-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement general Bitlocker configuration capability #51
Comments
Hi @fullenw1 , thanks for the big contribution here. I did want to get your take though on why someone might want to configure these through the Bitlocker resource rather than using GPO, or Registry DSC resources? Specifically with the latter, I'm thinking that if you already know you need to use one or more of these registry keys, than you would probably be comfortable using a straight up Registry resource too. |
Hi Mike, I had recently a similar discussion with Raimund... :) I try to use one tool and one method if possible, meaning if I configure servers with DSC, I will configure everything with it (if possible) instead of using GPO. Ok then only DSC, but why not registry values?
Furthermore, I thought that one day DSC would catch up most of GPO settings and we could use only DSC resources ton configure servers. However, like I said to Raimund, I am pretty new to DSC and maybe my vision of DSC is wrong... Unfortunately, I am currently not able to write the xBitlocker resource myself. I first have to write a few custom resources myself before I can contribute to a DSC project. Thus what I provided above is my best contribution for the moment... |
Hi Luc, |
Description
Currently with this module we can encrypt drives.
However Bitlocker has also a general configuration which can be set with GPO under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption or with registry values under the HKLM:\SOFTWARE\Policies\Microsoft\FVE key.
According to the official document Group Policy Settings Reference Spreadsheet Windows 1809, below are the values which can be implemented.
Registry value data
Unfortunately I could not find an official Microsoft document describing the type (String, DWord, ...) and the data for each registry value.
However, I already gathered the information from here:
https://getadmx.com/HKLM/SOFTWARE/Policies/Microsoft/FVE
Proposed properties
Store BitLocker recovery information in Active Directory Domain Services
HKLM\Software\Policies\Microsoft\FVE\ActiveDirectoryBackup
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\RequireActiveDirectoryBackup
Dword 0|1 False|True
HKLM\Software\Policies\Microsoft\FVE\ActiveDirectoryInfoToStore
Dword 1|2 Recovery passwords and key packages|Recovery passwords only
Choose how users can recover BitLocker-protected drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseRecoveryPassword
Dword 0|1 Do not allow recovery password|Require recovery password
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseRecoveryDrive
Dword 0|1 Do not allow recovery key|Require recovery key
Choose default folder for recovery password
HKLM\SOFTWARE\Policies\Microsoft\FVE\DefaultRecoveryFolderPath
ExpandString
Specify a fully qualified path or include the computer's environment variables in the path.
For example, enter "\server\backupfolder", or "%SecureDriveEnvironmentVariable%\backupfolder"
Choose drive encryption method and cipher strength
HKLM\SOFTWARE\Policies\Microsoft\FVE\EncryptionMethod
DWord 1|2|3|4 AES 128-bit with Diffuser|AES 256-bit with Diffuser|AES 128-bit|AES 256-bit
Choose drive encryption method and cipher strength
HKLM\SOFTWARE\Policies\Microsoft\FVE\EncryptionMethodNoDiffuser
DWord 3|4 AES 128-bit|AES 256-bit
Choose drive encryption method and cipher strength
HKLM\SOFTWARE\Policies\Microsoft\FVE\EncryptionMethodWithXtsOs
DWord 3|4|6|7 AES-CBC 128-bit|AES-CBC 256-bit|XTS-AES 128-bit|XTS-AES 256-bit
HKLM\SOFTWARE\Policies\Microsoft\FVE\EncryptionMethodWithXtsFdv
DWord 3|4|6|7 AES-CBC 128-bit|AES-CBC 256-bit|XTS-AES 128-bit|XTS-AES 256-bit
HKLM\SOFTWARE\Policies\Microsoft\FVE\EncryptionMethodWithXtsRdv
DWord 3|4|6|7 AES-CBC 128-bit|AES-CBC 256-bit|XTS-AES 128-bit|XTS-AES 256-bit
Prevent memory overwrite on restart
HKLM\Software\Policies\Microsoft\FVE\MorBehavior
Dword 0|1 Disabled|Enabled
Disable new DMA devices when this computer is locked
HKLM\Software\Policies\Microsoft\FVE\DisableExternalDMAUnderLock
Dword 0|1 Disabled|Enabled
Configure pre-boot recovery message and URL
HKLM\Software\Policies\Microsoft\FVE\RecoveryKeyMessageSource
DWord 0|1|2|3 Disabled|Use default recovery message and URL|Use custom recovery message|Use custom recovery URL
HKLM\Software\Policies\Microsoft\FVE\RecoveryKeyMessage
String
HKLM\Software\Policies\Microsoft\FVE\RecoveryKeyUrl
String
Allow enhanced PINs for startup
HKLM\Software\Policies\Microsoft\FVE\UseEnhancedPin
Dword 0|1 Disabled|Enabled
Configure use of passwords for operating system drives
HKLM\Software\Policies\Microsoft\FVE\OSPassphrase
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\OSPassphraseComplexity
DWord 0|1|2 Do not allow password complexity|Require password complexity|Allow password complexity
HKLM\Software\Policies\Microsoft\FVE\OSPassphraseLength
DWord 8-255 Min 8|Max 255
HKLM\Software\Policies\Microsoft\FVE\OSPassphraseASCIIOnly
Dword 0|1 False|True
Reset platform validation data after BitLocker recovery
HKLM\Software\Policies\Microsoft\FVE\TPMAutoReseal
Dword 0|1 Disabled|Enabled
Disallow standard users from changing the PIN or password
HKLM\Software\Policies\Microsoft\FVE\DisallowStandardUserPINReset
Dword 0|1 Disabled|Enabled
Provide the unique identifiers for your organization
HKLM\Software\Policies\Microsoft\FVE\IdentificationField
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\IdentificationFieldString
String
HKLM\Software\Policies\Microsoft\FVE\SecondaryIdentificationField
String
Validate smart card certificate usage rule compliance
HKLM\Software\Policies\Microsoft\FVE\CertificateOID
String
Use enhanced Boot Configuration Data validation profile
HKLM\Software\Policies\Microsoft\FVE\OSUseEnhancedBcdProfile
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\OSBcdAdditionalSecurityCriticalSettings
MultiString
HKLM\Software\Policies\Microsoft\FVE\OSBcdAdditionalExcludedSettings
MultiString
Choose how BitLocker-protected operating system drives can be recovered
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSRecovery
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSManageDRA
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSRecoveryPassword
DWord 0|1|2 Do not allow 48-digit recovery password|Require 48-digit recovery password|Allow 48-digit recovery password
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSRecoveryKey
DWord 0|1|2 Do not allow 256-bit recovery key|Require 256-bit recovery key|Allow 256-bit recovery key
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSHideRecoveryPage
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSRequireActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSActiveDirectoryInfoToStore
