LifeLine1620

Active Member
Joined
Apr 25, 2020
Messages
2
Full disclosure I posted this on MS forums with no hits.

Hi and Thank you,

No files are saved to USB when generating protector key in powershell (Admin) or CMD (Admin).


I am the only user for this system and have full Administrator rights.


I have a home built PC Win 10 Pro 1909 that has a TPM header. The Bios is updated to 03/2020. The mobo is MSI b360 and I bought a new MSI (Infineon IFX 1.2 / 2.0 v. 5.63.3353). I connected the TPM to the mobo and booted into bios. Enabled version to auto so that Win10 Pro can set between 1.2 and 2.0. dTPM is also enabled. The hash policy is sha256 all other securities are enabled. Started windows, device manager TMP was found-turned on Bitlocker. I cleared the TPM and took ownership. Encrypted C/ drive. Set gpolicy to enable pin and key. Inserted a fresh formatted 8 GB USB to fat32 drive O: I tried 3 different drives and NTFS just for kicks. Stored 2 txt files from OS. IE cmd Dir can see and copy files from CMD. Set file options to unhide system files.

(PS Admin) And tried CMD for the heck of it.

manage-bde -protectors -add C: -RecoveryKey O:
Key protectors added
Saved to directory O:
External Key:
ID: {********-****-****-****-************}
External Key File Name:
********-****-****-****-************.BEK

No files, Hidden or not on the USB.

Is this not the CMD to create a protector Key ?

I know there is more to configure like the Pin "which does work by the way in CMD". But I am concerned that if I reboot now, I will be asked to insert USB with Key and I don’t have that yet.

So at this time I have un-encrypted the C: drive with Bitlocker still on. I have tried several online workarounds to get the files to save to the drive but nothing works.

I am aware that the GPediter does say that enabling a Pin and Key may cause a group policy conflict, but that is why I am doing this from CMD and not Bitlocker. This has works several time in Enterprise PCs. Maybe the system parameters are different with Pro?

FYI I can xcopy files to the USB from C:/.

Annotation 2020-04-25 061759.jpgAnnotation 2020-04-25 062301.jpg
 


Attachments

  • Annotation 2020-04-25 100453.webp
    Annotation 2020-04-25 100453.webp
    245.6 KB · Views: 121
Last edited:
Solution
As a test I ran the following

manage-bde -on C: -RecoveryPassword -recoverykey D:\ on my system and as you can see the key file is indeed on D. It is a system hidden fill so you'd need to enable the option to see system and hidden files in the file explorer.

1587840575339.webp


1587840551190.png
I would just use the GUI it will have you select a location to save the key file.
 


I would just use the GUI it will have you select a location to save the key file.

Thanks Neemobeer for the reply. Bitlocker will not allow both Pin and Key. One or the other. To get both you have to run it through CMD.

Annotation 2020-04-25 094231.jpg
 


Last edited:
I believe you need to specific a path and not drive for the key, so O:\ and not o: I'm not at a computer to confirm
 


As a test I ran the following

manage-bde -on C: -RecoveryPassword -recoverykey D:\ on my system and as you can see the key file is indeed on D. It is a system hidden fill so you'd need to enable the option to see system and hidden files in the file explorer.

1587840575339.webp


1587840551190.png
 


Solution
Back
Top