Blog Post

Core Infrastructure and Security Blog
8 MIN READ

ConfigMgr Bitlocker Management

Naveen_Kanneganti's avatar
Feb 01, 2021

 

 

Hi Folks! I’m Naveen kanneganti and Welcome to my blogpost.

 

Configmgr has release BitLocker Drive Encryption (BDE) in v1910 for on-premises Windows clients running Windows 10 or Windows 8.1. This feature is optional so, you must enable this feature before using it. Enable co-management and benefit from cloud-based BitLocker management with Microsoft Intune is the best approach. However, there are scenario’s where cloud is not an option and require managing on-premises clients. configmgr gives this capability from V1910 and can replace the use of Microsoft BitLocker Administration and Monitoring (MBAM). This post is intended to give you guidance to implement Configmgr Bitlocker management, monitoring and troubleshooting.

 

Configmgr will provide the following BitLocker management capabilities:

 

Client deployment

  • Bitlocker client deployment with seamless experience in configmgr console to manage devices running Windows 10 or Windows 8.1

Manage encryption policies

  • Bitlocker Drive Encryption - Settings like drive encryption and cipher strength on Operating System Drives, Fixed Data Drives and Removable Data Drives.ConfigMgr 1910 only supports starting encryption on the OS drive. It does not support starting encryption on Fixed or Removable drives but support compliance reporting .ConfigMgr 2002 supports Encryption of Fixed and Removable drives.
  • Client Management - settings like Bitlocker recovery information to be store and client checking status frequency
  • Compliance - Starting with ConfigMgr 2002 you can force users to get compliant with new security policies

  • OS Drive Management - Settings like protector for OS drive, minimum PIN length
  • Auto Unlock - When a user unlocks the OS drive specify whether to unlock only an OS drive or all attached drives.
  • Setting PIN/Password -Customize your organization's security profile on a per device basis.

Compliance reports

Built-in reports, currently available are:

  • Encryption status per volume or per device
  • The primary user of the device
  • Compliance status
  • Reasons for non-compliance

Administration and monitoring website

  • User admins outside of Configmgr console able to help with key recovery including key rotation and other BitLocker-related support

User self-service portal

  • Users able to get single-use key for unlocking a BitLocker encrypted device. Once this key is used, it generates a new key for the device.

 

Deploy and Use Bitlocker

Configmgr 1910 introduce Bitlocker management to manage manage BitLocker Drive Encryption (BDE) for configmgr managed devices.

 

Prerequisites

  • Administrator users require full administrator Role in configmgr to create Bitlocker management policies
  • for configmgr 1910 ,Https-enabled management Point is required to integrate Bitlocker recovery service

Note: if no HTTPS MP found, client will show “unable to find suitable recovery service MP” in bitlockermanagementhandler.log

 

  • From ConfigMgr 2002 , https Management point is not mandatory to work. however, just HTTPS-enable IIS website on the management point that hosts the recovery service is required
  • Client computers need to join on-premises Active directory
  • Reporting services point is required to use reports
  • IIS server is required to use self-service portal

For more information, please see https://docs.microsoft.com/en-us/configmgr/protect/plan-design/bitlocker-management

 

Following is the step by step procedure to enable Bitlocker on configmgr Managed Devices

 

Bitlocker Management Control Policy

  • Open the SCCM console
  • Go to Assets and Compliance\Overview\Endpoint Protection\BitLocker Management
  • Right-click BitLocker Management and click Create Bitlocker Management Control Policy
  • Give the name
  • Select Client Management and Operating System Drive and then click Next

 

  • On the Setup page select desired options as shown below
    • Example
      • Choose a drive encryption and cipher strength (windows 10): Enabled
      • Operating System Drives: XTS-AES 256-bit
      • Fixed Data Drives: XTS-AES 256-bit
      • Removable Data Drives: XTS-AES 256-bit

 

  • On Client Management page, select desired options as shown below and click Next
    • Example:
      • Configure Bitlocker Management Services: Enabled
      • Select bitlocker recovery information: Recovery password and key package
      • Check the box Allow recovery information to be stored in plain text
      • Enter client checking status frequency in (minutes): 90

 

  • On Operating System Drive page, select desired options as shown below and click Next
    • Example:
      • Operating System Drive Encryption Settings: Enabled
      • Allow Bitlocker without a compatible TPM (requires a password): Allow
      • Select protector for operation system drive: TPM only
      • Configure minimum PIN length for startup: 4

 

  • On the Summary Page, review your choices and click Next
  • On the Completion Page, close the wizard.

