🛠️ Fix BitLocker Recovery Loop After BIOS or Secure Boot Changes

BitLocker Recovery Loop Guide

🛠️ BitLocker Recovery Loop – Enterprise Troubleshooting Guide

This guide explains how to troubleshoot repeated BitLocker recovery prompts after BIOS, TPM, Secure Boot or hardware changes in enterprise environments.

💡 Root cause: TPM PCR mismatch (especially PCR7 related to Secure Boot) after firmware or boot configuration changes.

🧠 Root Cause Explained (Important)

BitLocker uses TPM PCR measurements to verify boot integrity. When firmware, Secure Boot or boot configuration changes, the TPM measurements no longer match → BitLocker triggers recovery mode.

  • BIOS/UEFI update changes firmware measurements
  • Secure Boot keys or DB/DBX changes
  • TPM firmware update or reset
  • Boot order / UEFI configuration changes
  • Docking station affecting hardware hash

đŸŒČ Decision Tree

1. Does BitLocker ask for recovery every boot?
→ Yes: TPM integrity issue (PCR mismatch)

2. Did it start after BIOS/firmware update?
→ Yes: Suspend BitLocker → reboot → resume

3. Only happens when docked?
→ Yes: hardware measurement change

4. Persistent even after resume?
→ Recreate TPM protector

🔍 Step 1 – Verify BitLocker State

Check status

Get-BitLockerVolume
manage-bde -protectors -get C:
Verify TPM, Recovery Password and Key Protector types before changes.

📊 Step 2 – Check Event Logs (Critical)


Event Viewer:
Applications and Services Logs →
Microsoft →
Windows →
BitLocker-API →
Management
Look for Event ID 24620 / 24636 → TPM or PCR validation failures.

⏸️ Step 3 – Suspend BitLocker (Safe state)

Suspend

Suspend-BitLocker -MountPoint "C:" -RebootCount 2
Restart-Computer
Use this before any BIOS, Secure Boot or firmware change.

▶️ Step 4 – Resume BitLocker

Resume

Resume-BitLocker -MountPoint "C:"

⚠️ Step 5 – TPM Reseal (Advanced)

Only use this if suspend/resume does not resolve the issue. Ensure recovery key is available.
Reset TPM protector

manage-bde -protectors -disable C:
manage-bde -protectors -delete C: -type TPM
manage-bde -protectors -add C: -tpm
manage-bde -protectors -enable C:
Restart-Computer

🏱 Intune / Enterprise Notes

  • Use Endpoint Security → Disk Encryption policies
  • Recovery keys stored in Entra ID
  • Monitor recovery events via Intune reporting
  • Use remediation scripts for BIOS update workflows
💡 Best practice: Automate BitLocker suspend/resume during firmware updates via Intune or scripts.

đŸ–„️ Docking & Hardware Considerations

  • USB-C / Thunderbolt docks may change hardware measurements
  • Test boot with and without dock
  • Avoid changing hardware during TPM reseal process

📈 Best Practices

  • Always store recovery key in Entra ID / AD
  • Always suspend BitLocker before BIOS updates
  • Avoid unnecessary Secure Boot changes
  • Standardize firmware update process across devices

✅ Summary

ScenarioAction
Firmware updateSuspend → Update → Resume
Repeated recoveryCheck TPM + Event logs
Persistent issueRecreate TPM protector
Dock-related issueTest hardware consistency

Kommentarer

PopulÀra inlÀgg i den hÀr bloggen

🚀 Force Reinstallation of an Intune App

đŸ””Troubleshooting Intune Device Enrollments: Understanding GUIDs, Registry Paths, and EnterpriseMgmt Tasks

🚀 Windows Autopilot Self-Deploying Mode — Zero-Touch Setup That Feels Like Magic