Implementing BitLocker Drive Encryption in Windows Server 2022

Posted on 20th June 2023

Introduction

BitLocker Drive Encryption is a data protection feature that is available in Windows Server 2022. BitLocker helps protect your data by encrypting the entire drive that Windows is installed on. This article will show you how to enable and configure BitLocker on Windows Server 2022.

Prerequisites

  • Windows Server 2022 installed on the drive you want to encrypt
  • Access to a Trusted Platform Module (TPM)

Enabling BitLocker

BitLocker can be enabled using the Server Manager console. To do this, open the Server Manager console and click on the “Local Server” tab. In the “Properties” section, scroll down to the “Security” section and click on the “Enable BitLocker” link. This will open the “BitLocker Drive Encryption” wizard.

On the “Getting Started” page, click on the “Turn On BitLocker” button. On the “How do you want to store your recovery key?” page, select the option to “Save to your Microsoft account” and click on the “Next” button. On the “Choose how to unlock your drive at startup” page, select the option to “Use a password to unlock the drive” and click on the “Next” button.

On the “Configure TPM” page, select the option to “Allow BitLocker without a compatible TPM” and click on the “Next” button. On the “Choose how much of your drive to encrypt” page, select the option to “Encrypt used disk space only (faster and best for new PCs and drives)” and click on the “Next” button. On the “Choose when to encrypt your drive” page, select the option to “Encrypt entire drive” and click on the “Next” button.

On the “Ready to turn on BitLocker” page, review the settings and click on the “Turn on BitLocker” button. On the “BitLocker Drive Encryption” page, you will see the status of the encryption process. Once the process is complete, click on the “Close” button.

Configuring BitLocker

BitLocker can be configured using the Group Policy Management console. To do this, open the Group Policy Management console and expand the “Local Computer Policy” node. Expand the “Computer Configuration” node and expand the “Administrative Templates” node. Expand the “Windows Components” node and click on the “BitLocker Drive Encryption” node.

In the “Policy” pane, double-click on the “Require Additional Authentication at startup” policy. In the “Properties” window, select the “Enabled” option and click on the “OK” button. In the “Policy” pane, double-click on the “Choose drive encryption method and cipher strength” policy. In the “Properties” window, select the “Enabled” option and click on the “Show” button. In the “Show Contents” window, click on the “Add Value” button. In the “Edit DWORD Value” window, type “AES256” in the “Value name” field and click on the “OK” button. Close the “Show Contents” window and click on the “OK” button in the “Properties” window.

In the “Policy” pane, double-click on the “Configure use of Hardware Encryption for fixed data drives” policy. In the “Properties” window, select the “Enabled” option and click on the “OK” button. In the “Policy” pane, double-click on the “Configure use of Hardware Encryption for removable data drives” policy. In the “Properties” window, select the “Enabled” option and click on the “OK” button. In the “Policy” pane, double-click on the “Require additional authentication at startup” policy. In the “Properties” window, select the “Enabled” option and click on the “Show” button. In the “Show Contents” window, click on the “Add Value” button. In the “Edit DWORD Value” window, type “1” in the “Value name” field and click on the “OK” button. Close the “Show Contents” window and click on the “OK” button in the “Properties” window.

In the “Policy” pane, double-click on the “Turn on TPM backup to Active Directory Domain Services” policy. In the “Properties” window, select the “Enabled” option and click on the “OK” button. Close the Group Policy Management console.

Conclusion

This article has shown you how to enable and configure BitLocker on Windows Server 2022. BitLocker is a data protection feature that helps protect your data by encrypting the entire drive that Windows is installed on. BitLocker can be enabled using the Server Manager console and configured using the Group Policy Management console.

BitLocker Drive Encryption is a data protection feature that encrypts all user data on a hard drive. BitLocker encrypts the entire drive, including the operating system, system files, and user data. BitLocker uses a Trusted Platform Module (TPM) to protect user data and to ensure that a BitLocker-encrypted drive can only be decrypted by an authorized user.

BitLocker is available in the following editions of Windows Server 2022:

Datacenter Edition

Enterprise Edition

Standard Edition

BitLocker is not available in the Web Edition or the Itanium-Based Systems edition of Windows Server 2022.

BitLocker can be deployed in a number of different ways, depending on the needs of your organization. The following sections describe the different deployment scenarios for BitLocker and provide guidance on how to deploy BitLocker in each scenario.

Scenario 1: BitLocker on a Stand-Alone Server

In this scenario, BitLocker is deployed on a stand-alone server that is not a member of a domain. The server runs the Windows Server 2022 operating system and has a single hard drive that contains the operating system, system files, and user data.

The following steps must be performed to deploy BitLocker in this scenario:

1. Install the BitLocker feature on the server.

2. Configure the BitLocker policy settings.

3. Encrypt the hard drive.

4. Configure the server to require a startup PIN.

5. Configure the server to require a BitLocker recovery key.

6. Restart the server.

Scenario 2: BitLocker on a Domain Controller

In this scenario, BitLocker is deployed on a domain controller that is a member of an Active Directory domain. The domain controller runs the Windows Server 2022 operating system and has a single hard drive that contains the operating system, system files, and user data.

The following steps must be performed to deploy BitLocker in this scenario:

1. Install the BitLocker feature on the domain controller.

2. Configure the BitLocker policy settings.

3. Encrypt the hard drive.

4. Configure the domain controller to require a startup PIN.

5. Configure the domain controller to require a BitLocker recovery key.

6. Restart the domain controller.

Scenario 3: BitLocker on a Cluster

In this scenario, BitLocker is deployed on a cluster that is a member of an Active Directory domain. The cluster consists of two nodes, each of which runs the Windows Server 2022 operating system. The cluster has a shared storage system that contains the operating system, system files, and user data.

The following steps must be performed to deploy BitLocker in this scenario:

1. Install the BitLocker feature on both nodes of the cluster.

2. Configure the BitLocker policy settings.

3. Encrypt the shared storage system.

4. Configure the cluster to require a startup PIN.

5. Configure the cluster to require a BitLocker recovery key.

6. Restart the cluster.

Scenario 4: BitLocker on a Server with Multiple Hard Drives

In this scenario, BitLocker is deployed on a server that is a member of an Active Directory domain. The server runs the Windows Server 2022 operating system and has two hard drives. One hard drive contains the operating system, system files, and user data. The other hard drive is used for data storage.

The following steps must be performed to deploy BitLocker in this scenario:

1. Install the BitLocker feature on the server.

2. Configure the BitLocker policy settings.

3. Encrypt the hard drive that contains the operating system, system files, and user data.

4. Do not encrypt the hard drive that is used for data storage.

5. Configure the server to require a startup PIN.

6. Configure the server to require a BitLocker recovery key.

7. Restart the server.