BitLocker Policy Modification

This guide will provide background information on modifying an existing disk encryption enforcement policy.

BitLocker Encryption

Data on a lost or stolen device is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard drive to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected devices are decommissioned or recycled.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Security

Handbook Reference

Package: TBD

Domain: TBD

Modifies: TBD

Modifying a Device BitLocker Policy

  1. Navigate to the Disk Encryption – Intune portal, locate and select the policy you wish to alter.
  2. Upon selecting the rule, scroll down to the Properties section; all the information of the rule will be displayed. Four points of interest will be available to Edit. You can modify the sections as needed.
    1. Basics: Adjusts non-functional items of the rule, such as the Name or Description of the rule.
    2. Assignments: Specifies which Groups will be included or excluded from rule enforcement.
    3. Scope Tags: Specifies which administrators will have access to the viewing and altering this object.
    4. Configuration Settings: Displays the security settings for the designated profile type that are currently enabled or disabled and being applied to the associated devices specified in the Assignments section.
  3. Regardless of which section is selected to be Edited, the same redirect to the Edit Policy page will be displayed. The first page will display the selected sections current configuration and will allow you to make the necessary adjustments (additions, removals, editing, etc.) The second page will be the Review section where you will finalize the changes. Once the necessary adjustments have been configured for the selected section select Next to continue to the modification finalization stage.
  4. Once all items have been reviewed, select Save to finalize modifications made to the policy.

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.