot support for Preboot for TBT and USB-C/TBT is turned on by default.

What would trigger BitLocker? ›

Bitlocker recovery mode can be triggered by a number of situations, including: A malicious attempt by a person or software to change the startup environment. Rootkits are one example. Moving the BitLocker-protected drive into a new computer.

Why is my laptop suddenly BitLocker? ›

If you changed something in the hardware configuration or updated BIOS (most likely) it triggers the Bitlocker. It thinks the HDD was taken out of the original PC and someone is trying to steal the info from another PC.

Why is my computer asking for BitLocker recovery key after Windows Update? ›

Open a web browser on another device, navigate to https://aka.ms/aadrecoverykey and log in to your work or school account, then click on [Devices]①. Expand the device for which you want to find the BitLocker recovery key②, and then click [View Bitlocker Keys]③. Match the Key ID, and then click [Show recovery key]④.

How do I unlock BitLocker? ›

To unlock their drives, users must open “This PC” (or “My Computer”, depending on the version of Windows), right-click on the encrypted drive icons with the locked yellow padlock icon, click "Unlock Drive" and provide the Password.

Is BitLocker legit? ›

Not 100% Secure: While BitLocker provides strong protection against most cyber threats, there are some cases where it can be bypassed by malicious actors with sophisticated techniques.

Top Articles
Guide to Taxes for Content Creators | April Help Center
Ram to conclude production of V-8 TRX supertruck at end of year
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5483

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.