Abt Bitlocker Technote
Abt Bitlocker Technote
TECHNOTE
WHAT IS BITLOCKER?
BitLocker Drive Encryption allows a user or administrator to encrypt all data stored on the Windows operating system
volume and configured data volumes. BitLocker is supported on the following versions of Windows:
• Ultimate and Enterprise editions of Windows 7
• Pro and Enterprise editions of Windows 8 and 8.1
• Pro, Enterprise and Education versions of Windows 10
• Windows Server 2008 and later
BitLocker provides the most protection when used with a Trusted Platform Module (TPM). The TPM is a hardware component
installed in devices by manufacturers. The TPM works with BitLocker to help protect user data by ensuring that the
system components have not been tampered with and that the encrypted drive is located in the original computer.
M AI NTAINING B ITLO CK E R CO MP L IA N C E
The August 2017 release of Absolute 7 introduced the capability to report on the status of BitLocker, and when necessary
automatically remediate non-compliant configurations. Absolute does not encrypt or re-encrypt any files. However, by
remediating critical BitLocker components, this can help ensure data is protected. Additionally, users can also configure
absolute.com
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
the reinstall of the Microsoft BitLocker Administration and Monitoring (or MBAM) client on endpoints where the client is
not compliant.
To report on the status of BitLocker, repair when necessary and reinstall the MBAM client, a device policy needs to
be configured and activated from within the Absolute console. A policy can then be applied to a group of devices, or
all devices. This flexibility allows you to target specific devices in your population that may be compatible or require
BitLocker encryption. If this policy is applied to a Global Policy Group, it will be activated across all devices.
Reporting capabilities will identify compliance if BitLocker is installed, functional and configured as expected. The option
to specify what ‘compliant’ is in your environment is based on the following configuration settings.
absolute.com P. 2
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
NOTE: BitLocker To Go is a removable drive encryption solution, used for encrypting removable media USB drives. BitLocker
To Go is not supported by Absolute’s BitLocker application repair solution.
absolute.com P. 3
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
absolute.com P. 4
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
AVAILABILITY:
BitLocker Reporting is available with Absolute Resilience. Legacy Absolute Computrace and DDS Premium customers
with Computrace Data Protect, Computrace Plus, Computrace Complete or Computrace One licenses will also receive
BitLocker reporting functionality. Absolute Visibility and Control customers can also purchase the Application Persistence
for Microsoft Applications add-on module.
ACTIVATION:
Existing Absolute customers can activate this feature within the cloud-based Absolute console, based on policies. This
feature can be turned on for specified groups of devices, or for all devices.
Administrators can specify their compliance requirements in the ‘Configuration Application Persistence: BitLocker’
screen, as shown in Figure 3.
IMPLEMENTATION:
When the BitLocker status reporting feature is configured and activated via Policy Groups, the Absolute agent detects
the status of the BitLocker client by running a script on the device. This script performs a series of health checks to
determine if the required services are present and functioning correctly. The script runs on a schedule outside of regular
Absolute agent communication. The scheduled period for BitLocker status checks is every 6 hours. If the BitLocker
options are changed on the server (e.g. configuration changed), the BitLocker reporting script is run immediately when
it is received by the agent. No user input or changes to an organization’s existing BitLocker environment are required.
absolute.com P. 5
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
Once activated, to add BitLocker attributes to a new or existing Absolute report, simply click on Show/Hide Columns,
and search for BitLocker attributes as indicated in Figure 4. These can be added to any predefined or custom report,
and then saved for future reference.
The following attributes are available to be reported on:
• APPLICATION PERSISTENCE > BITLOCKER > LAST UPDATED (UTC): The date and time the results of the BitLocker
status check were made available in the Absolute console
• APPLICATION PERSISTENCE > BITLOCKER > REPAIR STATUS: The status of any attempted BitLocker repairs. Note
Repair Status may not show if the account does not have the correct Absolute licenses. See BitLocker repair section
below for more information. Possible values displayed in this reporting column include:
ºº No repairs: the Repair option is not enabled in the application repair policy, or the device has a Status of
Compliant so no repairs were attempted.
ºº All repairs succeeded: the device has a Status of Not compliant and all attempted repairs were successful.
ºº All repairs failed: the device has a Status of Not compliant and no attempted repairs were successful.
ºº Unknown: unable to accurately detect the status of any BitLocker repairs
• APPLICATION PERSISTENCE > BITLOCKER > STATUS: The detected status of BitLocker on the device. Possible
values are:
ºº Compliant: BitLocker is functioning correctly and the BitLocker configurations detected on the device comply
with the configurations set in the BitLocker policy
ºº Not compliant: BitLocker is not functioning correctly, or the BitLocker configurations detected on the device do
not comply with the configurations set in the BitLocker policy
ºº Error: an unexpected error occurred while the BitLocker status check was running on the device. Status
information was not uploaded.
