How to set up BitLocker with TPM, PIN, and Network Unlock in Windows 11

Last update: 30/06/2025
Author Isaac
  • Combining TPM, PIN and Network Unlock allows you to protect and manage your Boot safe in professional and personal environments.
  • Configuring BitLocker requires advanced settings in security policies, the hardware (UEFI/TPM) and network infrastructure (WDS, certificates, DHCP, GPO).
  • Recovery options and encryption policies must be carefully planned to prevent loss of data access and ensure regulatory compliance.

NIS2 European Cybersecurity Directive-9

Data security is a priority for businesses and individual users seeking to protect both the integrity and confidentiality of the information stored on their computers. Windows 11, thanks to its advanced encryption functions such as BitLocker, provides the possibility of protecting access to disks using different authentication methods, combining the robustness of the TPM (Secure Platform Module), PIN verification and the exclusive system Network Unlock for network unlocking.

If you're wondering how to configure BitLocker to take full advantage of these protection options—especially the ability to simultaneously use TPM, a boot PIN, and allow automatic unlocking via the corporate network—here's the most detailed and comprehensive guide currently available, adapted to Spanish and updated with all the technical and functional information available in the industry.

What is BitLocker and what are its advantages?

BitLocker

BitLocker is a comprehensive disk encryption feature included in the Professional and Enterprise editions of Windows. Its main purpose is to protect data in the event of loss, theft, or unauthorized physical access to the computer. The entire contents of the disk can be encrypted, preventing access to the information even if the disk is removed and connected to another computer.

TPM integration provides additional security by securely storing encryption keys and other authentication secrets, preventing brute-force attacks or direct physical access. The ability to add a boot PIN further strengthens protection against internal and external threats. Additionally, Network Unlock mode allows machines to automatically boot when connected to the corporate network and certain servers, simplifying management in enterprise environments with massive computer deployments.

Why use TPM, PIN and Network Unlock together?

The combination of TPM, PIN, and Network Unlock provides defense in depth and the perfect balance between security and manageability. The TPM ensures that keys never leave the hardware; the PIN requires physical interaction to unlock the equipment – ​​ideal for portable and computers in shared offices– and Network Unlock automates the boot process on secure corporate networks, without user intervention, facilitating remote administration, updates and technical support.

This approach is the most secure for companies with fleets of computers and is also highly recommended for advanced users concerned about protecting their personal data or computers containing sensitive information.

Prerequisites: Hardware, software, and infrastructure considerations

network unlock

Before you can enable and take advantage of all the features of BitLocker, you need to meet several requirements for your Windows 11 hardware, firmware, network, and configuration. Here's everything you need:

  • A Windows 11 compatible computer in Pro, Enterprise, or Education edition.
  • TPM 2.0 module activated from BIOS/UEFI. Some devices allow you to work without TPM, but it is less secure and requires more manual steps.
  • Administrator access in the operating system.
  • Corporate network with DHCP enabled on at least one network adapter (preferably the integrated one).
  • Windows Server with Windows Deployment Services (WDS) roles and the Network Unlock feature installed and configured.
  • Public key infrastructure to generate and provision necessary certificates (can be an enterprise CA or self-signed certificates.
  • Permissions to modify group policies (GPOs) in the domain environment.
  • It is recommended, although not strictly necessary, to have Active Directory for the storage recovery key insurance and to simplify management.
  How to connect and set up your Xbox or PlayStation controller on Windows 11

Enabling and Configuring BitLocker: Preliminary Steps and Initial Settings

The BitLocker activation process in Windows 11 can be done from the Control Panel, Settings, or using advanced tools (PowerShell, line of commands with manage-bde.exe, or automated scripts via GPO). Here we break down the most common procedures:

  1. Access from the Start menu and Control Panel: You can search for 'BitLocker' or 'Manage BitLocker' in the Windows search bar, or navigate to 'System and Security' in Control Panel and then 'BitLocker Drive Encryption'.
  2. Access from File Explorer: Right-click on the drive you want to encrypt and select 'Turn on BitLocker'. This launches a guided wizard to choose the unlocking method and recovery options.
  3. Advanced access using PowerShell: If you need to automate the process on multiple computers or prefer the command line, you can use BitLocker-specific cmdlets, such as Enable-BitLocker, Add-BitLockerKeyProtector, and others.

