Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
ROBUH-PO-WIN-C-BITLOCKER-ANT
Data collected on: 2-9-2025 11:34:51
General
Details
Domainemea.tpg.ads
OwnerS-1-5-21-513466819-3096973226-347852806-612168
Created11-10-2023 10:08:30
Modified12-10-2023 08:55:00
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions12 (AD), 12 (SYSVOL)
Unique ID{ab7f5b13-a2d5-4132-932e-490d0b92ce35}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ANTNoEnabledemea.tpg.ads/RO/Systems/Clients/ANT

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\ROBU1VMANT01$
S-1-5-21-513466819-3096973226-347852806-1108829
S-1-5-21-513466819-3096973226-347852806-1504198
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\ROBU1VMANT01$Read (from Security Filtering)No
EMEA\RO-G-ORG-OU AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-1108829Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1504198Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-612168Edit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/BitLocker Drive Encryption
PolicySettingComment
Choose default folder for recovery passwordEnabled
Configure the default folder path:\\robuhemeadc01\SYSVOL\emea.tpg.ads\Policies\{33E7D701-E2C7-4A8C-990D-9D48BDA10E7F}\Machine\Backup
Specify a fully qualified path or include the computer's environment variables in the path.
For example, enter "\\server\backupfolder", or "%SecureDriveEnvironmentVariable%\backupfolder"
Note: In all cases, the user will be able to select other folders in which to save the recovery password.
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)Enabled
Select the encryption method for operating system drives:XTS-AES 256-bit
Select the encryption method for fixed data drives:XTS-AES 256-bit
Select the encryption method for removable data drives:AES-CBC 256-bit
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507])Disabled
Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)Enabled
Require BitLocker backup to AD DSEnabled
If selected, cannot turn on BitLocker if backup fails (recommended default).
If not selected, can turn on BitLocker even if backup fails. Backup is not automatically retried.
Select BitLocker recovery information to store:Recovery passwords and key packages
A recovery password is a 48-digit number that unlocks access to a BitLocker-protected drive.
A key package contains a drive's BitLocker encryption key secured by one or more recovery passwords
Key packages may help perform specialized recovery when the disk is damaged or corrupted.
Windows Components/BitLocker Drive Encryption/Operating System Drives
PolicySettingComment
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardDisabled
Save BitLocker recovery information to AD DS for operating system drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Store recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesEnabled
PolicySettingComment
Enforce drive encryption type on operating system drivesEnabled
Select the encryption type:Used Space Only encryption
PolicySettingComment
Require additional authentication at startupEnabled
Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)Disabled
Settings for computers with a TPM:
Configure TPM startup:Allow TPM
Configure TPM startup PIN:Allow startup PIN with TPM
Configure TPM startup key:Allow startup key with TPM
Configure TPM startup key and PIN:Allow startup key and PIN with TPM
Preferences
Control Panel Settings
Scheduled Tasks
Scheduled Task (At least Windows 7) (Name: Bitlocker Auto Encryption)
Bitlocker Auto Encryption (Order: 1)
General
ActionUpdate
Task
Name Bitlocker Auto Encryption
Author EMEA\bujor.8-adm
Description
Run only when user is logged on S4U
UserId NT AUTHORITY\System
Run with highest privileges HighestAvailable
Hidden No
Configure for 1.2
Enabled Yes
Triggers
1. Run at user logon
Stop task if it runs longer than 3 days
Enabled Yes
Actions
1. Start a program
Program/script \\robuhemeadc01\SYSVOL\emea.tpg.ads\Policies\{33E7D701-E2C7-4A8C-990D-9D48BDA10E7F}\Machine\Bitlocker.bat
Settings
Start the task only if the computer is idle for 5 minutes
Wait for idle for 1 hour
Stop if the computer ceases to be idle Yes
Restart if the idle state resumes No
Start the task only if the computer is on AC power Yes
Stop if the computer switches to battery power Yes
Allow task to be run on demand Yes
Run task as soon as possible after a scheduled start is missed Yes
Stop task if it runs longer than 3 days
If the running task does not end when requested, force it to stop Yes
If the task is already running, then the following rule applies IgnoreNew
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Enabled)
No settings defined.