How to stop Bitlocker generating multiple numerical passwords

Alan Hill 0 Reputation points
2024-04-02T17:40:07.7366667+00:00

I am encountering a recurring issue with BitLocker Full Disc Encryption (WIN) via Policy Management using Jumpcloud on Windows devices. The issue manifests as a failed encryption attempt due to the presence of multiple numerical passwords.

1. The policy fails with the following error message:

 

"state": "FAILED",
"detail": "Bitlocker Protected - More than one numerical password currently set. This configuration is not supported, please ensure that the system only has one or no numerical password in place."

 

 

 

  1. To resolve this issue, I manually remove the second numerical password using the following command:

 

 

manage-bde c: manage-bde c: -protectors -delete -id {}

 

 

After restarting the end-user's laptop, the encryption policy successfully applies.

However, the second numerical password mysteriously reappears after an unknown period, causing the encryption policy to fail again. This issue is affecting a significant number of devices, and I have been unable to identify a consistent pattern or solution to prevent it from recurring.

How can I stop Bitlocker from generating Multiple numerical password

Windows
Windows
A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.
4,819 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Hania Lian 8,381 Reputation points Microsoft Vendor
    2024-04-03T07:31:41.55+00:00

    Hello,

    To stop Bitlocker from generating multiple numerical passwords, you can try these steps:

    1. Open the Group Policy Editor by pressing the Windows key + R and typing "gpedit.msc" in the Run dialog box.
    2. Navigate to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.
    3. Double-click on "Require additional authentication at startup" policy.
    4. Select the "Enabled" option.
    5. Under "Configure TPM startup PIN," select "Require startup PIN with TPM."
    6. Under "Configure TPM startup key and PIN," select "Require startup key and PIN with TPM."
    7. Click "Apply" and then "OK" to save the changes.

    Best Regards,

    Hania Lian

    ============================================

    If the Answer is helpful, please click "Accept Answer" and upvote it.