Protection options: TPM only, TPM + PIN, TPM + USB key, and advanced combinations

BitLocker allows several authentication methods to unlock the system drive:

  • TPM only: Transparent start-up, suitable for equipment under strict physical control.
  • TPM + PIN: You must enter a numeric code of between 6 and 20 digits to start Windows.
  • TPM + startup key (USB): Requires a specific USB flash drive to be inserted upon startup.
  • TPM + PIN + USB key (optional): Two factors combined, maximum security.
  • Without TPM ('compatibility'): A password or USB key can be used, but with fewer guarantees of integrity and security.

The PIN option is highly recommended for laptops and computers that may be left unattended, while the USB startup key is practical in restrictive environments or as a network add-on.

Data Recovery Strategies: Keys, Passwords, and Secure Storage

Before turning on BitLocker, you must choose how to save the recovery key. It's crucial to keep this key in a safe place, as losing it can mean permanent loss of access to your data.

  • Save to your Microsoft account: Practical for individual users or small businesses.
  • Save to Active Directory: Ideal for organizations, it allows administrators to easily recover keys for domain-joined computers.
  • Save to a USB, print to paper, or save to an external offline file.

Recovery policies can be enforced via GPO to require backup to Active Directory and block encryption until the key is verified to be stored correctly.

Technical details for advanced settings: Group Policies and Encryption Algorithms

BitLocker security and management relies heavily on group policies (GPOs), which you can edit from 'gpedit.msc' or through the Group Policy Management Console on servers. Among the most relevant options are:

  • Define the encryption method and key length (XTS-AES 128 or 256 bits), recommending 256-bit on modern computers and 128-bit on older devices.
  • Require additional authentication at startup to protect the operating system drive: Here you can force the use of PIN, USB keys, or both along with the TPM.
  • Allow Network Unlock: Only available for domain-joined computers with the necessary infrastructure.
  • Policy on storing recovery keys in Active Directory.
  • Recovery options in case of lost PIN/password.
  • Configure custom warnings and messages for the pre-boot screen.
  "Your PC/Gadget needs to be repaired" error on Windows 10 Home

Configuring these policies is essential for establishing a secure environment and facilitating centralized administration in large organizations.

Network Unlock: Security and Automation at Startup

Network Unlock is a feature designed for scenarios where devices need to boot without user intervention, but within a trusted corporate network. It is especially useful for deploying updates, performing nightly maintenance, or booting servers and desktops without personnel present.

How Does It Work? Upon boot, the client detects the presence of a Network Unlock shield and uses the UEFI DHCP protocol to communicate with the WDS server. Through a secure session, the machine receives the key, which, combined with the key stored in the TPM, allows the drive to be decrypted and boot to continue. If Network Unlock is unavailable, the client will be prompted for a PIN or another configured unlock method will be used.

Requirements to implement Network Unlock:

  • WDS server on the network with the BitLocker Network Unlock role installed and configured correctly.
  • X.509 RSA certificate of at least 2048 bits to encrypt the network key, issued by an internal public key infrastructure (CA) or self-signed.
  • Group Policy (GPO) that distributes the network unlock certificate to clients.
  • Client UEFI firmware must support DHCP and be configured correctly to boot in native mode.

Network Unlock is only supported on domain-joined computers, not available for personal computers or computers outside of an enterprise environment.