 

Deploy Bitlocker Management Control Policy

  • Right click on created PS0 Bitlocker Management Policy and click Deploy

 

  • Select desired collection and simple schedule
  • Click ok

 

 

Monitoring

  • Monitor the progress at <install location>\Logs\mpcontrol.log. When completed you’ll have the following lines in the log

Successfully ran 'C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe -ExecutionPolicy RemoteSigned -File "C:\Program Files\Microsoft Configuration Manager\bin\x64\mbamrecoveryserviceinstaller.ps1"'. Exit code = 0.

 

HandleMPRegistryChanges(): EnableMBAM() succeeded.

 

  • The following SMS_MP_MBAM service is created in IIS at Sites\Default Web Site\SMS_MP_MBAM

 

 

Client

  • When the Bitlocker Management Control Policy is deployed successfully, you will see MDOP MABM program installed at Control Panel\Programs\Programs and Features

 

  • Reg keys are created as shown below at Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement

 

  • The following 2 log files are created at c:\windows\ccm\logs
  • BitlockerManagement_GroupPolicyHandler.log
  • BitlockerManagementHandler.log

 

  • Check if the client can find Management from BitlockerManagementHandler.log

 

 

Bitlocker Encryption on clients

 

Use Case 1:

When a BitLocker Management policy is deployed to configmgr managed device, a wizard will pop on the device prompting the user to start the bitlocker encryption. This is the recommend and primary method to use. you can also enable BitLocker via Task Sequences or “manually” via manage-bde/scripts.

 

On a new computer you may run these commands manually or using task sequence during OSD or other methods to enable Bitlocker drive encryption and escrow keys to configmgr. Here is some guidance to help with commands, monitor and troubleshooting

  • Run Powershell command gwmi -class mbam_volume -Namespace root\microsoft\mbam. search for Compliant and ReasonsForNoncompliance
    • Note: the codes shown at ReasonsForNoncompliance gives the reasons for non-compliant state which helps during troubleshooting

 

  • Run Powershell command Manage-bde -status and check results as shown below
    • In this case:
      • Fully decrypted

 

  • In this scenario, Run Powershell command Manage-bde -on c: and restart computer to begin encryption of C drive by Bitlocker Drive Encryption (BDE)
  • Note: once the client receives the policy, Microsoft Bitlocker Administration and Monitoring wizard should popup on the clients (MBAM wizard may not appear for RDP/Hyper V). 

    this is the primary or recommended method to start the bitlocker encryption

 

  • Run Powershell command Manage-bde -status to check the status of bitlocker drive encryption (BDE)

 

  • Run Powershell command gwmi -class mbam_volume -Namespace root\microsoft\mbam. search for Compliant and ReasonsForNoncompliance

 

  • You can also search Deployed Bitlocker Management Control Policy in configuration manager applet located at Control Panel\System and Security for Compliant state

 

  • Check Event Viewer logs in Applications and Services Logs\Microsoft\Windows\MBAM\ for events

 

 

Use Case 2:

You may have configmgr managed devices already encrypted and escrowed to active directory. We can deploy configmgr policy and escrow keys to configmgr database. Here is some guidance to help deploy monitor and troubleshoot

  • Computer already encrypted and keys are backed with AD as shown below

 

  • You can check if recovery backup to active directory is enabled from registry HKLM\Software\Policies\Microsoft\FVE as shown below

 

  • Add computer to Bitlocker Management Policy deployed collection. refer client section to monitor policy deployment. You can monitor policy escrowed to configmgr on client from Applications and Services Logs\Microsoft\Windows\MBAM\Operational in event Viewer.

