Fleet version: 4.78.3
Web browser and operating system: Windows 10/11 (Impacted devices are running Windows)
💥 Actual behavior
When configuring BitLocker to require a PIN via Fleet using PowerShell scripts, the registry values for the "Require additional authentication at startup" settings are reverting to a value of 2 (Allow) instead of the configured values (e.g., 1 for Require, or 0 for Do Not Allow).
Specifically, the user is deploying four scripts to achieve a CIS benchmark configuration:
UseTPMPIN: Set to 1 (Require startup PIN with TPM)
UseTPMKeyPIN: Set to 0 (Do not allow startup key and PIN with TPM)
UseTPM: Set to 0 (Do not allow TPM)
UseTPMKey: Set to 0 (Do not allow startup key with TPM)
Despite the scripts successfully setting these values initially, and the user successfully setting a PIN, the registry keys (HKLM:\SOFTWARE\Policies\Microsoft\FVE) revert to 2 shortly after. This behavior mimics a bug where deviceenroller.exe was found to be overwriting registry values.
🛠️ To fix
Investigate if the Fleet agent or deviceenroller.exe is incorrectly overwriting the FVE registry keys. Ensure that the values set by the custom scripts (1 or 0) are respected and not forcibly reset to 2 (Allow).
🧑💻 Steps to reproduce
These steps:
- Enroll a Windows device into Fleet.
- Deploy the four attached PowerShell scripts to configure BitLocker "Require additional authentication at startup" settings (CIS compliance).
- Set
UseTPMPIN to 1
- Set
UseTPMKeyPIN to 0
- Set
UseTPM to 0
- Set
UseTPMKey to 0
- Observe that the device prompts the user to set a PIN and encryption proceeds.
- Monitor the registry path
HKLM:\SOFTWARE\Policies\Microsoft\FVE.
- Observe that the registry values for
UseTPMPIN, UseTPMKeyPIN, UseTPM, and UseTPMKey revert to 2.
🕯️ More info (optional)
Fleet version: 4.78.3
Web browser and operating system: Windows 10/11 (Impacted devices are running Windows)
💥 Actual behavior
When configuring BitLocker to require a PIN via Fleet using PowerShell scripts, the registry values for the "Require additional authentication at startup" settings are reverting to a value of
2(Allow) instead of the configured values (e.g.,1for Require, or0for Do Not Allow).Specifically, the user is deploying four scripts to achieve a CIS benchmark configuration:
UseTPMPIN: Set to1(Require startup PIN with TPM)UseTPMKeyPIN: Set to0(Do not allow startup key and PIN with TPM)UseTPM: Set to0(Do not allow TPM)UseTPMKey: Set to0(Do not allow startup key with TPM)Despite the scripts successfully setting these values initially, and the user successfully setting a PIN, the registry keys (
HKLM:\SOFTWARE\Policies\Microsoft\FVE) revert to2shortly after. This behavior mimics a bug wheredeviceenroller.exewas found to be overwriting registry values.🛠️ To fix
Investigate if the Fleet agent or
deviceenroller.exeis incorrectly overwriting theFVEregistry keys. Ensure that the values set by the custom scripts (1or0) are respected and not forcibly reset to2(Allow).🧑💻 Steps to reproduce
These steps:
UseTPMPINto1UseTPMKeyPINto0UseTPMto0UseTPMKeyto0HKLM:\SOFTWARE\Policies\Microsoft\FVE.UseTPMPIN,UseTPMKeyPIN,UseTPM, andUseTPMKeyrevert to2.🕯️ More info (optional)
deviceenroller.exeresets values.