Practical Setup: Install, Deploy, and Validate Network Unlock

  1. Installing the Windows Deployment Services (WDS) role: From Server Manager or PowerShell (Install-WindowsFeature WDS-Deployment).
  2. Install the Network Unlock feature on the WDS server: (Install-WindowsFeature BitLocker-NetworkUnlock).
  3. Configure the certificate infrastructure: Create a suitable certificate template for network unlocking at the company's certification authority (CA), following official recommendations (descriptive name, support for private key export, use of the OID 1.3.6.1.4.1.311.67.1.1 extension, etc.).
  4. Issue and export the certificate: Export the .cer (public key) and .pfx (private key) files, and distribute them carefully.
  5. Import the certificate into the WDS server: In the 'BitLocker Drive Encryption Network Unlock' folder in the Local Computer Certificates console.
  6. Distribute the certificate among clients: Via GPO, import the .cer certificate into the corresponding Group Policy settings.
  7. Configure GPOs to 'Allow network unlock at startup' and require a PIN next to the TPM: Also set the 'Require TPM startup PIN' policy, forcing the combined use of PIN and Network Unlock.
  8. Verify that the policy reaches the clients and that they reboot to apply the changes.
  9. Test network boot (using Ethernet cable) and automatic authentication via Network Unlock.

Troubleshooting common issues and security best practices

Setting up BitLocker with Network Unlock isn't without its potential issues. Here are the main recommendations and troubleshooting steps:

  • Make sure your primary network adapter supports and has DHCP enabled.
  • Check UEFI firmware compatibility (version, native mode, no CSM).
  • Check that the WDS service is started and running correctly.
  • Confirms the publication and validity of certificates on the server and clients. Examines both the certificate console and the Registry (FVE_NKP key).
  • Make sure that group policies are applied correctly to the desired organizational units.
  • Examines BitLocker and WDS event logs for error messages or warnings.
  Copying Files Between Disks with XCOPY or Robocopy: A Complete Guide

Be sure to regularly back up your recovery keys and monitor changes to your computer's hardware or firmware, as these may trigger the need to enter your recovery key even if you have configured network boot.

Encryption options for fixed and removable data drives

BitLocker not only protects the system drive but also provides full protection for fixed data drives and removable drives (BitLocker To Go). From group policies you can define specific policies for each volume type:

  • Force encryption before allowing write access.
  • Define the encryption algorithm for each drive type.
  • Control the use of passwords or smart cards to unlock data.
  • Hide or show recovery options in the setup wizard.

For removable drives, you can deny write access to devices configured in another organization using unique identifiers set in your domain policies.

Common management and operations: suspend, resume, reset, and disable BitLocker

Daily BitLocker management includes features to temporarily suspend protection, resume protection, modify protections (PIN, password, recovery key), reset keys, and disable encryption if necessary.

  • Suspend BitLocker: Useful before hardware changes, BIOS/firmware updates, or maintenance. From the Control Panel or command line (PowerShell or manage-bde.exe).
  • Restart BitLocker: Once maintenance is complete, it is essential to reactivate protection from the same menu or command.
  • Reset PIN or Password: If you forget your PIN, you can reset it using your recovery key. The manage-bde -changepin X command allows you to change your PIN directly from the command line.
  • Disable BitLocker: This option initiates the data decryption process. It should only be used if protection is no longer needed or for organizational requirements.
  • Recovery from lost credentials: If you lose your PIN or password, recovery depends on having the 48-digit recovery key on hand, stored online or on paper.

Automation and scripting: PowerShell and manage-bde.exe

Mass deployment and advanced management tasks can be streamlined through PowerShell scripts or the manage-bde.exe command.

For example:

  • Enable BitLocker with TPM and PIN protector:
  • $SecureString = ConvertTo-SecureString "123456" -AsPlainText -Force; Enable-BitLocker C: -EncryptionMethod XtsAes256 -UsedSpaceOnly -Pin $SecureString -TPMandPinProtector
  • Check BitLocker status:
  • manage-bde.exe -status C:
  • Manage key protectors:
  • manage-bde.exe -protectors -add -sid <usuario o grupo>
  • Remove protectors:
  • manage-bde.exe -protectors -delete C: -type TPMandPIN

Considerations for performance, compatibility, and best practices

BitLocker is optimized to minimize performance impact on modern computers, especially using XTS-AES 256-bit and hardware-accelerated encryption.

  • Full disk encryption consumes more time and resources on older computers; Encrypting only used space is faster and appropriate for new installations.
  • Compatibility mode allows you to encrypt drives and use them on older systems, but with a lower level of security.
  • The combination of TPM, PIN, and Network Unlock not only maximizes protection, but also facilitates centralized management in large organizations.
  • Always store recovery keys on a secure system and test recovery keys before deploying BitLocker on a large scale.