<displayName>enter display name here</displayName>
<description>enter description here</description>
<resources>
<stringTable>
<string id="ActiveDirectoryBackup_Help">This policy setting allows you to manage the Active Directory Domain Services (AD DS) backup of BitLocker Drive Encryption recovery information.
If you enable this policy setting, BitLocker recovery information will be automatically and silently backed up to AD DS when BitLocker is turned on for a computer.
BitLocker recovery information includes the recovery password and some unique identifier data. You can also include a package that contains a BitLocker-protected volume's encryption key. This key package is secured by one or more recovery passwords and may help perform specialized recovery when the disk is damaged or corrupted.
If you select the option to "Require BitLocker backup to AD DS", BitLocker cannot be turned on unless the computer is connected to the domain and the AD DS backup succeeds. This option is selected by default to help ensure that BitLocker recovery is possible. Otherwise, AD DS backup is attempted but network or other backup failures do not impact BitLocker setup. Backup is not automatically retried and the recovery password may not have been stored in AD DS during BitLocker setup.
If you disable or do not configure this policy setting, BitLocker recovery information will not be backed up to AD DS.
IMPORTANT: To prevent data loss, you must have a way to recover BitLocker.
Note: You must first set up appropriate schema extensions and access control settings on the domain before AD DS backup can succeed. Consult online documentation for more information about setting up Active Directory Domain Services for BitLocker.
Note: TPM initialization may be needed during BitLocker setup. Enable the policy setting to "Turn on TPM backup to Active Directory Domain Services" in "System\Trusted Platform Module Services\" to ensure that TPM information is also backed up.</string>
<string id="ActiveDirectoryBackup_Name">Turn on BitLocker backup to Active Directory Domain Services</string>
<string id="ActiveDirectoryBackupDropDown_1">Recovery passwords and key packages</string>
<string id="ConfigureStartupUsage_Help">This policy setting allows you to configure whether the BitLocker Drive Encryption setup wizard will ask the user to set up an additional authentication that is requested each time the computer starts.
On a computer with a compatible Trusted Platform Module (TPM), two types of startup authentications can work to provide added protection for encrypted data. When the computer starts, it can require users to insert a USB flash drive containing a startup key. It can also require users to enter a 4 to 20 digit startup PIN.
A USB flash drive containing a startup key is needed on computers without a compatible Trusted Platform Module (TPM). Without a TPM, BitLocker-encrypted data is protected solely by the key material on this USB flash drive.
If you enable this policy setting, the wizard will show the page to allow the user to configure advanced startup options for BitLocker. You can further configure setting options for computers with and without a TPM.
If you disable or do not configure this policy setting, the BitLocker setup wizard will display basic steps that allow users to enable BitLocker on computers with a TPM. In this basic wizard, no additional startup key or startup PIN can be configured.</string>
<string id="ConfigurePINUsageDropDown_Optional">Allow user to create or skip</string>
<string id="ConfigurePINUsageDropDown_Require">Require startup PIN with TPM</string>
<string id="ConfigurePINUsageDropDown_Disallow">Disallow startup PIN with TPM</string>
<string id="ConfigureTPMStartupKeyUsageDropDown_Optional">Allow user to create or skip</string>
<string id="ConfigureTPMStartupKeyUsageDropDown_Require">Require startup key with TPM</string>
<string id="ConfigureTPMStartupKeyUsageDropDown_Disallow">Disallow startup key with TPM</string>
<string id="ConfigureRecoveryUsage_Help">This policy setting allows you to configure whether the BitLocker Drive Encryption setup wizard will ask the user to save BitLocker recovery options.
Two recovery options can unlock access to BitLocker-encrypted data. The user can type a random 48-digit numerical recovery password. The user can also insert a USB flash drive containing a random 256-bit recovery key.
If you enable this policy setting, you can configure the options that the setup wizard exposes to users for recovering BitLocker. For example, disallowing the 48-digit recovery password will prevent users from being able to print or save recovery information to a folder.
If you disable or do not configure this policy setting, the BitLocker setup wizard will present users with ways to store recovery options. Saving to a USB flash drive will store the 48-digit recovery password as a text file, and the 256-bit recovery key as a hidden file. Saving to a folder will store the 48-digit recovery password as a text file. Printing will provide the 48-digit recovery password.
Note: If TPM initialization is needed during the BitLocker setup, TPM owner information will be saved or printed with the BitLocker recovery information.
Note: The 48-digit recovery password will not be available in FIPS compliance mode.
IMPORTANT: To prevent data loss, you must have a way to recover BitLocker. If you disallow both recovery options below, you must enable the policy setting to "Turn on BitLocker backup to Active Directory Domain Services". Otherwise, a policy error occurs.</string>
<string id="ConfigureRecoveryFolder_Help">This policy setting allows you to specify the default path that is displayed when the BitLocker Drive Encryption setup wizard prompts the user to enter the location of a folder in which to save the recovery password.
If you enable this policy setting, you can specify the path that will be used as the default folder location when the user chooses the option to save the recovery password in a folder. You can specify either a fully-qualified path or include the target computer's environment variables in the path. If the path is not valid, the BitLocker setup wizard will display the computer's top-level folder view.
