Use Personal Data Encryption in Windows 11 to Protect Files When You Sign Out

  • Thread Author

Use Personal Data Encryption in Windows 11 to Protect Files When You Sign Out​

Difficulty: Intermediate | Time Required: 15 minutes
Personal Data Encryption, or PDE, is one of the newer security features in Windows 11 designed to protect your files at the user level instead of just the drive level. In plain English, it means your protected files can become inaccessible as soon as you sign out, even if someone else signs into the same PC.
That makes PDE especially useful on work laptops, shared devices, and any Windows 11 system that stores sensitive documents, desktop files, or personal pictures. It also works well alongside BitLocker rather than replacing it.
This tutorial walks through what PDE does, what you need before you start, and how it’s typically enabled on supported Windows 11 systems.

What Personal Data Encryption does​

Unlike BitLocker, which protects an entire drive, Personal Data Encryption protects files and folders. Windows ties the decryption keys to your Windows Hello for Business sign-in. When you sign in with Hello, your protected content becomes available. When you sign out, the keys are discarded and your protected content is locked again.
On Windows 11 version 24H2 and later, Microsoft also added PDE for known folders, which can automatically protect:
  • Desktop
  • Documents
  • Pictures

Prerequisites​

Before you begin, make sure your PC meets these requirements:
  • Windows 11 version 22H2 or later
  • Windows 11 Enterprise or Education
    • PDE is not supported on Windows Pro
  • Device must be:
    • Microsoft Entra joined, or
    • Microsoft Entra hybrid joined
  • You must sign in using Windows Hello for Business
  • ARSO must be disabled
    • ARSO = Automatic Restart Sign-On
Important: If you sign in with a regular password instead of Windows Hello, you won’t be able to access PDE-protected content.
Version note: Automatic protection for Desktop, Documents, and Pictures requires Windows 11 24H2 or later.

Step 1: Confirm your Windows edition and version​

First, verify that your system actually supports PDE.
  1. Press Windows + R to open Run.
  2. Type winver and press Enter.
  3. Confirm you are running:
    • Windows 11
    • Version 22H2 or later
  4. Next, go to Settings > System > About.
  5. Under Windows specifications, confirm your edition is:
    • Enterprise, or
    • Education
Warning: If you’re on Windows 11 Pro, PDE isn’t available even if you’re on the right feature update.

Step 2: Make sure Windows Hello is set up​

PDE depends on Windows Hello sign-in.
  1. Open Settings.
  2. Go to Accounts > Sign-in options.
  3. Check that you have at least one Windows Hello method configured, such as:
    • PIN
    • Fingerprint recognition
    • Facial recognition
  4. If Windows Hello isn’t set up yet, follow the prompts to configure it.
Note: PDE is designed around Windows Hello for Business, which is usually configured in managed work or school environments. On a personal, unmanaged PC, you may not have all the required enterprise components.

Step 3: Check whether your device is organization-managed​

PDE is mainly intended for business and education deployments.
  1. Open Settings.
  2. Go to Accounts > Access work or school.
  3. Look for a connected work or school account.
  4. Confirm the device is managed through your organization.
You can also ask your IT admin whether the device is:
  • Microsoft Entra joined
  • Microsoft Entra hybrid joined
  • Managed through Intune or another MDM platform
Helpful tip: Most home users won’t manually turn on PDE from a normal Settings page. In most cases, it is deployed by IT through Microsoft Intune or an MDM policy.

Step 4: Ensure ARSO is disabled​

Microsoft states that PDE requires Automatic Restart Sign-On (ARSO) to be disabled.
On managed devices, IT typically handles this through policy. If you’re checking from the user side:
  1. Open Settings.
  2. Go to Accounts > Sign-in options.
  3. Review sign-in and restart-related options.
  4. If your PC is company-managed, confirm with IT that ARSO has been disabled by policy.
Why this matters: ARSO can automatically sign the last user back in after a restart, and that behavior is not supported with PDE.

Step 5: Have your administrator enable Personal Data Encryption​

This is the key step: PDE is not usually enabled manually by a local home user interface. It’s commonly turned on by an administrator using Intune or CSP policy.
If you’re the device admin or documenting this for a work environment, the usual configuration includes:
  1. Enable Personal Data Encryption
  2. Disable Sign-in and lock last interactive user automatically after a restart
  3. On Windows 11 24H2 or later, optionally enable folder protection for:
    • Desktop
    • Documents
    • Pictures
In Microsoft Intune, admins typically do this through:
  • Endpoint security > Disk encryption > Personal Data Encryption, or
  • Settings catalog using the Personal Data Encryption category
If using CSP/OMA-URI, common entries include:
  • ./User/Vendor/MSFT/PDE/EnablePersonalDataEncryption = 1
  • ./User/Vendor/MSFT/PDE/ProtectFolders/ProtectDesktop = 1
  • ./User/Vendor/MSFT/PDE/ProtectFolders/ProtectDocuments = 1
  • ./User/Vendor/MSFT/PDE/ProtectFolders/ProtectPictures = 1
Intermediate note: Known folder protection for PDE only applies on Windows 11 24H2 and later.

Step 6: Sign out and sign back in with Windows Hello​

After PDE is enabled by policy:
  1. Save your work.
  2. Sign out of Windows.
  3. Sign back in using Windows Hello:
    • PIN
    • Face
    • Fingerprint
When you sign in successfully with Hello, Windows releases the keys needed to open PDE-protected content.
If you try signing in with a password instead, protected files may remain unavailable.

Step 7: Verify that your files are protected​

Once PDE is active, protected files and folders typically show a padlock icon in File Explorer or on the desktop.
To check:
  1. Open File Explorer.
  2. Browse to your Desktop, Documents, or Pictures folder if folder protection has been enabled.
  3. Look for padlock overlays on protected items.
You can also inspect a file more closely:
  1. Right-click a file.
  2. Select Properties.
  3. Under the General tab, click Advanced.
  4. Review the protection details if available.

Tips and troubleshooting​

PDE is not the same as BitLocker​

PDE and BitLocker do different jobs:
  • BitLocker protects the whole drive
  • PDE protects file access based on your sign-in session
For best security, use both when supported.

Remote access limitations​

PDE-protected content is not meant for normal remote access scenarios. Microsoft notes that protected content is not accessible through:
  • UNC paths
  • Remote Desktop sessions
  • Other user accounts on the same PC

Password sign-in can cause confusion​

If your files suddenly seem inaccessible, check how you signed in. If you used a password instead of Windows Hello, PDE-protected content may stay locked.

Backups are essential​

Microsoft recommends backing up your files, ideally with something like OneDrive. In certain cases, such as TPM reset or destructive PIN reset, PDE-related keys can be lost, which can make protected content inaccessible.
Warning: If recovery keys or encryption state are lost, backup copies may be the only way to restore access.

Home users may not see PDE options​

That’s normal. PDE is primarily an enterprise/security-managed feature, not a consumer-facing toggle like Storage Sense or Nearby Sharing.

Conclusion​

Personal Data Encryption adds a strong extra layer of protection in Windows 11 by making sensitive files unavailable when you sign out. On supported Enterprise and Education systems, it can help secure your Desktop, Documents, and Pictures without requiring separate encryption steps for each file.
For organizations already using Windows Hello for Business, Microsoft Entra, and BitLocker, PDE is a smart way to reduce file exposure on shared or managed PCs.
Key Takeaways:
  • Personal Data Encryption protects files when you sign out of Windows
  • It relies on Windows Hello for Business to release encryption keys
  • PDE works alongside BitLocker, not as a replacement
  • Windows 11 24H2 adds easy protection for Desktop, Documents, and Pictures
  • PDE requires Enterprise or Education editions and a managed device setup

This tutorial was generated to help WindowsForum.com users get the most out of their Windows experience.
 

If you’ve already encrypted files manually using EFS, PDE doesn’t replace or merge with that it layers separately, and that can get messy fast. I’ve seen cases where files end up double-protected and access breaks after a PIN reset or profile issue. So if you’re in an environment rolling out PDE, it’s smart to avoid mixing it with legacy EFS on the same folders unless IT has a clear policy. Keeps recovery simple and avoids those “file opens on one login but not another” headaches.
 

Small but important correction: PDE and EFS do not stack on the same file. Microsoft’s current documentation says they are mutually exclusive, so a file cannot be protected by both Personal Data Encryption and EFS at the same time. (learn.microsoft.com)
What is true:
  • PDE and EFS are different systems: PDE uses Windows Hello for Business–protected keys, while EFS uses certificates. (learn.microsoft.com)
  • PDE is designed to work alongside BitLocker, not as a replacement for BitLocker. (learn.microsoft.com)
  • With PDE, destructive PIN resets or TPM resets can make PDE-protected content inaccessible, and Microsoft explicitly recommends backups because recovery may require restoring from backup. (learn.microsoft.com)
So the safer guidance is:

Practical advice​

  1. Do not assume PDE replaces EFS
    • They solve similar problems differently.
    • If your environment already uses EFS, review policy before rolling out PDE broadly. (learn.microsoft.com)
  2. Do not mix protection strategies casually in the same workflow
    • Even though the same file won’t be both PDE and EFS at once, having some folders/workloads on EFS and others on PDE can still complicate support, migration, and recovery.
  3. Back up before rollout
    • Microsoft specifically warns that lost PDE keys after TPM reset or destructive PIN reset can mean the only recovery path is backup. (learn.microsoft.com)
  4. Use Windows Hello for Business properly
    • PDE-protected content requires local sign-in with Windows Hello; password sign-in, RDP access, and network-share access to PDE-protected content are not supported in the normal way. (learn.microsoft.com)
So your overall instinct — keep recovery simple and avoid unmanaged overlap between old and new encryption approaches — is good. The only part I’d change is the “double-protected on the same file” point, because Microsoft says that specific scenario should not occur. (learn.microsoft.com)
 

Back
Top