Troubleshoot: BitLocker Policy for Windows Devices

This article shows you how to troubleshoot issues that can occur with the JumpCloud Windows BitLocker Policy.

Note:
The policy fails due to non-OS or hidden volumes.

Symptoms

  • The BitLocker policy fails to apply.
  • Encryption functionality is interrupted.
  • Errors indicate conflicts with non-operating system (OS) volumes or drives (hidden drives assigned a letter for example D:.

Cause

This issue often stems from conflicts with non-OS volumes that have BitLocker enabled manually or other drives that the device detects as encryptable volumes. Before enabling the JumpCloud BitLocker policy, all non-OS volumes must have BitLocker disabled to avoid interference.

Resolution

Follow these steps to identify problematic volumes, disable conflicting encryption, and reapply the policy.

Step 1: Identify Problematic Volumes

  1. Disconnect all external drives (USB, external HDDs) from the device to prevent interference.
  2. Open PowerShell as an administrator on the device and run the following command to list all drives and their encryption status: Get-BitLockerVolume

Note:

Use this output to identify any hidden drives that might be interfering with the policy.

  1. Open Disk Management and review all listed volumes. Look specifically for hidden volumes that have been assigned drive letters, for example D:.

Step 2: Disable BitLocker on Non-OS Volumes

If the output from Step 1 shows that a non-OS volume has BitLocker enabled, you must turn it off.

  1. Open BitLocker Drive Encryption settings on the device.
  2. Locate the relevant non-OS volume.
  3. Select Turn off BitLocker.
  4. Wait for the decryption process to complete before proceeding.

Step 3: Reset the BitLocker Policy in JumpCloud

Once conflicting volumes are decrypted, reapply the policy to the device.

Warning:

Not properly backing up Recovery Keys before unbinding the policy may result in potential data loss. Proceed with caution.

  1. Log in to the JumpCloud Admin Portal.

Important:

If your data is stored outside of the US, check which login URL you should be using depending on your region, see JumpCloud Data Centers to learn more.

  1. Go to Device Management > Devices.
  2. Select the device and go to the Policies tab.
  3. Unbind the BitLocker policy from the device and click Save Device.
  4. Restart the Windows device.
  5. In the Admin Portal, bind the BitLocker policy to the device again and click Save.
  6. Verify the policy status.
The policy results show the error: “More than one numerical password currently set.”

Warning:

JumpCloud only stores one Recovery Key. When the extra keys are cleared, the BitLocker policy can be applied successfully. Until the Recovery Key appears in the Admin Portal, it is a good idea to back up your Recovery Key. Not properly backing up Recovery Keys may result in potential data loss. Proceed with caution.

If your BitLocker policy returns an error similar to {"state": "FAILED", "detail": "Bitlocker Protected - More than one numerical password currently set. This configuration is not supported, please ensure that the system only has one or no numerical password in place."}:

Cause

The device has multiple Recovery Keys set. This policy is failing because JumpCloud can't determine which key is ours, and can’t rotate the key properly until an admin clears the extras.

Resolution

To remove extra BitLocker Recovery Keys from a device that has its disk fully encrypted:

  1. On the Windows device, open a command prompt, running it as an administrator.
  2. Run the following command:  manage-bde.exe -protectors c: -get.
  3. Run  manage-bde.exe -protectors c: -delete -id {ID}  to remove the extra numerical password.
The policy results show the error: “TPM Ownership has not been established.”

If your BitLocker policy returns a “TPM Ownership has not been established” error, follow these steps:     

  1. On your device, open PowerShell as an administrator and enter execute Get-Tpm into the prompt.
  2. In the results, verify that TpmOwned and AutoProvisioning are set to False/Disabled
  3. Enter Execute Enable-TpmAutoProvisioning in the prompt.
  4. Reboot your device.
  5. Repeat step 1 and verify that TpmOwned and AutoProvisioning are now set to True/Enabled. In the event this doesn’t occur, follow the steps in the procedure below. 
The policy results show the error: “TPM is not ready to be used on this device.”

If your BitLocker policy returns a “TPM is not ready to be used on this device” error, follow these steps: 

  1. Open the Run window on your device by pressing the WindowsR keys simultaneously. 
  2. Enter tpm.msc into the Run window.
  3. Verify that the status displays The TPM is not ready for use.
  4. From the Actions menu on the Run window, select Prepare TPM.
  5. Using the prompt that appears, restart your device.

Note:

If your device recommends clearing the TPM, this could result in data loss. If you need to reset TPM, follow Microsoft’s Documentation.  

  1. After you restart your device, you may be prompted on the boot screen to accept changes to the TPM state. Verify these changes and accept.
  2. Repeat steps 1 and 2 and verify that the TPM status displays The TPM is ready for use.
The policy results show the error: “C: Volume does not have Tpm Key Protector. Non-OS volumes will not be encrypted.”

BitLocker encryption was applied via the portal, and devices showed successful encryption. However, the Bitlocker policy results show this message: “C: Volume does not have Tpm Key Protector. Non-OS volumes will not be encrypted”

Cause

An additional authentication method was enabled on the systems through GPO.

Resolution

Follow these steps to resolve the issue:

  1. From Start menu, press the Windows logo key on the keyboard.
  2. Type gpedit.msc command and press Enter.
  3. On the Local Group Policy Editor window, follow the path: Computer Configuration > Administrative Templates > Windows Components > Bit Locker Drive Encryption.
  4. Select Operating System Devices.
  5. On the right pane, double-click Require additional authentication at startup.
  6. Select the Disabled radio button.
  7. Ensure the Allow BitLocker without a compatible TPM checkbox in the Options section is unchecked.
  8. Once done, click OK to allow the changes to take effect and close the Local Group Policy Editor window.
The policy results show the error: “You cannot call a method on a null-valued expression.”

Symptoms

  • In the Admin Portal, the BitLocker policy results show the following error:
    ”You cannot call a method on a null-valued expression”
  • Runing manage-bde -Status in a Command Prompt on the device returns the following error:

PS C:\WINDOWS\system32> manage-bde -Status
BitLocker Drive Encryption: Configuration Tool version 10.0.19041
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

ERROR: An error occurred (code 0x8004100e): Invalid namespace

Cause

The "Invalid Namespace" error typically indicates an issue with Windows Management Instrumentation (WMI) on the device. This occurs if the namespace that the policy or script is attempting to access is missing, corrupt, or unavailable.

Resolution

Important:

If the BitLocker Recovery Key is visible in the Admin Portal, back it up and unbind the device from the policy before proceeding to prevent potential data loss.

To rebuild the WMI Repository:

  1. On the affected device, open Command Prompt as an Administrator.
  2. Run the following command: net stop winmgmt
    • If prompted to stop dependent services, press Y and Enter.
  3. Run the following commands to reset the WMI repository:
    1. winmgmt /resetrepository
    2. net start winmgmt
  4. Restart the device and rebind the BitLocker policy to it.

Additional Diagnostic Tools

If you continue to experience issues, you can gather detailed logs to share with JumpCloud Support.

  • Automatic Collection - See Diagnose BitLocker Issues Using PowerShell to use a script to collect information.
  • Manual Collection - Alternatively, you can collect the information manually by running the following commands in PowerShell or Command Prompt:
    • manage-bde -status to view the current encryption state of all volumes.
    • Get-BitLockerVolume to see detailed volume information.
Back to Top

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case