logo
BitlockerTPM and PIN and Startup Key Protection

How to Set TPM and PIN and Startup key BitLocker Protection?

My former computer didn’t support TPM, so I had to set "Allow BitLocker without a compatible TPM". I recently equipped it with TPM 2.0, and now I want to change the BitLocker authentication process to TPM + PIN + startup key triple verification. Is this feasible?

author

Lydia

Your idea is actually excellent and workable. Microsoft BitLocker does offer a variety of authentication mechanisms for us, and the mode you select, combining three of common modes, indeed provides the highest level of security.

The setup process needs modifications in the Local Group Policy, and for the sake of security, ensure that your BitLocker recovery key has been securely saved in a safe location.

Steps to Set TPM and PIN and Startup Key

Before start, assure BitLocker encryption is enabled for system drive and is in unlock state. The steps are similar to setting up TPM + PIN mode and TPM + USB key mode, but with few differences in some details. Pay attention to each following step:

Step 1 Make sure that the system has TPM enabled. In Windows 10, using TPM 2.0 requires the extra GPT partition style. So even if TPM is correctly installed, you may still encounter issues with TPM failing to prepare. Upon resolving, turn to next step.

Step 2 Type "Edit group policy" then click the specific result to open Local Group Policy.

Step 3 Navigate to "Computer Configuration" > "Administrative Templates" > "Windows Components" > "BitLocker Drive Encryption" > "Operating System Drives" > "Require additional authentication at startup".

BitLocker Drive Encryption in Local Group Policy Editor

Require Additional Authentication at Startup

Step 4 Uncheck "Allow BitLocker without a compatible TPM", then set the first three options below to "do not allow" and the fourth to "Require startup key and PIN with TPM".

Require Startup Key and Pin with TPM

Step 5 Plug the USB flash drive, and run Command Prompt as Administrator, execute the command below:

manage-bde -protectors -add c: -TPMandPINandStartupKey -tp 123456 -tsk e:

# c is the encrypted system drive letter, while 123456 is PIN, e is the flash drive letter

Step 6 Check whether BitLocker Key Protectors are in effect on system drive:

manage-bde -status

Additional Notes

Note that don’t store the USB startup key file and the recovery key file in the same location. Otherwise, when inserting this USB drive into computer, it may cause the computer to automatically boot from the recovery key, thus bypass the TPM system integrity check. Also with great danger of data being unrecoverable if you lost the USB drive.

To enhance the key security, you can copy the startup key file and stored it in multiple flash drive for backup. If you lost both BitLocker startup key and pin, you can unlock the drive with BitLocker recovery key's help.

People Also Ask

What Authentication Mechanisms Are Available With BitLocker?

Sure, I’m glad to answer your questions. Pre-boot authentication with BitLocker refers to the process of confirming your identity before entering the system.

author Benjamin

How can I set a PIN code to protect BitLocker encrypted drives?

PIN BitLocker in Windows 11 and BitLocker password are two totally different things, because their protection mechanism is not the same. Following I will answer your questions in detail.

author Lydia

Which way to create BitLocker USB key for data encryption?

Right here to answer it for you. The BitLocker USB key, known as the USB startup key, is typically used for storing BitLocker key on a USB flash drive in the form of a file.

author Lydia

How do I enable TPM BitLocker protection mode?

TPM (Trusted Platform Module) is an important part of BitLocker encryption and one of the BitLocker password protection methods.

author Lydia