 

 

Install and configure BitLocker portals

 

Prerequisites

  • IIS server is required to use self-service portal
  • Microsoft ASP.NET MVC 4.0 is required to install on same IIS server hosting self-service portal
  • Sysadmin rights on SQL is required for the account used to run scripts to install self-service portal

For more information, please see https://docs.microsoft.com/en-us/configmgr/protect/plan-design/bitlocker-management

Note: in V1910 install Portals on Primary site. In a hierarchy having CAS, install portals on Primary sites

 

Install Portals

  • Copy the files MBAMWebSiteInstaller.ps1 and MBAMWebsite.cab from configmgr installation folder \cd.latest\SMSSETUP\BIN\X64

Note: in V190 these files are already available at configmgr installation folder \cd.latest\SMSSETUP\BIN\X64

 

 

  • Run the PowerShell command from the folder having MBAMWebSiteInstaller.ps1 and MBAMWebsite.cab files.

.\MBAMWebSiteInstaller.ps1 -SqlServerName cm01.contoso.com -SqlDatabaseName CM_PS0 -ReportWebServiceUrl http://CM01.contoso.com/ReportServer -HelpdeskUsersGroupName "contoso\PS0 CM BitLocker helpdesk users" -HelpdeskAdminsGroupName "contoso\PS0 CM BitLocker helpdesk admins" -MbamReportUsersGroupName "contoso\PS0 CM BitLocker report users" -SiteInstall Both

 

[For more information on script usage, please see https://docs.microsoft.com/en-us/configmgr/protect/deploy-use/bitlocker/setup-websites ]

 

  • Access the self-service portal via URL https:// [webserver FQDN]/SelfService

Ex: https://cm01.contoso.com/selfservice/

 

 

  • Access Administration and monitoring portal via URL https:// [webserver FQDN]/helpdesk

Ex: https://cm01.contoso.com/helpdesk/

 

  • After installation of self-service portal, you can customize portal. Go to Sites>Default Web Site>SelfService node. In the details pane, ASP.NET group, click Application Settings.
    • CompanyName = The organization name displays in self-service portal
    • DisplayNotice = notice that the user has to acknowledge in self-service portal
    • HelpdeskText = helpdesk contact info
    • HelpdeskUrl = The link for the HelpdeskText string.
    • NoticeTextPath = The text of the initial notice that the user requires to acknowledge. By default, the full file path on the web server is C:\inetpub\Microsoft BitLocker Management Solution\Self Service Website\Notice.txt. Edit and save the file in a plain text editor.

 

Administration and monitoring Portal

  • At Bitlocker recovery screen, note first 8 characters of recovery Key ID

Ex: CB3AB643

 

  • Logon to Administration and monitoring website via URL https:// [webserver FQDN]/helpdesk. Give User Domain, User ID, first 8 characters of recovery Key ID (Ex: CB3AB643) and Reason for Drive Unlock. click Submit.

 

  • Copy the Drive Recovery Key

 

  • Give the recovery key from previous step then press enter

 

  • Continue to Windows log in screen

 

Self-service portal

  • At Bitlocker recovery screen, note first 8 characters of recovery Key ID

Ex: A5A530CC

 

  • Log on to the self-service portal via URL https://[webserver FQDN ]/SelfService using User credentials of the computer from another device. Check the box “I have read and understand the above notice” and click continue

Ex: https://cm01.contoso.com/selfservice/

 

  • Give the Recovery Key ID (ex: A5A530CC) and select a Reason from drop down menu. Click Get Key and then Copy the Bitlocker recovery key generated

 

  • Give the recovery key from previous step then press enter

 

  • Continue to Windows log in screen

 

Hope this step by step process and Monitoring helps in deployment and troubleshooting!

If you are looking to manage BitLocker from Azure please check URL : https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/bitlocker-intune-and-raven/ba-p/1048033

 

Best Regards

Naveen Kanneganti
Premier Field Engineer 
 

Microsoft Services

 

 

 

 

Updated Jan 29, 2021
Version 5.0
  • Sohel68's avatar
    Sohel68
    Copper Contributor

    Hello Naveen,

     

    I'm new to Microsoft Bitlocker, currently we use McAfee to manage and encrypt our devices, however, the plan is to move all devices to Microsoft and manage them via Intune/MEM  in a few months. I'm running into issues with Bitlcoker policies, they are not getting applied properly when applied from Intune/MEM.

