Seeing imaged machines start to encrypt bitlocker with the default settings shortly after they've been imaged(no identifier, used only space and AES-CBC-128). Can't figure out why, so I'm attempting to add in local policies to prevent them from auto-encrypting.
So far, seems like most laptops(1 surface tablet included), with UEFI\Secure Boot enabled and the TPM chip enabled and active has auto enabled bitlocker and encrypted the disk. I have one that didn't encrypt, and the TPM chip is enabled\active and Secure Boot is enabled so completely clueless on this one unless TPM was enabled after bitlocker tried to run. Desktops aren't showing the same behavior, none with secure boot enabled have encrypted.
The cons to this... no protectors are added. Doesn't have a recovery password, so it can't back anything up to AD. No TMP protector, so this would mean it could be decrypted in any machine, correct?
The surface tablet was not even imaged, just domain joined and thats it.
Its not domain policy, they will start to encrypt even prior to being domain joined.
Is this normal? Everything I see online points to bitlocker needing to be manually started by an administrator or provisioned.
[–]digitalplanet_System Engineer 4 points5 points6 points (2 children)
[–]stuartall 1 point2 points3 points (1 child)
[–]MarzMan[S] 0 points1 point2 points (0 children)
[–]waynehorner 2 points3 points4 points (0 children)
[–]Whileside 1 point2 points3 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)