DWord 1|2 Store recovery passwords and key packages|Store recovery passwords only
Enforce drive encryption type on operating system drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSEncryptionType
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSEncryptionType
Dword 0|1|2 Allow user to choose|Full encryption|Used Space Only encryption
Require additional authentication at startup
HKLM\SOFTWARE\Policies\Microsoft\FVE\EnableNonTPM
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\UsePartialEncryptionKey
Dword 0|1|2 Do not allow startup key with TPM|Require startup key with TPM|Allow startup key with TPM
HKLM\SOFTWARE\Policies\Microsoft\FVE\UsePIN
Dword 0|1|2 Do not allow startup PIN with TPM|Require startup PIN with TPM|Allow startup PIN with TPM
Require additional authentication at startup
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseAdvancedStartup
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\EnableBDEWithNoTPM
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseTPMKey
Dword 0|1|2 Do not allow startup key with TPM|Require startup key with TPM|Allow startup key with TPM
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseTPMPIN
Dword 0|1|2 Do not allow startup PIN with TPM|Require startup PIN with TPM|Allow startup PIN with TPM
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseTPMKeyPIN
Dword 0|1|2 Do not allow startup key and PIN with TPM|Require startup key and PIN with TPM|Allow startup key and PIN with TPM
HKLM\SOFTWARE\Policies\Microsoft\FVE\UseTPM
Dword 0|1|2 Do not allow TPM|Require TPM|Allow TPM
Allow network unlock at startup
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSManageNKP
Dword 0|1 Disabled|Enabled
Configure TPM platform validation profile
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\0
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\1
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\2
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\3
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\4
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\5
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\6
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\7
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\8
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\9
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\10
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\11
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\12
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\13
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\14
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\15
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\16
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\17
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\18
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\19
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\20
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\21
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\22
HKLM\SOFTWARE\Policies\Microsoft\FVE\PlatformValidation\23
Configure TPM platform validation profile for BIOS-based firmware configurations
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\0
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\1
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\2
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\3
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\4
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\5
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\6
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\7
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\8
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\9
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\10
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\11
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\12
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\13
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\14
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\15
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\16
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\17
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\18
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\19
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\20
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\21
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\22
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS\23
Configure TPM platform validation profile for native UEFI firmware configurations
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\0
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\1
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\2
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\3
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\4
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\5
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\6
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\7
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\8
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\9
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\10
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\11
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\12
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\13
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\14
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\15
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\16
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\17
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\18
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\19
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\20
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\21
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\22
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_UEFI\23
Configure minimum PIN length for startup
HKLM\Software\Policies\Microsoft\FVE\MinimumPIN
DWord 4-20 Min 4|Max 20
Configure use of hardware-based encryption for operating system drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSHardwareEncryption
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSAllowSoftwareEncryptionFailover
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSRestrictHardwareEncryptionAlgorithms
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSAllowedHardwareEncryptionAlgorithms
ExpandString
Enable use of BitLocker authentication requiring preboot keyboard input on slates
HKLM\Software\Policies\Microsoft\FVE\OSEnablePrebootInputProtectorsOnSlates
Dword 0|1 Disabled|Enabled
Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN.