If you disable or do not configure this policy setting, the BitLocker setup wizard will display the computer's top-level folder view when the user chooses the option to save the recovery password in a folder.
Note: In all cases, the user will be able to select other folders in which to save the recovery password.</string>
<string id="EncryptionMethod_Help">This policy setting allows you to configure the algorithm and key size used by BitLocker Drive Encryption. This policy setting applies on a fully-decrypted disk. Changing the encryption method has no effect if the disk is already encrypted or if encryption is in progress.
If you enable this policy setting, you can configure the encryption method used on an unencrypted volume. Consult online documentation for more information about the available encryption methods.
If you disable or do not configure this policy setting, BitLocker will use the default encryption method of AES 128 bit with Diffuser or the encryption method specified by a local administrator's setup script. </string>
<string id="PlatformValidation_Help">This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.
If you enable this policy setting before turning on BitLocker, you can configure the boot components that the TPM will validate before unlocking access to the BitLocker-encrypted OS volume. If any of these components change while BitLocker protection is in effect, the TPM will not release the encryption key to unlock the volume and the computer will enter into recovery mode during boot.
If you disable or do not configure this policy setting, the TPM uses the default platform validation profile or the platform validation profile specified by a local administrator's setup script. The default platform validation profile secures the encryption key against changes to the Core Root of Trust of Measurement (CRTM), BIOS, and Platform Extensions (PCR 0), the Option ROM Code (PCR 2), the Master Boot Record (MBR) Code (PCR 4), the NTFS Boot Sector (PCR 8), the NTFS Boot Block (PCR 9), the Boot Manager (PCR 10), and the BitLocker Access Control (PCR 11).
WARNING: Changing from the default profile affects the security and manageability of your computer. BitLocker's sensitivity to platform modifications (malicious or authorized) is increased or decreased depending upon inclusion or exclusion (respectively) of the PCRs. </string>
<string id="MorBehavior_Help">This policy setting controls computer restart performance at the risk of exposing BitLocker secrets. BitLocker secrets include key material used to encrypt data. This policy setting applies only when BitLocker protection is enabled.
If you enable this policy setting, Microsoft Windows will not instruct the computer to overwrite memory on restarts. Preventing memory overwrite may improve restart performance, but will increase the risk of exposing BitLocker secrets.
If you disable or do not configure this policy setting, Microsoft Windows will help ensure that BitLocker secrets are removed from memory when the computer restarts.</string>
<string id="MorBehavior_Name">Prevent memory overwrite on restart</string>
</stringTable>
<presentationTable>
<presentation id="ActiveDirectoryBackup_Name">
<checkBox refId="RequireActiveDirectoryBackup_Name" defaultChecked="true">Require BitLocker backup to AD DS</checkBox>
<text/>
<text>If selected, cannot turn on BitLocker if backup fails</text>
<text>(recommended default).</text>
<text/>
<text>If not selected, can turn on BitLocker even if backup</text>
<text>fails. Backup is not automatically retried.</text>
<text/>
<dropdownList refId="ActiveDirectoryBackupDropDown_Name" noSort="true" defaultItem="0">Select BitLocker recovery information to store:</dropdownList>
<text/>
<text>A recovery password is a 48-digit number that unlocks</text>
<text>access to a BitLocker-protected volume.</text>
<text>A key package contains a volume's BitLocker encryption</text>
<text>key secured by one or more recovery passwords</text>
<text/>
<text>Key packages may help perform specialized recovery</text>
<text>when the disk is damaged or corrupted. </text>
</presentation>
<presentation id="ConfigureStartupUsage_Name">
<checkBox refId="ConfigureNonTPMStartupKeyUsage_Name" defaultChecked="true">Allow BitLocker without a compatible TPM</checkBox>
<text>(requires a startup key on a USB flash drive)</text>
<text>Each PCR index is associated with components that run</text>
<text>when Windows starts.</text>
<text/>
<text>Use the checkboxes below to choose the PCR indices to</text>
<text>include in the profile. </text>
<text/>
<text>Exercise caution when changing this setting.</text>
<text>We recommend the default of PCRs 0, 2, 4, 8, 9, 10, and 11.</text>
<text>For BitLocker protection to take effect, you must include PCR 11.</text>
<text>Consult online documentation for more information</text>
<text>about the benefits and risks of changing the default</text>
<text>TPM platform validation profile.</text>
<text/>
<checkBox refId="PlatformValidation_Setting0" defaultChecked="true">PCR 0: Core Root of Trust of Measurement (CRTM), BIOS, and Platform Extensions</checkBox>
<checkBox refId="PlatformValidation_Setting1">PCR 1: Platform and Motherboard Configuration and Data</checkBox>
<checkBox refId="PlatformValidation_Setting2" defaultChecked="true">PCR 2: Option ROM Code</checkBox>
<checkBox refId="PlatformValidation_Setting3">PCR 3: Option ROM Configuration and Data</checkBox>
<checkBox refId="PlatformValidation_Setting4" defaultChecked="true">PCR 4: Master Boot Record (MBR) Code</checkBox>
<checkBox refId="PlatformValidation_Setting5">PCR 5: Master Boot Record (MBR) Partition Table</checkBox>
<checkBox refId="PlatformValidation_Setting6">PCR 6: State Transition and Wake Events</checkBox>