Skip to content

Windows BitLocker Registry Keys (FVE) Revert to 'Allow' (2) After encryption #38304

@AdamBaali

Description

@AdamBaali

Fleet version: 4.78.3

Web browser and operating system: Windows 10/11 (Impacted devices are running Windows)


💥 Actual behavior

When configuring BitLocker to require a PIN via Fleet using PowerShell scripts, the registry values for the "Require additional authentication at startup" settings are reverting to a value of 2 (Allow) instead of the configured values (e.g., 1 for Require, or 0 for Do Not Allow).

Specifically, the user is deploying four scripts to achieve a CIS benchmark configuration:

  • UseTPMPIN: Set to 1 (Require startup PIN with TPM)
  • UseTPMKeyPIN: Set to 0 (Do not allow startup key and PIN with TPM)
  • UseTPM: Set to 0 (Do not allow TPM)
  • UseTPMKey: Set to 0 (Do not allow startup key with TPM)

Despite the scripts successfully setting these values initially, and the user successfully setting a PIN, the registry keys (HKLM:\SOFTWARE\Policies\Microsoft\FVE) revert to 2 shortly after. This behavior mimics a bug where deviceenroller.exe was found to be overwriting registry values.

🛠️ To fix

Investigate if the Fleet agent or deviceenroller.exe is incorrectly overwriting the FVE registry keys. Ensure that the values set by the custom scripts (1 or 0) are respected and not forcibly reset to 2 (Allow).

🧑‍💻 Steps to reproduce

These steps:

  • Have been confirmed to consistently lead to reproduction in multiple Fleet instances.
  • Describe the workflow that led to the error, but have not yet been reproduced in multiple Fleet instances.
  1. Enroll a Windows device into Fleet.
  2. Deploy the four attached PowerShell scripts to configure BitLocker "Require additional authentication at startup" settings (CIS compliance).
    • Set UseTPMPIN to 1
    • Set UseTPMKeyPIN to 0
    • Set UseTPM to 0
    • Set UseTPMKey to 0
  3. Observe that the device prompts the user to set a PIN and encryption proceeds.
  4. Monitor the registry path HKLM:\SOFTWARE\Policies\Microsoft\FVE.
  5. Observe that the registry values for UseTPMPIN, UseTPMKeyPIN, UseTPM, and UseTPMKey revert to 2.

🕯️ More info (optional)

Metadata

Metadata

Assignees

Labels

#g-security-complianceSecurity & Compliance product group:releaseReady to write code. Scheduled in a release. See "Making changes" in handbook.bugSomething isn't working as documentedcustomer-susanoo~timeboxA task that is completed in a predetermined amount of time.

Type

No type

Projects

Status

Done

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions