maciejrebisz.com

IT

How to delivering BitLocker policy to AutoPilot devices to set 256 bit encryption – Mobile-First Cloud-First

maximios September 25, 2022

When you are AzureAD joining a Windows 10 device that are Hardware Security Test Interface (HSTI) also known a InstanceGo the device will automatic be Bitlocker encrypted with XTS-AES 128

With Windows 10 1809 you can choose which encryption algorithm to apply automatic BitLocker encryption to capable devices. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before automatic BitLocker encryption begins with the Autopilot service and Microsoft Intune so you for example can use XTS-AES 256.

Pre-requisitions:

  • The device in the Windows Autopilot service and assigned a Autopilot profile
  • HSTI device
  • AzureAD P1 license
  • Microsoft Intune license
  • Intune status enrollment page

How to configure it:

First start the Microsoft 365 Device Management portal

Create a device configuration profile

  1. Click Device Configuration
  2. Click Profiles
  3. Click Create profile

  1. Enter a Name : Autopilot Bitlocker profil
  2. Select platform : Windows 10 and later
  3. Select Profile type : Endpoint protection
  4. Select : Configure and Windows Encryption
  5. Set Configure encryption methods : Enable
  6. Set Encryption for operating system drives : XTS-AES 256-bit
  7. Set Encryption for fixed data-drives : XTS-AES 256-bit
  8. Set Encryption for removable data-drives : XTS-AES 256-bit

Then you just need to assigned it to your Autopilot device group you want to target with the new BitLocker encryption methods

 Check out my earlier blogpost on Autopilot groups

How does it look like from the device side

When you are running the “manage-bde -status” command you can see that after the device is enrolled into AzureAD with Autopilot the BitLocker Encryption Method is XTS-AES 256

Happy testing 🙂

Read more:
What’s new in Windows 10, version 1809 for IT Pros

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to delivering BitLocker policy to AutoPilot devices to set 256 bit encryption – Mobile-First Cloud-First › Intune Apple DEP Devices – iCloud restore is no longer display on IOS 11 – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes