@cereberus 'Device Encryption' and 'BitLocker Device Encryption' is what I see in 'System Info' in Home and Pro, respectively, and that's the terminology I use 

My Computer
System One
-
- OS
- Windows 10 Pro
I'm not sure if your BitLocker installation is fully functional. You can do a few tests.On the problem system if I go to System Information w/admin all it shows under Device Encryption Support is "meets prerequisites"
Under Disk Management for the C: drive it shows NTFS(Bitlocker Encrypted)
Yeah, I suspect very much that with your present BitLocker installation you will get weird test results.Since I have no need to use BitLocker to begin with "If" I do anything it would only be to more or less see what's going on. Otherwise that machine will get a clean install.
They are the same thing. Device Encryption was renamed Bitlocker Device Encryption for clarity - Obviously MS have not bothered to update System Info screens - typical only doing half a job.@cereberus 'Device Encryption' and 'BitLocker Device Encryption' is what I see in 'System Info' in Home and Pro, respectively, and that's the terminology I use![]()
The keys are generated at the time of encryption.BTW there are no Bitlocker/Encryption Keys on my MS account associated with this system. But that might simply be because I haven't actually "activated" it?
Were you using Home or Pro?I ended up applying the easier method. From an elevated cmd prompt I just typed "manage-bde -off C:" and that decypted the drive in just a short time. So the issue has been taken care of but still not sure how it got encrypted to begin with.
Well, clearly it will work fine in Pro. Bitlocker Device Encryption is pointless for Pro as you have full Bitlocker Drive Encryption.Pro.
And BTW I see Rufus has a new Beta edition out and looks like they're adding a feature to disable Bitlocker automatic device encryption.
![]()
feature request: add option to Disable BitLocker automatic device encryption · Issue #2121 · pbatard/rufus
Can you please add option to Disable BitLocker automatic device encryption? It's anoying that bitlocker encryption is turned on all all drivers by default on my new HP notebook with 12gen cpu. ...github.com
Can I ask, when you do a restore of your system drive, is it still encrypted? I use Easeus Todobackup and enabling Bitlocker resulted in transparent use of my computer and the use of Todobackup, but when I do a restore and reboot, the drive is no longer encrypted. Does Macrium Reflect restore the system drive to the Bitlocker state it was when backed up, or do you need to reapply Bitlocker after a restore? This was touched on in post #6.And again the only reason I noticed something amiss was the Bitlocker symbol that all of a sudden was showing up on that drive while using Macrium Reflect free.
Of that I cannot be sure about. When I created the new image with the current state of encryption I got some warnings from MR about Bitlocker but forget what exactly the specific warnings were. The only other image I had on the system was the initial image I created back in Sept 22 when the system was first loaded. I have to assume however that MR will restore the image as it was created without the encryption in place.Can I ask, when you do a restore of your system drive, is it still encrypted? I use Easeus Todobackup and enabling Bitlocker resulted in transparent use of my computer and the use of Todobackup, but when I do a restore and reboot, the drive is no longer encrypted. Does Macrium Reflect restore the system drive to the Bitlocker state it was when backed up, or do you need to reapply Bitlocker after a restore? This was touched on in post #6.
The reason I am even exploring encryption is I was looking into usb boot iso's and seen these windows password reset programs. I tried one and, WOW!, it removed the need for my password in less the 30 seconds after it booted. I think the password reset program will not work on an encrypted system, and I will test soon, but meanwhile am seeing if Bitlocker will be easy to live with, provide security but make sure I can do a restore if necessary.
Thanks!
The reason these programs work is because they boot in winpe mode, and few people lockdown their bios so people cannot boot from it.The reason I am even exploring encryption is I was looking into usb boot iso's and seen these windows password reset programs. I tried one and, WOW!, it removed the need for my password in less the 30 seconds after it booted.
Thanks!
There's a fine line between security and losing basic functionality or ease of use. The risk vs the steps you are willing to go to minimize it is something we all have to decide for ourselves, but sometimes we don't even know what the risks or solutions are. I am thankful to everyone here who shares their knowledge. And like you, some additional testing gets put off 'till "later".As far as the password bypass programs I found an issue when trying to boot to a Hiren's Boot flash drive a few weeks ago but had never had an issue prior. I tinkered with it for a while to try and see if it was being caused by a Secure Boot setting but after seeing mixed results I put troubleshooting away to get to it later. lol
Before I replied to this, I just tried to boot from my thumbdrive and it said can't boot to UEFI (or something to that matter). That alone is good reason to set a password to the BIOS.The reason these programs work is because they boot in winpe mode, and few people lockdown their bios so people cannot boot from it