Options using Bitlocker Recovery in Windows 7

Home > Blogs > Windows 7 > Options using Bitlocker Recovery in Windows 7

Options using Bitlocker Recovery in Windows 7

Like This Blog 2Steve Fullmer
Added by July 22, 2013

The Bitlocker key is the actual encryption key used to encrypt and decrypt the drive.

The Bitlocker PIN is a value/number you may create (optional) when you Bitlocker encrypt a drive so that you may block access to the system. This option is used when the key is stored in the TPM chipset on the system, suggesting that anyone may gain access to the drive while it is still installed within the system if they can access a user account on the system. The PIN is an additional layer of security, and does NOT recover the key if the key is lost or corrupted. The PIN may be required for recovery if you have enabled the Bitlocker PIN as a layer of access security. (This is the password that I reset in my Managing Bitlocker video.)

The Bitlocker Password is a 48 digit number generated at the time of Bitlocker drive encryption that may later be used to recreate the Bitlocker Key. This is the visible component of the value stored or printed when you recreate the Bitlocker Key on a drive to which you already have access. You are asked to print, display, or save the password to external media when you Bitlocker a drive. This password is input using the (F0-F9) function keys rather than numeric keys or keypad. As such, you only want to use this option as a last resort for recovery. You cannot reset or recreate this key unless you are managing a Bitlocker drive to which you already have access. If you lose this Recovery Password, and your PIN or Bitlocker Key, then the drive is unrecoverable.

Note that throughout the documentation from Microsoft, within my videos, and other documentation, the terms PIN and Password are often used interchangeably.  Think password versus Password. The Bitlocker PIN may be text or a phrase, is used as a layer of access control and as such is often referred to as a ‘password’. The Bitlocker (Recovery) Password is always numeric value (default 48 digits), stored with the Key, and numeric like a PIN. Formally labeled the Password; this is only used for recovery purposes, not access control.

Microsoft provides guidance for BitLocker Drive Encryption Technical Overview and BitLocker recovery keys: Frequently asked questions, that you should read before encrypting a drive using Bitlocker.

Brien Posey provides a simple but comprehensive overview for lost Bitlocker PINS and Keys How to recover from lost BitLocker PINs and startup keys as well. The summary: If you did not prepare to recover a Bitlocker drive, afterthought will not help you.

You may also like:  Enabling BitLocker Drive Encryption Without a TPM in Windows 10

First focus: create an environment designed to manage Bitlocker and Bitlocker-to-Go™ encrypted drives. Without pre-determination, recovery can be a daunting or even impossible task.

Proactive steps:

  • Create a Bitlocker management and recovery system hosted on Windows 7 Enterprise, Windows 7 Ultimate, or Windows 8 Enterprise. You need one of these Operating System environments to manage Bitlocker drives. While you may read Bitlocker drives on other systems, management is not possible.
  • Use a 64-bit OS environment to affect your testing and management. Digitally signed drivers are important, and a 64-bit test environment assures that you are using signed device drivers compatible with the Windows 7 or Windows 8 environments, and better performance to affect Bitlocker management.
  • The management system must have a TPM chipset, and TPM must be enabled in BIOS/UEFI. While you may Bitlocker a drive using non-TPM mode, you do not want to perform recovery using non-TPM mode. In fact, you cannot save the recovery key for a removable media drive on removable media. (You might be able to transport it via removable media within a recovery agent, but that is a separate consideration.)
  • The management system should incorporate a USB 3.0 controller and multiple USB ports. Both USB 3.0 and 2.0 ports will enable a broader range of testing capabilities, although a USB 3.0 port will support USB 2.0 drives. USB 3.0 provides the IOPS you need to effectively manage Bitlocker drives.
  • Create an Active Directory environment that includes Certificate Services OR acquire a Digital Certificate from an authorized third party Certificate Authority. Within this environment, use Group Policy to turn on a Recovery Agent for Bitlocker. Enable and test this environment to assure that your Bitlocker Credentials are being stored and are available for recovery before you begin to use Bitlocker in production.
  • With Windows 8 you may store your recovery key using your Microsoft online account, though only if you are NOT in a domain attached environment.
  • Create a corporate mechanism for storing the Bitlocker Password. Although the recovery mechanism is challenging, you want to assure that you store the Recovery Password in a secure location, associated with the PC and/or drive identity so that you can recover important business intellectual property should the drive every become locked.
You may also like:  Methods to Enable and Disable Remote Desktop Locally

