đ ️ Fix BitLocker Recovery Loop After BIOS or Secure Boot Changes
đ ️ BitLocker Recovery Loop – Enterprise Troubleshooting Guide
This guide explains how to troubleshoot repeated BitLocker recovery prompts after BIOS, TPM, Secure Boot or hardware changes in enterprise environments.
đĄ Root cause: TPM PCR mismatch (especially PCR7 related to Secure Boot) after firmware or boot configuration changes.
đ§ Root Cause Explained (Important)
BitLocker uses TPM PCR measurements to verify boot integrity. When firmware, Secure Boot or boot configuration changes, the TPM measurements no longer match → BitLocker triggers recovery mode.
- BIOS/UEFI update changes firmware measurements
- Secure Boot keys or DB/DBX changes
- TPM firmware update or reset
- Boot order / UEFI configuration changes
- Docking station affecting hardware hash
đČ Decision Tree
1. Does BitLocker ask for recovery every boot?
→ Yes: TPM integrity issue (PCR mismatch)
2. Did it start after BIOS/firmware update?
→ Yes: Suspend BitLocker → reboot → resume
3. Only happens when docked?
→ Yes: hardware measurement change
4. Persistent even after resume?
→ Recreate TPM protector
→ Yes: TPM integrity issue (PCR mismatch)
2. Did it start after BIOS/firmware update?
→ Yes: Suspend BitLocker → reboot → resume
3. Only happens when docked?
→ Yes: hardware measurement change
4. Persistent even after resume?
→ Recreate TPM protector
đ Step 1 – Verify BitLocker State
Check status
Get-BitLockerVolume
manage-bde -protectors -get C:
Verify TPM, Recovery Password and Key Protector types before changes.
đ Step 2 – Check Event Logs (Critical)
Event Viewer:
Applications and Services Logs →
Microsoft →
Windows →
BitLocker-API →
Management
Look for Event ID 24620 / 24636 → TPM or PCR validation failures.
⏸️ Step 3 – Suspend BitLocker (Safe state)
Suspend
Suspend-BitLocker -MountPoint "C:" -RebootCount 2
Restart-Computer
Use this before any BIOS, Secure Boot or firmware change.
▶️ Step 4 – Resume BitLocker
Resume
Resume-BitLocker -MountPoint "C:"
⚠️ Step 5 – TPM Reseal (Advanced)
Only use this if suspend/resume does not resolve the issue.
Ensure recovery key is available.
Reset TPM protector
manage-bde -protectors -disable C:
manage-bde -protectors -delete C: -type TPM
manage-bde -protectors -add C: -tpm
manage-bde -protectors -enable C:
Restart-Computer
đą Intune / Enterprise Notes
- Use Endpoint Security → Disk Encryption policies
- Recovery keys stored in Entra ID
- Monitor recovery events via Intune reporting
- Use remediation scripts for BIOS update workflows
đĄ Best practice: Automate BitLocker suspend/resume during firmware updates via Intune or scripts.
đ„️ Docking & Hardware Considerations
- USB-C / Thunderbolt docks may change hardware measurements
- Test boot with and without dock
- Avoid changing hardware during TPM reseal process
đ Best Practices
- Always store recovery key in Entra ID / AD
- Always suspend BitLocker before BIOS updates
- Avoid unnecessary Secure Boot changes
- Standardize firmware update process across devices
✅ Summary
| Scenario | Action |
|---|---|
| Firmware update | Suspend → Update → Resume |
| Repeated recovery | Check TPM + Event logs |
| Persistent issue | Recreate TPM protector |
| Dock-related issue | Test hardware consistency |
Kommentarer
Skicka en kommentar