Forum Discussion

Joseph Perry's avatar
Joseph Perry
Copper Contributor
Jun 08, 2017

Windows 10 SCCM OSD TMP Bitlocker Backup

What is the recomended process to ensure both the TPM and Bitlocker keys are backed up. I know AD backup was recently disabled for TPM keys in windows 10. MBAM requires a licensed SQL database, which isn't ideal.

Is there a process to do this as part of the OSD task sequence in SCCM?

Joseph

3 Replies

  • Samesh Singh's avatar
    Samesh Singh
    Copper Contributor
    If you are deploying Windows 10 1607, the TPM owner password does not need to be backed up. The TPM owner password allowed the bearer of the password to take ownership. In Windows 10 1607, only Windows 10 has the ownership of the TPM, which occurs during the installation, and then the ownership cannot be changed for the duration of the installation.
    • Joseph Perry's avatar
      Joseph Perry
      Copper Contributor

      I had a manufacturer issue with the TPM module on a dell latitude E5270, where the TPM module refused to unlock or reset without the TPM owner password. It locked because of "too many failed password attempts". It took over a week for the lock to timeout, in the mean time we had to disable bitlocker on the unit.

       

      We support a lot of remote users, and reseting the tpm owner (which requires interaction on boot) isn't ideal. Having the TPM key has been usefull.

      As a side question: I'm curious how automatically taking ownership of a tpm would effect dual booting.

      • Samesh Singh's avatar
        Samesh Singh
        Copper Contributor
        It sounds like there is a requirements for physical presence on your device. You may want to check with the manufacturer on their guidance and firmware scripting to help with the remote users. With regards to dual booting, it isn't related to that, instead we used it to switch the TPM owner between the OS and MBAM, if MBAM is used.

Resources