This is an old revision of the document!
Bitlocker vs. EFS: https://www.howtogeek.com/236719/whats-the-difference-between-bitlocker-and-efs-encrypting-file-system-on-windows/
Auto Unlock: https://petri.com/how-to-configure-bitlocker-auto-unlock
Keep in mind that if enabled, and using the password option, you will not be able to access the PC via RDP if it is rebooted.
Bitlocker has been available since Windows Vista but only in Professional and Enterprise versions.
manage-bde -status manage-bde -protectors -get e: Get-BitLockerVolume Get-BitlockerVolume -MountPoint "E:"
These commands will allow you to specify a startup key on most any drive, not just USB drives.
Add protectors and encrypt drive C:
manage-bde -protectors -add C: -RecoveryPassword --startupkey E: manage-bde -protectors -add C: -recoverypassword <numericalpassword> manage-bde -protectors -add C: -password manage-bde -on C:
Delete a protector:
manage-bde -protectors -delete c: -id {Protector-ID}
When enabling Bitlocker it will check to see if your computer has TPM. If not, it will throw a message that you can use Bitlocker without it but need to change a Local Group Policy.
You may want to change the password that unlocks your hard drive for various reasons. If you know the current password you can change it. A minimum of 8 characters is required and a mixture of upper case, lower case, numeric and special characters is recommended.
DO NOT FORGET YOUR NEW PASSWORD.
Install Bitlocker Feature: https://abouconde.com/2019/05/20/encrypt-drives-with-bitlocker-on-windows-server-2019/
Enable FIPS Compliance Policy: https://blogs.oracle.com/cloud-infrastructure/windows-server-fips-compliance-v2
Video Howto: https://www.youtube.com/watch?v=Ujac3q_yBrc