Enforce BitLocker Encryption Types on Windows 11 Drives

This article explains how to enforce specific BitLocker encryption types on fixed data drives in Windows 11. Users can control the encryption type through the Local Group Policy Editor or the Windows Registry Editor. These methods allow users to enforce full encryption or used space only encryption, ensuring data security.

This article explains how to enforce a specific BitLocker encryption type on fixed data drives in Windows 11.

BitLocker helps protect computer data so only authorized users can access it. New files created on a BitLocker-enabled drive will also be protected.

Users can protect external, fixed, and operating system drives using BitLocker. When you enable BitLocker to protect the OS drive, it automatically unlocks the drive at startup using a TPM chip.

When users turn on BitLocker for fixed data drives, the BitLocker setup wizard prompts them to choose between full encryption and used space-only encryption.

The full encryption type requires that the entire drive be encrypted when BitLocker is turned on. The used space only encryption type requires that only the portion of the drive used to store data is encrypted when BitLocker is turned on.

You can use the Enforce drive encryption type on fixed data drives policy setting to control the use of BitLocker on fixed data drives.

Enforce drive encryption type on fixed data drives

As mentioned above, users can use the enforce drive encryption type on fixed data drives policy to control the use of BitLocker on fixed drives.

Here’s how to do it.

First, open the Local Group Policy Editor (gpedit.msc). (Search for “Edit group policy”) on the Start menu.

Then, navigate the folders below:

Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption -> Fixed Data Drives

In the Fixed Data Drives details pane on the right, locate and double-click the “Enforce drive encryption type on fixed data drives” settings.

On the “Enforce drive encryption type on fixed data drives” window, set the option to Not ConfigureEnabled, or Disabled.

  • Not Configured (default) – Same as Disabled.
  • Enabled – BitLocker will use the policy below to encrypt drives and the encryption type option will not be presented in the BitLocker setup wizard.
    • Full encryption
    • Use Space Only encryption
  • Disabled – BitLocker setup wizard will continue to ask the user to select the encryption type before turning on BitLocker.

Click OK to save your changes. You may have to reboot your device for the settings to apply.

Enforce drive encryption type on fixed data drives using the Windows Registry Editor

Yet another way to configure the BitLocker policy to enforce drive encryption type on fixed data drives is to use the Windows Registry editor.

First, open Windows Registry editor as administrator.

Then, navigate to the registry key below.

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE

Next, double-click the FDVEncryptionType (DWORD) 32-bit Value name on the FVE key’s right pane to open it.

Then, enter a value 1 to enforce “Full encryption” on fixed data drives. Enter the value 2 to enforce “Use Space Only encryption” on fixed data drives

If you do not see the “FDVEncryptionType” item, right-click a blank area and create a new DWORD 32-bit Value registry item.

Then, type the name “FDVEncryptionType” and enter a value data 1 or 2 to control how BitLocker is used on fixed data drives.

To restore the default behavior and continue to show the option to select the encryption type for fixed data drives, delete the “FDVEncryptionType” item created above.

Save your changes and restart your computer.

That should do it!

Conclusion:

  • The article provides a comprehensive guide on enforcing BitLocker encryption type on fixed data drives in Windows 11
  • It demonstrates two methods, using Local Group Policy Editor and Windows Registry Editor, to control the encryption type for fixed data drives
  • The step-by-step instructions, accompanied by images, make it easier for users to follow and implement the enforcement of BitLocker encryption type
  • Readers are encouraged to provide feedback or additional insights by using the comments section below the article
Richard Avatar

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *


Exit mobile version