ºº Unknown: unable to accurately detect the status of BitLocker
• APPLICATION PERSISTENCE > BITLOCKER > STATUS CHECKED (UTC): The date and time the application repair:
BitLocker status check was completed on the device.
• APPLICATION PERSISTENCE > BITLOCKER > STATUS DETAILS: Provides additional details about Not compliant
statuses. If the Status is Compliant, no details are provided and two em dashes (— —) show in the column. The
BitLocker status check consists of three key steps, as outlined in the table on the next page.
absolute.com P. 6
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
absolute.com P. 7
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
COMPATIBILITY:
BItLocker Repair is applicable for customers with the following versions of Windows:
• Windows Vista and Windows 7, Ultimate and Enterprise editions
• Windows 8 and 8.1, Pro and Enterprise editions
• Windows 10, Pro, Enterprise, and Education versions
• Windows Server 2008 and later.
AVAILABILITY:
BitLocker Repair is available to customers with Absolute Resilience, along with legacy Computrace Complete/One and
DDS Premium editions. Absolute Visibility and Control customers can also purchase the Application Persistence for
Microsoft Applications add-on module.
ACTIVATION:
Existing customers can activate this feature within the Absolute console, by selecting the checkbox ‘Repair if not
compliant’, as shown in in Figure 4.
IMPLEMENTATION:
When the BitLocker repair feature is turned on, the Absolute agent detects the status of BitLocker components by running
scripts on the device. This script performs a series of health check tests to determine if BitLocker and MBAM components
are present and functioning correctly. The script runs every 6 hours. If one of the tests indicate that the BitLocker or
MBAM components are non-compliant, it then automatically initiates an additional script to repair the components that
require attention or are missing.
No user input or changes to an organization’s existing BitLocker environment are required for BitLocker reporting or repair.
However, for the BitLocker repair process to be initiated, BitLocker and/or MBAM is required to have been previously
installed and functioning on the device.
Dependent on the BitLocker component that is missing or has become corrupt, the Absolute agent will then perform an
action on the device to remediate. This ranges from restarting or reregistering processes, restarting services, to testing
the availability of required components. The results of these tests are shown within BitLocker status reports, as outlined
in the BitLocker reporting section of this document.
The following issues can be automatically repaired:
• Windows Management Instrumentation (WMI) is not functioning correctly
• A valid system partition is not found
If an organization is using Microsoft BitLocker Administration and Monitoring (MBAM) to manage BitLocker, the following
services can also be repaired:
• The BitLocker Management Client Service is not running
• The MBAM service URLs in the device’s registry are incorrect or not found
Based on the elements specified in the reporting configuration if detected as non-compliant, the repair workflow below
is initiated.
absolute.com P. 8
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
BITLOCKER STANDALONE:
1. WMI services are checked, and required services are started and stopped.
2. The presence of the SYSTEM partition is checked; with a minimum size of 300 MB. If not a repair process is run,
initiating the BitLocker Preparation Tool.
If setup with BitLocker MBAM, the following repair workflow is initiated following the BitLocker Standalone process as
outlined above.
BITLOCKER MBAM:
1. Check if the MBAM client is running
• Check: check for a service running named “BitLocker Management Client Service” and ensure it is set for run
automatically.
• Repair: start the service and configure it to run automatically.
2. Verify the values of the management URLs, KeyRecoveryServiceEndPoint and StatusReportingServiceEndpoint as
outlined above in the ‘Maintaining BitLocker Compliance’ section and demonstrated in Figure 4.
COMPATIBILITY:
BitLocker MBAM reinstall is applicable for customers with the following versions of Windows:
• Windows Vista and Windows 7, Ultimate and Enterprise editions
• Windows 8 and 8.1, Pro and Enterprise editions
• Windows 10, Pro, Enterprise, and Education versions
AVAILABILITY:
BitLocker MBAM reinstall is available to customers with Absolute Resilience, along with legacy Computrace Complete/
One and DDS Premium editions. Absolute Visibility and Control customers can also purchase the Application Persistence
for Microsoft Applications add-on module.
ACTIVATION:
Existing customers can activate this feature within the Absolute console, by selecting “BitLocker with standalone MBAM”
under BitLocker Setup and then selecting the “Report, repair and reinstall” configuration, as shown in Figure 6.
absolute.com P. 9
T EC H NOT E : MAIN TA I NI NG MI CR OSOFT BI TLO C KE R E NC RYPTIO N H E A L TH WITH A BS O LU TE
For more information on Absolute and Microsoft BitLocker application repair functionality, please contact your Absolute
sales representative, absolute.com/contact
© 2019 Absolute. All rights reserved. Absolute and Persistence are registered trademarks of Absolute. Self-healing Endpoint Security is a trademark of Absolute. All other trademarks are property of their respective
owners. ABT-Bitlocker-Technote-030419
absolute.com P. 1 0