Notice I did not use the -usedspaceonly attribute. And I am hoping this would not have to decrypt and encrypt the whole drive. I would really not to loose my work before I start. Is it really this simple? I mean, when not dealing with AD. Restart-Computer -For Powershell -Delay 15Īdd-BitLockerKeyProtector -MountPoint "C:" -TpmAndPinProtector -PinĬ:\>Get-BitLockerVolume | Add-BitLockerKeyProtector -RecoveryKeyPath "F:\Recovery\" -RecoveryKeyProtector You’ll see the 48-digit password that is the BitLocker recovery key under 'Numerical Password': A 'Recovery Key' or 'Startup Key' has a corresponding 'External Key', which. To see the available types, run: manage-bde -protectors d: -get. C:\> Remove-BitlockerKeyProtector -MountPoint "C:" -PasswordProtector $Password Bitlocker can unlock your drive with various types of Protectors such as TPM, Password, and Recovery Key. I am trying to learn Powershell scripting, but have not worked CLI with BitLocker before. Then create a Recovery Key and store it somewhere (like a USB). Remove-BitLockerKeyProtector, clear keys from TPM, Add-BitLockerKeyProtector. Am I required to suspend and change the key then resume BitLocker for this? Is it even possible to handle this through Powershell or MUST I use manage-bde? I would like to just put the SSD into the new host. I do not want to decrypt and encrypt (I honestly do not want to wait). I have a Password Encrypted SDD I am moving from an old host (No TPM) to a new one with a TPM installed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |