Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
GC-PO-WIN-C-BitLocker Encryption Settings UEFI
Data collected on: 2-9-2025 10:41:49
General
Details
Domainemea.tpg.ads
OwnerEMEA\likaj.7-adm
Created29-8-2022 14:13:02
Modified24-8-2025 15:12:50
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions1 (AD), 1 (SYSVOL)
Unique ID{de40ecf6-5910-47f6-93c0-1c06d68764dc}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/Special-Services/GC/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\GCDXBL1Y3Y1B3$
EMEA\GCDXBLCD24445V6$
EMEA\GCDXBLND15052VC$
EMEA\GC-G-ORG-DMM-Citzen Account Computers
EMEA\GC-G-ORG-JED-Citzen Account Computers
EMEA\GC-G-ORG-RUH-ABB Computers
EMEA\GC-G-ORG-RUH-AC Computers
EMEA\GC-G-ORG-RUH-Citzen Account Computers
EMEA\GC-G-ORG-RUH-Hala Computers
EMEA\GC-G-ORG-RUH-Hungerstation Computers
EMEA\GC-G-ORG-RUH-McDonalds Computers
EMEA\GC-G-ORG-RUH-NTDP Computers
EMEA\GC-G-ORG-RUH-RX Computers
EMEA\GC-G-ORG-RUH-SFC Computers
EMEA\GC-G-ORG-RUH-Thamanyah Computers
EMEA\GC-G-ORG-RUH-Thiqah Computers
EMEA\GC-L-SEC-Bitlocker-Encryption-Settings
S-1-5-21-513466819-3096973226-347852806-1232103
S-1-5-21-513466819-3096973226-347852806-1232113
S-1-5-21-513466819-3096973226-347852806-1232815
S-1-5-21-513466819-3096973226-347852806-1232947
S-1-5-21-513466819-3096973226-347852806-1519107
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\GCDXBL1Y3Y1B3$Read (from Security Filtering)No
EMEA\GCDXBLCD24445V6$Read (from Security Filtering)No
EMEA\GCDXBLND15052VC$Read (from Security Filtering)No
EMEA\GC-G-ORG-DMM-Citzen Account ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-JED-Citzen Account ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-OU AdminsEdit settings, delete, modify securityNo
EMEA\GC-G-ORG-RUH-ABB ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-AC ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Citzen Account ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Hala ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Hungerstation ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-McDonalds ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-NTDP ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-RX ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-SFC ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Thamanyah ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Thiqah ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-ServerAdminEdit settings, delete, modify securityNo
EMEA\GC-L-SEC-Bitlocker-Encryption-SettingsRead (from Security Filtering)No
EMEA\likaj.7-admEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-1232103Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1232113Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1232815Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1232947Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1519107Read (from Security Filtering)No
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/BitLocker Drive Encryption
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)Enabled
Select the encryption method for operating system drives:XTS-AES 256-bit
Select the encryption method for fixed data drives:XTS-AES 256-bit
Select the encryption method for removable data drives:AES-CBC 256-bit
PolicySettingComment
Provide the unique identifiers for your organizationEnabled
BitLocker identification field:Teleperformance-TPM-Security
Allowed BitLocker identification field:Teleperformance-TPM-Security
PolicySettingComment
Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)Enabled
Require BitLocker backup to AD DSEnabled
If selected, cannot turn on BitLocker if backup fails (recommended default).
If not selected, can turn on BitLocker even if backup fails. Backup is not automatically retried.
Select BitLocker recovery information to store:Recovery passwords and key packages
A recovery password is a 48-digit number that unlocks access to a BitLocker-protected drive.
A key package contains a drive's BitLocker encryption key secured by one or more recovery passwords
Key packages may help perform specialized recovery when the disk is damaged or corrupted.
Windows Components/BitLocker Drive Encryption/Fixed Data Drives
PolicySettingComment
Allow access to BitLocker-protected fixed data drives from earlier versions of WindowsEnabled
Do not install BitLocker To Go Reader on FAT formatted fixed drivesEnabled
PolicySettingComment
Choose how BitLocker-protected fixed drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for fixed data drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Backup recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for fixed data drivesEnabled
PolicySettingComment
Configure use of hardware-based encryption for fixed data drivesEnabled
Use BitLocker software-based encryption when hardware encryption is not availableEnabled
Restrict encryption algorithms and cipher suites allowed for hardware-based encryptionDisabled
Restrict crypto algorithms or cipher suites to the following:2.16.840.1.101.3.4.1.2;2.16.840.1.101.3.4.1.42
PolicySettingComment
Enforce drive encryption type on fixed data drivesEnabled
Select the encryption type:Used Space Only encryption
Windows Components/BitLocker Drive Encryption/Operating System Drives
PolicySettingComment
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for operating system drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Store recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesEnabled
PolicySettingComment
Enforce drive encryption type on operating system drivesEnabled
Select the encryption type:Used Space Only encryption
User Configuration (Enabled)
No settings defined.