๐Ÿ›ก๏ธ Recipe ยท Security & Compliance

Check BitLocker Encryption Status Reliably with PowerShell

Avoid false positives by validating encryption, protection, and key protectors together

Complexity

Intermediate

Impact

security + compliance + endpoint-management + windows + automation

Context

Why This Matters

BitLocker status checks are a staple of endpoint compliance reporting, but naive scripts frequently produce false positives. A drive can report ProtectionStatus = 1 while only partially encrypted, or report ProtectionStatus = 0 while the data itself is still fully encrypted โ€” the protectors just happen to be missing or suspended.

This recipe shows how to reliably verify BitLocker on a Windows endpoint by evaluating three independent signals together: volume encryption state, protection status, and key protector presence. Use this when:

  • Building compliance reports for ISO 27001, SOC 2, HIPAA, or Essential 8 (ML1+) attestation
  • Validating endpoints after a BIOS/firmware update (a common cause of suspended protection)
  • Auditing fleet encryption via Intune proactive remediations or an RMM
  • Troubleshooting why a device appears "encrypted" in Intune but fails a real-world security review

Expected Outcomes

After completing this recipe you will have:

  • A reliable PowerShell function that returns true only when the system drive is fully encrypted, actively protected, and has at least one key protector configured
  • Clear understanding of the three independent BitLocker states โ€” VolumeStatus, ProtectionStatus, and KeyProtector โ€” and why checking only one is insufficient
  • A deployable script suitable for Intune proactive remediations, Configuration Manager compliance baselines, or ad-hoc audits
  • Documented logic that distinguishes "suspended" from "off" from "encrypting in progress"

Risks & Considerations

Gotchas and caveats

  • Administrator rights required. Get-BitLockerVolume and the underlying root\CIMV2\Security\MicrosoftVolumeEncryption namespace require an elevated session. Non-elevated calls may return empty or partial data, which your script could misinterpret as "not encrypted."
  • Suspended protection is not "off." After a BIOS update or TPM change, BitLocker may auto-suspend. The drive remains encrypted but the decryption key is stored in the clear on disk. ProtectionStatus correctly reports Off in this state โ€” do not dismiss this as a transient condition.
  • Encryption progress matters. A drive mid-encryption may show ProtectionStatus = On while VolumeStatus is EncryptionInProgress. Treat in-progress as a non-compliant state until it reaches FullyEncrypted.
  • Hardware (SED / eDrive) encryption can change what the WMI classes report. Check EncryptionMethod if your fleet includes Opal drives.
  • Do not rely on Intune's "Encrypted" column alone. Intune reports MDM attestation, which can lag real device state by hours or miss suspended protection entirely.
  • Never log or export recovery keys from these checks. Escrow them to AD/Entra ID or Intune โ€” never to a file share or ticket.

Required Permissions

PermissionWhy It's Needed
Local Administrator on the target deviceRequired to query BitLocker key protectors and the MicrosoftVolumeEncryption WMI namespace
Intune: Device configuration / Remediations (Read and write)Required if deploying this script as a proactive remediation across a managed fleet
PowerShell execution policy allowing signed or RemoteSigned scriptsRequired to run the script outside of interactive sessions (e.g., via Intune or RMM)

The fastest way to get this done โ€” just ask Dex. Copy the prompt below and paste it into your Dex conversation.

For IT Admins

Paste into Dex CoAdmin

Check BitLocker encryption status on {device_name} (or across all managed Windows devices). Verify the system drive is fully encrypted, protection is active (not suspended), and at least one key protector is configured. Flag any device that fails any of the three checks and summarize the reasons.
Try in Dex CoAdmin

For End Users

How an employee would ask Dex for help

Is my work laptop's hard drive encrypted and protected?
Try in Dex Playground