BitLocker is an encryption feature in Windows that AGE uses for the encryption of drives on the system, as a layer of security. With traditionally unencrypted disks (the vast majority of the world’s computers), attackers could extract all of the data available on the local disk. This can be done by simply docking the system’s HDD onto another computer to browse the file system or by running a live distro of Linux\WinPE where the data would be in clear text. Not only is the local data on an unencrypted disk at risk, but other sensitive data like password hashes could also be recovered and used for other malicious purposes.
Therefore, drive encryption is an integral part of good security and we require it.
TPM
The “Trusted Protection Module” is a microchip that comes built-into most laptops and desktops ordered today. It provides a way of creating and encrypting keys that could be used for BitLocker and for other security related features. With TPM & BitLocker, the system would automatically decrypt the PC on startup, without requiring the use of a pin, usb, or other form of authentication.
One of the challenges with TPM and Bitlocker is that if there is a problem or for some reason the device thinks there is an unauthorized attempt to access the encrypted drive, it will lock the device and request the Bitlocker recovery key.
Luckily we store these keys in Microsoft 365 and you can access them.
If your device continues to prompt for the Bitlocker recovery key when you reboot. Try removing all peripherals and booting it again. Sometimes Bitlocker sees a peripheral as something shady so it prompts for the key.