When you store sensitive data on your computer, it's crucial that you take the necessary steps to protect that data (especially if you use a laptop or tablet). This is not just to stop the NSA from accessing your files, but it's more about preventing your private data from falling into the wrong hands in the slightly change you lose your device, or it gets stolen.

According to the 'How to Hide Default BitLocker Encryption in the Windows Control Panel' document, this is by design: The customized control panel, which is in Control Panel under System and Security, enables users to manage their PIN and passwords and to unlock drives, and hides the interface that enables administrators to decrypt a drive or to suspend or resume BitLocker drive encryption. How to Suspend or Resume BitLocker Protection for Drive in Windows 10. When you suspend BitLocker protection for an OS drive, it will remain unlocked and unprotected until you either manually resume BitLocker protection for the drive, or have it resume BitLocker protection automatically the next time you restart the PC.

On way you can protect your data is by using encryption. Briefly, encryption is basically the process of making any type of data unreadable by anyone without proper authorization. If you use encryption to scramble your data, it will continue to be unreadable even after sharing it with other people. In other words, only you with the right encryption key can make the data readable again.

Windows 10, similar to previous versions, includes BitLocker Drive Encryption, a feature that allows you to use encryption on your PC's hard drive and on removable drives to prevent prying eyes from snooping into your sensitive data.

In this Windows 10 guide, we'll walk you through the steps to set up BitLocker on your PC to make sure your sensitive data stays secure.

Things to know before diving into this guide

  • BitLocker Drive Encryption is available only on Windows 10 Pro and Windows 10 Enterprise.
  • For best results your computer must be equipped with a Trusted Platform Module (TPM) chip. This is a special microchip that enables your device to support advanced security features.
  • You can use BitLocker without a TPM chip by using software-based encryption, but it requires some extra steps for additional authentication.
  • Your computer's BIOS must support TPM or USB devices during startup. If this isn't the case, you'll need to check your PC manufacturer's support website to get the latest firmware update for your BIOS before trying to set up BitLocker.
  • Your PC's hard drive must contain two partitions: a system partition, which contains the necessary files to start Windows, and the partition with the operating system. If your computer doesn't meet the requirements, BitLocker will create them for you. Additionally, the hard drive partitions must be formatted with the NTFS file system.
  • The process to encrypt an entire hard drive isn't difficult, but it's time-consuming. Depending the amount of data and size of the drive, it can take a very long time.
  • Make sure to keep your computer connected to an uninterrupted power supply throughout the entire process.

Important: While BitLocker is a stable feature on Windows 10, as any significant change you make to your computer has its risks. It's always recommended that you make a full backup of your system before proceeding with this guide.

How to check if your device has a TPM chip

  1. Use the Windows key + X keyboard shortcut to open the Power User menu and select Device Manager.
  2. Expand Security devices. If you have a TPM chip, one of the items should read Trusted Platform Module with the version number.

Note: Your computer must have a TPM chip version 1.2 or later to support BitLocker.

Alternatively, you can also check your PC manufacturer's support website to find out if your device includes the security chip, and for instructions to enable the chip in the BIOS (if applicable).

Devices, such as Surface Pro 3, Surface Pro 4, or Surface Book come with the TMP chip to support BitLocker encryption.

How to ensure you can turn on BitLocker without TPM

If your computer doesn't include a Trusted Platform Module chip, you won't be able to turn on BitLocker on Windows 10. In this is your case, you can still use encryption, but you'll need to use the Local Group Policy Editor to enable additional authentication at startup.

  1. Use the Windows key + R keyboard shortcut to open the Run command, type gpedit.msc, and click OK.
  2. Under Computer Configuration, expand Administrative Templates.
  3. Expand Windows Components.
  4. Expand BitLocker Drive Encryption and Operating System Drives.
  5. On the right side, double-click Require additional authentication at startup.

  6. Select Enabled.
  7. Make sure to check the 'Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)' option.
  8. Click OK to complete this process.

Bitlocker Encryption System

How to turn on BitLocker on the Operating system drive

Once you made sure BitLocker can be properly enabled on your computer, follow these steps:

  1. Use the Windows key + X keyboard shortcut to open the Power User menu and select Control Panel.
  2. Click System and Security.
  3. Click BitLocker Drive Encryption.

  4. Under BitLocker Drive Encryption, click Turn on BitLocker.

  5. Choose how you want to unlock your drive during startup: Insert a USB flash drive or Enter a password. For the purpose of the guide, select Enter a password to continue.

