Home About Tools Projects Guides & Blog ⚡ Hire Me ✦ Websites Contact →
💻 Intune

How to Enable BitLocker Encryption via Microsoft Intune

BitLocker is Windows' built-in full-disk encryption feature. When a device is lost or stolen, BitLocker ensures the data on its drive is completely inaccessible without the recovery key, even if someone pulls the drive and plugs it into another machine. For any organisation managing Windows devices, it's one of the most important security controls to have in place.

Deploying it through Intune means you get silent, zero-touch encryption across your entire fleet, no user interaction required, with recovery keys automatically backed up to Microsoft Entra ID. Here's the full configuration.

Create the Policy

📋 Policy Setup

Go to the Intune Admin Centre and create a new Disk Encryption policy:

Intune Endpoint Security Disk Encryption page with Create Policy button

When prompted to choose a platform and profile:

  • Platform: Windows
  • Profile: BitLocker
Platform: Windows, Profile: BitLocker selection

Give the policy a clear name and description, something like CORP-BitLocker and "Enables BitLocker silently for all corporate Windows devices."

Policy name JDJD-CORP-BitLocker with description

Configuration Settings

⚙️ Configuration

The policy has five configuration sections. Work through each one below. All settings should match exactly, particularly the silent deployment settings in the BitLocker section.

BitLocker policy configuration sections overview

1, BitLocker

These are the top-level settings that control whether BitLocker is enforced and how it's deployed to users.

🔐
BitLocker
Global enforcement and silent deployment settings
Require Device Encryption Mandates BitLocker encryption on all targeted devices.
Enabled
Allow Warning For Other Disk Encryption Must be Disabled for silent deployment. Prevents user-facing encryption warnings and third-party encryption notifications.
Disabled
Allow Standard User Encryption Allows BitLocker to be initiated by standard (non-admin) users. Requires the warning setting above to be Disabled.
Enabled
Configure Recovery Password Rotation Controls automatic rotation of recovery passwords after use. Requires recovery backup to Entra ID to be enabled.
Not Configured
BitLocker section settings: device encryption enabled, warning disabled, user encryption enabled
⚠️
Silent deployment dependency
The two settings that enable silent deployment are Allow Warning For Other Disk Encryption → Disabled and Allow Standard User Encryption → Enabled. If you leave the warning setting enabled, users will see prompts and the deployment won't be fully silent. These two settings must work together.

2, BitLocker Drive Encryption

Sets the cipher algorithm used for each drive type. XTS-AES is stronger and the preferred choice for fixed drives, but AES-CBC should be used for removable drives that may be plugged into older Windows systems.

Drive TypeEncryption Method
Operating System Drive XTS-AES 256-bit Recommended
Fixed Data Drives AES-CBC 256-bit Recommended
Removable Data Drives AES-CBC 128-bit or 256-bit Compatible
🔑
BitLocker Drive Encryption
Cipher algorithm and strength
Choose drive encryption method and cipher strength (Windows 10 1511+)
Enabled
Encryption method, Fixed data drives
AES-CBC 256-bit
Encryption method, OS drives
XTS-AES 256-bit
Encryption method, Removable data drives
XTS-AES 256-bit
BitLocker Drive Encryption settings showing AES-CBC 256-bit for fixed, XTS-AES 256-bit for OS and removable

3, Operating System Drives

This is the most detailed section. Pay close attention to the TPM startup settings, the wrong values here will break silent installation.