    Microsoft support is recommending that I should consider using a standalone "MBAM". 

    We have SCCM (Config manager) in place and our systems are co-managed. Our workload has been configured for Intune\MEM to manage "Endpoint protection".

     

    Questions:

    1) Should I use SCCM (config manager) just for "Bitlocker" and disable "Bitlocker" policy in Intune\MEM?

    2) Manage "Bitlocker" policy from Intune\MEM only?

    3) Setup a standalone MBAM to manage "Bitlcoker"?

     

    Your help is much appreciated

     

  • for a co-managed devices, if you set the workload to Intune , it will use Intune and not save keys to ConfigMgr.
    In ConfigMgr, features are being added with each release of ConfigMgr. you can see lot of new functionality added for Bitlocker management when compare with MECM 1910 to latest ConfigMgr version. with ConfigMgr I can see very few similar MBAM GPO's functionality are missing however, the BitLocker management settings are fully compatible with MBAM group policy settings. If devices receive both group policy settings and Configuration Manager policies, configure them to match.
    https://docs.microsoft.com/en-us/mem/configmgr/protect/deploy-use/bitlocker/deploy-management-agent

     

    not sure about your requirements and I can see some similar functionality in MABAM are not  in Intune at the moment like you require to use PowerShell script to save the key to Azure AD when the device is HAADJ etc..
    https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises#powershell-examples

     

    Microsoft BitLocker Administration and Monitoring (MBAM) End of Life :
    https://support.microsoft.com/en-us/lifecycle/search/18037

     

    please check comment section here as well : https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/bitlocker-intune-and-raven/ba-p/1048033

     

  • Rajesh_Varadhan's avatar
    Rajesh_Varadhan
    Copper Contributor

    Dear Naveen,

     

    The information providing is very useful. I would like to thank you for the detailed information.

     

    I have a issue in populating the recovery in Configmgr database.

     

    Presently the BitLocker environment is managed by MBAM standalone. As the product is getting retried. Planning to leverage MEMCM BitLocker management feature.

     

    • Enabled BitLocker feature in MEMCM 2107.
    • Created policies and deployed to test collection.
    • Disabled Group Policy for respective OU.
    • Newly built machines BitLocker keys are getting populated in MEMCM database, whereas existing machines keys are not populating to database. However, MDOP clients are getting upgraded to MEMCM versions.

     

    • No error found in "BitlockerManagementHandler.log"
    • In Group policy (BitlockerManagement_GroupPolicyHandler.log) found the below error.

    Failed to delete registry value SOFTWARE\Policies\Microsoft\FVE\MDOPBitLockerManagement\AutoUnlockFixedDataDrive (0x80070002)

     

    How can i force the recovery key to MEMCM database.

     

    Your help is much appreciated

     

    Regards

    Rajesh


  • When you deploy BitLocker management policies in Configuration Manager, clients automatically upload recovery keys and packages to the Configuration Manager recovery service

     

    If a group policy setting exists for standalone MBAM, it will override the equivalent setting attempted by Configuration Manager. Standalone MBAM uses domain group policy, while Configuration Manager sets local policies for BitLocker management. Domain policies will override the local Configuration Manager BitLocker management policies. If the standalone MBAM domain group policy doesn't match the Configuration Manager policy, Configuration Manager BitLocker management will fail. For example, if a domain group policy sets the standalone MBAM server for key recovery services, Configuration Manager BitLocker management can't set the same setting for the management point. This behavior causes clients to not report their recovery keys to the Configuration Manager BitLocker management key recovery service on the management point.

     

  • Rajesh_Varadhan's avatar
    Rajesh_Varadhan
    Copper Contributor

     As informed, Event id : 2 & 18 is giving some error. I have uploaded the event screen shot for your reference. Please let me know id you need any further logs.