  6. Enter a password that you'll use every time you boot Windows 10 to unlock the drive, and click Next to continue. (Make sure to create a strong password mixing uppercase, lowercase, numbers, and symbols.)

  7. You will be given the choices to save a recovery key to regain access to your files in case you forget your password. Options include:

    • Save to your Microsoft account
    • Save to a USB flash drive
    • Save to a file
    • Print the recovery

    Select the option that is most convenient for you, and save the recovery key in a safe place.

    Quick Tip: If you trust the cloud, you can choose to save your recovery key in your Microsoft account using the Save to your Microsoft account option. In which case, you can retrieve your encryption key at this location: https://onedrive.live.com/recoverykey.

  8. Click Next to continue.

  9. Select the encryption option that best suits your scenario:

    • Encrypt used disk space only (faster and best for new PCs and drives)
    • Encrypt entire drive (slower but best for PCs and drives already in use)
  10. Choose between the two encryption options:

    • New encryption mode (best for fixed drives on this device)
    • Compatible mode (best for drives that can be moved from this device)

      On Windows 10 version 1511, Microsoft introduced support for XTS-AES encryption algorithm. This new encryption method provides additional integrity support and protection against new attacks that use manipulating cipher text to cause predictable modifications in clear text. BitLocker supports 128-bit and 256-bit XTS AES keys.

  11. Click Next to continue.

  12. Make sure to check the Run BitLocker system check option, and click Continue.

  13. Finally, restart your computer to begin the encryption process.
  14. On reboot, BitLocker will prompt you to enter your encryption password to unlock the drive. Type the password and press Enter.

After rebooting, you'll notice that your computer will quickly boot to the Windows 10 desktop. However, if you go to Control Panel > System and Security > BitLocker Drive Encryption, you'll see that BitLocker is still encrypting your drive. Depending on the option you selected and the size of the drive, this process can take a long time, but you'll still be able to work on your computer.

Once the encryption process completes, the drive level should read BitLocker on.

You can verify that BitLocker is turned on by the lock icon on the drive when you open This PC on File Explorer.

BitLocker Drive Encryption options

When BitLocker is enabled on your main hard drive, you'll get a few additional options, including:

  • Suspend protection: When you're suspending protection your data won't be protected. Typically, you would use this option when applying a new operating system, firmware, or hardware upgrade. If you don't resume the encryption protection, BitLocker will resume automatically during the next reboot.
  • Back up your recovery key: If you lose your recovery key, and you're still signed into your account, you can use this option to create a new backup of the key with the options mentioned on step 6.
  • Change password: You can use this option to create a new encryption password, but you'll still need to supply the current password to make the change.
  • Remove password: You can't use BitLocker without a form of authentication. You can remove a password only when you configure a new method of authentication.
  • Turn off BitLocker: In the case, you no longer need encryption on your computer, BitLocker provides a way to decrypt all your files. However, make sure to understand that after turning off BitLocker your sensitive data will no longer be protected. In addition, decryption may take a long time to complete its process depending on the size of the drive, but you can still use your computer.

How to turn on BitLocker To Go

BitLocker is not an encryption feature that you can enable globally on every drive connected to your computer at once. It has two part: you can use BitLocker Drive Encryption to encrypt your sensitive data on the main hard drive of your PC, and then you can use BitLocker To Go. This last feature will help you to use encryption on remove drives and secondary hard drives connected to your computer.

To turn on BitLocker To Go on a removable drive do the following:

  1. Connect the drive you want to use with BitLocker.
  2. Use the Windows key + X keyboard shortcut to open the Power User menu and select Control Panel.
  3. Click System and Security.
  4. Click BitLocker Drive Encryption.

  5. Under BitLocker To Go, expand the drive you want to encrypt.
  6. Click the Turn on BitLocker link.

  7. Check the Use a password to unlock the drive option, and create a password to unlock the drive. (Make sure to create a strong password mixing uppercase, lowercase, numbers, and symbols.)
  8. Click Next to continue.

  9. You will be given the choices to save a recovery key to regain access to your files in case you forget your password. Options include:

    • Save to your Microsoft account
    • Save to a file
    • Print the recovery

    Select the option that is most convenient for you, and click Next.