💻
Operating System Drives
Encryption type, TPM startup, and recovery
Enforce drive encryption type on OS drives
Enabled
Select the encryption type Full encryption encrypts all disk space including free space. Used Space Only is faster and suits new or freshly-wiped devices.
Full Encryption
Require additional authentication at startup
Enabled
Allow BitLocker without compatible TPM
False
Configure TPM startup key Must be "Do not allow" for silent install to work.
Do not allow startup key with TPM
Configure TPM startup PIN Must be "Do not allow" for silent install to work.
Do not allow startup PIN with TPM
Configure TPM startup
Allow TPM
OS drive settings showing encryption type, TPM startup configuration
📌
OS Drives, PIN & Startup
Keep all disabled, TPM handles authentication
Configure minimum PIN length for startup Keep disabled, TPM startup is used instead.
Disabled
Allow enhanced PINs for startup
Disabled
Disallow standard users from changing the PIN or password
Not Configured
Allow InstantGo/HSTI compliant devices to opt out of pre-boot PIN
Not Configured
Enable BitLocker requiring preboot keyboard input on slates
Not Configured
PIN configuration settings all set to Disabled or Not Configured
🗝️
OS Drives, Recovery
Backup recovery keys to Entra ID
Choose how BitLocker-protected OS drives can be recovered
Enabled
Configure user storage of BitLocker recovery information
Allow 48-digit recovery password
Allow data recovery agent
False
Configure storage of BitLocker recovery info to AD DS
Store recovery passwords and key packages
Do not enable BitLocker until recovery info is stored to AD DS
True
Omit recovery options from the BitLocker setup wizard
True
Save BitLocker recovery information to AD DS for OS drives
True
Configure pre-boot recovery message and URL
Not Configured
OS drive recovery settings with AD DS backup options enabled

4, Fixed Data Drives

Applies to internal secondary data drives (D:, E:, etc.). Use the same recovery configuration as the OS drive.

💾
Fixed Data Drives
Internal secondary drives
Enforce drive encryption type on fixed data drives
Enabled
Select the encryption type
Full Encryption
Choose how BitLocker-protected fixed drives can be recovered
Enabled
Configure user storage of BitLocker recovery information
Allow 48-digit recovery password
Allow data recovery agent
False
Configure storage of BitLocker recovery info to AD DS
Store recovery passwords and key packages
Do not enable BitLocker until recovery info is stored to AD DS
True
Omit recovery options from the BitLocker setup wizard
True
Save BitLocker recovery information to AD DS for fixed drives
True
Deny write access to fixed drives not protected by BitLocker
Not Configured
Fixed data drives BitLocker recovery settings

5, Removable Data Drives

Controls BitLocker behaviour on USB drives and other removable media connected to managed devices.

🔌
Removable Data Drives
USB drives and removable media
Control use of BitLocker on removable drives
Enabled
Allow users to apply BitLocker protection on removable data drives
True
Enforce drive encryption type on removable data drives
Not Configured
Allow users to suspend and decrypt BitLocker on removable drives
False
Deny write access to removable drives not protected by BitLocker
Not Configured
Removable data drives BitLocker settings

Assign the Policy

👥 Assignment

Once all configuration settings are saved, assign the policy to the device group you want to target. In this example the policy is assigned to a corporate devices group, adjust to suit your environment.

Policy assigned to JDJ-CORP-WIN group with Include target type
Test before rolling out to everyone
Assign the policy to a small test group first, one or two devices, before rolling it out to your full device fleet. Confirm encryption completes successfully and the recovery key appears in Entra ID before widening the assignment.

Sync and Verify

✅ Verification

The policy won't necessarily apply immediately after assignment. Trigger a manual sync to speed things up, either from the Intune Admin Centre under Devices → [Device] → Sync, or using PowerShell on the device:

Once synced, check encryption status across your devices from:

Intune encryption report showing device encrypted status

The report shows each device's encryption readiness and status. A device marked Encrypted has been successfully protected. Recovery keys are accessible from Entra Admin Centre → Devices → [Device] → Recovery Keys.

ℹ️
What "Not Ready" status means
A device can show as "Encrypted" but "Not Ready" in the report, this typically means the device is encrypted but hasn't yet reported full compliance back to Intune, or there's a minor configuration mismatch. As long as the device shows Encrypted, the drive is protected. The compliance status usually resolves itself after the next full policy sync cycle.
J
Jack Davies
IT Engineer · M365 & Intune Specialist

Jack is an IT Technical Engineer based in the UK, working day-to-day with Microsoft 365, Intune, and Entra ID across a range of businesses. He holds the MS-900 certification and is studying for a BSc in Cyber Security through the Open University. Outside of work he builds and documents home lab projects, writes guides on this site, and takes on M365 consulting work for small businesses.

About Jack → LinkedIn →
// monthly tips

Get M365 tips in your inbox

Practical Intune and Microsoft 365 tips, once a month. No spam, no fluff.