Some reminders:

  • Bitlocker Drive encryption requires the use of the Windows 7/8 Recovery Environment. This environment enables recognition of the Bitlocker drive under normal Bitlocker operation, and possible recovery of a Bitlocker drive should the key become lost or corrupted. Make certain that you understand use of and access to the Recovery environment for the Windows 7 or 8 OS.
  • Learn the terminology associated with Bitlocker drive encryption. Recovery may be affected using a Personal Identification Number (PIN) or a recovery key What is a BitLocker recovery key? These are decidedly different components.
  • Bitlocker drive encryption and recovery can take DAYS. You must be patient. When you enable (turn on) Bitlocker, all of the drive content is encrypted. The size of the drive, the volume of content to be encrypted, the IOPS for the device and the system, the amount of RAM installed, and the processor speed will each impact encryption performance.  For example, encrypting a 60 GB drive with the Windows 7 Enterprise OS, Microsoft office, and two user profiles (and no additional applications or data) required 24 hours to encrypt on a system meeting the minimum OS requirements. Disabling Bitlocker required almost the same amount of time. Recovery may take longer.
  • Do Not Stop or Restart the Process of encryption or recovery once you have started. If you do, you might as well re-partition the drive.

Other suggestions:

  • Acquire an external drive ‘clam-shell’ that will hold a mechanical drive, and another for Solid State Drives. Make sure both are USB 3.0 enabled. It may be possible to place a drive that has been Bitlocker encrypted into the ‘clam-shell’ and manage it from your dedicated management system IF you have the recovery key or certificate, or the associated Bitlocker password. You should test this process before you need it on a production drive, so that you understand all the components and sequence of steps. Stopping and restarting may not be a viable option.

Good luck!

Steven Fullmer
Interface Technical Training Staff Instructor

Videos You May Like

Agile Methodology in Project Management

0 74 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 168 1

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 271 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

See what people are saying...

  1. Interface

    James,
    Your observation is correct that the Bitlocker Recovery ‘password’ is all numeric. The password is more like a 48 digit PIN than a password.
    The format is typically represented as nnnnnn-nnnnnn-nnnnnn-nnnnnn nnnnnn-nnnnnn-nnnnnn-nnnnnn
    8 sets of 6 numbers.
    When inputing the numbers you do NOT use the numeric keypad or the numbers across the keypad. The recovery mechanism requires you to use the F1-F10 keys at the top of you keyboard,
    With F1 representing 1, F2 representing 2, etc. F10 represents Zero.
    Since there is no screen based representation as you tap the F1-F10 keys, you must be both careful and fastidious entering the ‘password’ when prompted. The effort required me a half dozen attempts my first time, taking careful notes of my progress. This is the reason the Password is displayed as eight sets of six numbers; so you have a means to carefully track your entry progress.

    Regards,

    Steve Fullmer, MCT
    Staff Instructor, Interface Technical Training

  2. James Michael

    when I set my flash disk in my computer is telling me to enter a bitlocker password recovery,, which it is saying I should enter the 48-digit of recovery key to unlock,, yes I remember I put a bitlocker password I know the passed which I put but is not allowing me to enter my password its only allowing numbers.. I have been trying but no avail, I don’t know how I can deal with this problem please help me.

Share your thoughts...

Please fill out the comment form below to post a reply.