  10. Choose the encryption option that best suits your scenario:

    • Encrypt used disk space only (faster and best for new PCs and drives)
    • Encrypt entire drive (slower but best for PCs and drives already in use)
  11. Select between the two encryption options:

    • New encryption mode (best for fixed drives on this device)
    • Compatible mode (best for drives that can be moved from this device)

      In this step is recommended that you select the 'Compatible mode,' as it will ensure you can unlock the drive if you move it to another computer running a previous version of the operating system.

  12. Click Start encrypting to finish the process.

When encrypting a storage try to start with an empty removable media, as it'll speed up the process, then new data will encrypt automatically.

In addition, similar to BitLocker Drive Encryption, you will get the same additional options using BitLocker To Go, plus a few more, including:

  • Add smart card: This option will allow you to configure a smart card to unlock the removable drive.
  • Turn on auto-unlock: Instead of having to type a password every time you re-connect the removable drive, you can enable auto-unlock to access your encrypted data without entering a password.

Quick access to manage your BitLocker drive

Whether you turn on BitLocker for your system hard drive or removable drive, you can always get quick access to the BitLocker settings for a particular drive using the following steps:

  1. Use the Windows key + E keyboard shortcut to open File Explorer.
  2. Click This PC from the left pane.
  3. Right-click the encrypted drive and select Manage BitLocker.

Wrapping things up

While Microsoft only includes BitLocker on Windows 10 Pro and Enterprise, this is one of those features that should be standard in every edition, including on Windows 10 Home. Even more, considering that we continue to move into a digital world, where every day, we're creating more sensitive data on our computers than ever before, and data encryption is crucial to protect our data from prying eyes.

It's worth pointing out that enabling data encryption may slightly slow down the performance of your device due to the encryption process that will continue to run in the background. However, it's a feature worth using to keep your sensitive data secure.

Do you use data encryption on your computer? Tell us in the comments below.

More Windows 10 resources

How To Suspend Bitlocker

For more help articles, coverage, and answers on Windows 10, you can visit the following resources:

We may earn a commission for purchases using our links. Learn more.

-->
Suspends Bitlocker encryption for the specified volume.

Syntax

Description

The Suspend-BitLocker cmdlet suspends Bitlocker encryption, allowing users to access encrypted data on a volume that uses BitLocker Drive Encryption.This cmdlet makes the encryption key available in the clear.

Windows

Suspension of BitLocker does not mean that BitLocker decrypts data on the volume.Instead, suspension makes key used to decrypt the data available to everyone in the clear.New data written to the disk is still encrypted.

While suspended, BitLocker does not validate system integrity at start up.You might suspend BitLocker protection for firmware upgrades or system updates.

You can specify the number of times that a computer restarts before the BitLocker suspension ends by using the RebootCount parameter, or you can use the Resume-BitLocker cmdlet to manually resume protection.If you do not specify the RebootCount parameter, the cmdlet uses a value of one (1), so BitLocker protection resumes after the next restart.

For an overview of BitLocker, see BitLocker Drive Encryption Overview on TechNet.

Examples

Example 1: Suspend BitLocker protection

This command suspends Bitlocker encryption on the BitLocker volume specified by the MountPoint parameter.Because the RebootCount parameter value is 0, BitLocker encryption remains suspended until you run the Resume-BitLocker cmdlet.

Parameters

Prompts you for confirmation before running the cmdlet.

Type:SwitchParameter
Aliases:cf
Position:Named
Default value:False
Accept pipeline input:False
Accept wildcard characters:False

Specifies an array of drive letters or BitLocker volume objects.This cmdlet suspends protection for the volumes specified.To obtain a BitLocker volume object, use the Get-BitLockerVolume cmdlet.

Type:String[]
Position:0
Default value:None
Accept pipeline input:True (ByPropertyName, ByValue)
Accept wildcard characters:False

Specifies the number of computer restarts before BitLocker restores protection.The acceptable values for this parameter are: integers from 0 to 15.

Specify zero to suspend protection indefinitely until you resume it by using the Resume-BitLocker cmdlet.

If you do not include this parameter, the cmdlet uses a value of one.

Type:Int32
Position:1
Default value:None
Accept pipeline input:False
Accept wildcard characters:False

Shows what would happen if the cmdlet runs.The cmdlet is not run.

Type:SwitchParameter
Aliases:wi
Position:Named
Default value:False
Accept pipeline input:False
Accept wildcard characters:False

Inputs

BitLockerVolume[], String[]

Outputs

BitLockerVolume[]

Related Links