HKLM\Software\Policies\Microsoft\FVE\OSEnablePreBootPinExceptionOnDECapableDevice
Dword 0|1 Disabled|Enabled
Allow Secure Boot for integrity validation
HKLM\Software\Policies\Microsoft\FVE\OSAllowSecureBootForIntegrity
Dword 0|1 Disabled|Enabled
Choose how BitLocker-protected fixed drives can be recovered
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVRecovery
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVRecoveryPassword
Dword 0|1|2 Do not allow 48-digit recovery password|Require 48-digit recovery password|Allow 48-digit recovery password
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVRecoveryKey
Dword 0|1|2 Do not allow 256-bit recovery key|Require 256-bit recovery key|Allow 256-bit recovery key
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVManageDRA
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVHideRecoveryPage
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVRequireActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVActiveDirectoryInfoToStore
Dword 1|2 Backup recovery passwords and key packages|Backup recovery passwords only
Configure use of passwords for fixed data drives
HKLM\Software\Policies\Microsoft\FVE\FDVPassphrase
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\FDVEnforcePassphrase
Dword 0|1 False|True
HKLM\Software\Policies\Microsoft\FVE\FDVPassphraseComplexity
Dword 0|1|2 Do not allow password complexity|Require password complexity|Allow password complexity
HKLM\Software\Policies\Microsoft\FVE\FDVPassphraseLength
DWord 8-99 Min 8|Max 99
Deny write access to fixed drives not protected by BitLocker
HKLM\System\CurrentControlSet\Policies\Microsoft\FVE\FDVDenyWriteAccess
Dword 0|1 Disabled|Enabled
Allow access to BitLocker-protected fixed data drives from earlier versions of Windows
HKLM\Software\Policies\Microsoft\FVE\FDVDiscoveryVolumeType
String |FAT32 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\FDVNoBitLockerToGoReader
Dword 0|1 False|True
Configure use of smart cards on fixed data drives
HKLM\Software\Policies\Microsoft\FVE\FDVAllowUserCert
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\FDVEnforceUserCert
Dword 0|1 False|True
Enforce drive encryption type on fixed data drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVEncryptionType
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVEncryptionType
DWord 0|1|2 Allow user to choose|Full encryption|Used Space Only encryption
Configure use of hardware-based encryption for fixed data drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVHardwareEncryption
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVAllowSoftwareEncryptionFailover
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVRestrictHardwareEncryptionAlgorithms
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\FDVAllowedHardwareEncryptionAlgorithms
ExpandString
Choose how BitLocker-protected removable drives can be recovered
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVRecovery
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVRecoveryPassword
DWord 0|1|2 Do not allow 48-digit recovery password|Require 48-digit recovery password|Allow 48-digit recovery password
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVRecoveryKey
DWord 0|1|2 Do not allow 256-bit recovery key|Require 256-bit recovery key|Allow 256-bit recovery key
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVManageDRA
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVHideRecoveryPage
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVRequireActiveDirectoryBackup
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVActiveDirectoryInfoToStore
Dword 1|2 Backup recovery passwords and key packages|Backup recovery passwords only
Control use of BitLocker on removable drives
HKLM\Software\Policies\Microsoft\FVE\RDVConfigureBDE
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\RDVAllowBDE
Dword 0|1 False|True
HKLM\Software\Policies\Microsoft\FVE\RDVDisableBDE
Dword 0|1 False|True
**Configure use of passwords for removable data drives
HKLM\Software\Policies\Microsoft\FVE\RDVPassphrase
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\RDVEnforcePassphrase
Dword 0|1 False|True
HKLM\Software\Policies\Microsoft\FVE\RDVPassphraseComplexity
DWord 0|1|2 Do not allow password complexity|Require password complexity|Allow password complexity
HKLM\Software\Policies\Microsoft\FVE\RDVPassphraseLength
DWord 8-99 Min 8|Max 99
Deny write access to removable drives not protected by BitLocker
HKLM\System\CurrentControlSet\Policies\Microsoft\FVE\RDVDenyWriteAccess
Dword 0|1 False|True
HKLM\Software\Policies\Microsoft\FVE\RDVDenyCrossOrg
Dword 0|1 False|True
Allow access to BitLocker-protected removable data drives from earlier versions of Windows
HKLM\Software\Policies\Microsoft\FVE\RDVDiscoveryVolumeType
String |FAT32 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\RDVNoBitLockerToGoReader
Dword 0|1 False|True
Configure use of smart cards on removable data drives
HKLM\Software\Policies\Microsoft\FVE\RDVAllowUserCert
Dword 0|1 Disabled|Enabled
HKLM\Software\Policies\Microsoft\FVE\RDVEnforceUserCert
Dword 0|1 False|True
Enforce drive encryption type on removable data drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVEncryptionType
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVEncryptionType
DWord 0|1|2 Allow user to choose|Full encryption|Used Space Only encryption
Configure use of hardware-based encryption for removable data drives
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVHardwareEncryption
Dword 0|1 Disabled|Enabled
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVAllowSoftwareEncryptionFailover
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVRestrictHardwareEncryptionAlgorithms
Dword 0|1 False|True
HKLM\SOFTWARE\Policies\Microsoft\FVE\RDVAllowedHardwareEncryptionAlgorithms
ExpandString
The text was updated successfully, but these errors were encountered: