I need to encrypt my servers. Bitlocker being the main option. While I know I can store Bitlocker keys in AD to automatically unlock domain computers, how does this work with the domain servers? My fear is one day, I’ll end up restarting both of my domain servers in the middle of the night and they will prompt for the unlock key before fully loading. This would mean a very unpleasant 3am trip to the store to enter a code, or 6am phone calls for users saying everything is down. How do you set this up to avoid these two issues?

34 Spice ups

https://old.reddit.com/r/sysadmin/comments/7dw23y/do_any_of_you_bitlocker_your_servers/

1 Spice up

Use the TPM or a dedicated USB key to unlock the machine on login.

Bitlocker basically prevents someone removing the drive and plugging it into another machine and getting the data. That and not being able to access the machine without logging in. … The drive is unlocked on system boot.

Keeping a copy of the recovery key in a secure location i.e. not taped to the device is your last resort option.

2 Spice ups

Microsoft do not recommend you bitlocker your C drive on servers. Only the data partitions.

You never said though, are these physical or virtual and if the latter, virtual how - Hyper-V, VMware or something else?

May I ask what the specific requirement is - it may help.

1 Spice up

If Bitlocker enters Recovery Mode, you don’t.

Entering the 48 bit recovery key is always a manual process. AD can automatically store the recovery keys with the right GPO but even that has limitations. I’ve seen the GPO fail to trigger and leave me with no recorded recovery keys for encrypted WFH machines.

Bitlocker does have an automatic unlock so users don’t need to do anything during boot to unlock the drive but this only protects you if someone removed the hard drive from the machine.

2 Spice ups

Do you? What kind of threat are you trying to protect from, or what kind of problem are you trying to solve? Encrypting servers is not an extremely popular approach, to be honest, foremost due to the significant performance impact and considerable resource waste required to process encryption/decryption algorithms, hence my question. If you need to protect the data from being stolen at rest with disks, self-encrypting drives may be a better option.

Also, if you are confident you need to use Bitlocker on your servers, make sure they are virtualized, and all the other essential security aspects are observed https://www.hyper-v.io/hyper-v-security-mistakes-dont-want-make/ .

3 Spice ups

We use bitlocker on several servers and have for years. Yes the keys are listed in AD for those who have access to read the keys, we also maintain a separate vault that the keys are stored so if AD is gone but the Veeam restore is to an encrypted stated we can pull the key or password with ease.

The servers will reboot normally without issue but as someone mentioned before the data drives will lock, our 2016 servers or higher do not have that traditional blue login screen as long as the server has not move to another network segment, if it is moved to another VCenter or network you will get the traditional blue screen and yes you need to physically enter the password to complete boot unless it is a VM.

Best practice is before you patch or reboot the server, is to suspend bitlocker on all drives, it will re-enable after it reboots.

2 Spice ups

As Supaplex said, Do you really need it?

Last year our cybersecurity insurance underwriter tried to push server encryption on us. I pushed back and after explaining why it doesn’t help in most cases (and can actually make recovery more difficult) they agreed with my logic and gave us a pass.

4 Spice ups

Can I please ask where you saw the recommendation from Microsoft re" Microsoft do not recommend you bitlocker your C drive on servers. Only the data partitions."

I’m trying to do exactly that with command

Enable-BitLocker D: -EncryptionMethod XtsAes256 -UsedSpaceOnly -TpmProtector

but get error

BitLocker cannot use the Trusted Platform Module (TPM) to protect a data drive. TPM
protection can only be used with the operating system drive. (Exception from HRESULT: 0x80310023)