Forum Discussion
How to disable automatic BitLocker implementation when using Autopilot OOBE experience to join a dev
Hi JoeSay,
To prevent BitLocker from being automatically enabled and ensure that Workspace ONE manages BitLocker keys when using Autopilot and Entra ID (formerly Azure AD), you can configure specific settings in Intune and Autopilot profiles. Here's how you can achieve this:
How to Disable Automatic BitLocker Implementation
1. Modify the Intune Device Configuration Profile
First, you need to configure a device configuration profile in Intune to disable automatic BitLocker encryption.
Sign in to the Microsoft Endpoint Manager admin center:
- Go to https://endpoint.microsoft.com.
Create a Device Configuration Profile:
- Navigate to Devices > Configuration profiles > Create profile.
- Select Windows 10 and later as the platform.
- Choose Templates > Endpoint protection.
- Click Create.
Configure BitLocker Settings:
- In the Configuration settings page, expand Windows Encryption.
- Set Require BitLocker to Not configured.
- Optionally, configure any other settings as needed, but ensure that automatic BitLocker encryption is disabled.
Assign the Profile:
- Assign the configuration profile to the appropriate device groups.
2. Configure Autopilot Profile to Disable BitLocker
Next, configure the Autopilot profile to ensure BitLocker is not enabled during the Out-of-Box Experience (OOBE).
Create or Modify an Autopilot Profile:
- In the Microsoft Endpoint Manager admin center, navigate to Devices > Windows > Windows enrollment > Deployment profiles.
- Select an existing Autopilot profile or create a new one.
Edit the Autopilot Profile Settings:
- In the Out of box experience (OOBE) section, ensure the following settings:
- Convert all targeted devices to Autopilot: Enabled (if applicable).
- Deployment mode: User-driven or Self-deploying (depending on your scenario).
- Join to Azure AD as: Azure AD joined.
- Apply device name template: (optional).
- BitLocker: Select Disable to prevent automatic BitLocker encryption during the Autopilot process.
- In the Out of box experience (OOBE) section, ensure the following settings:
Assign the Profile:
- Assign the Autopilot profile to the appropriate groups of devices.
3. Configure Workspace ONE for BitLocker Management
Ensure that Workspace ONE is configured to manage BitLocker encryption and keys.
Configure BitLocker Policies in Workspace ONE:
- Go to the Workspace ONE UEM console.
- Navigate to Devices > Profiles & Resources > Profiles.
- Create or edit a Windows profile to manage BitLocker settings.
Deploy Workspace ONE as MDM:
- Ensure Workspace ONE is set as the MDM authority for the devices.
- During the provisioning process, Workspace ONE should be downloaded and installed automatically.
Conclusion
By following these steps, you can disable automatic BitLocker implementation during the Autopilot OOBE and ensure that Workspace ONE manages BitLocker keys. This allows you to join your workstations to Entra ID without automatic BitLocker encryption and utilize Workspace ONE for managing BitLocker.
If you have any further questions or need additional assistance, feel free to ask.
Please click Mark as Best Response & Like if my post helped you to solve your issue.
This will help others to find the correct solution easily. It also closes the item.
If the post was useful in other ways, please consider giving it Like.
- DTBJul 02, 2024Iron ContributorYes correct. Intune is used to "disable" this setting with a configuration which will be deployed to the endpoints.