manage-bde.exe BitLocker Drive Encryption: Configuration Tool 3efb4b65b23a5fb20250318015de127e

File info

File name: manage-bde.exe.mui
Size: 150528 byte
MD5: 3efb4b65b23a5fb20250318015de127e
SHA1: 846e3b42ca794020389944012ef9a0a7bcd5dd56
SHA256: 23dfd0ea396c42f77afa38b3ab7dd20e5543c12acb023a3a8606de1bd2250312
Operating systems: Windows 10
Extension: MUI
In x64: manage-bde.exe BitLocker Drive Encryption: Configuration Tool (32-bit)

Translations messages and strings

If an error occurred or the following message in English (U.S.) language and you cannot find a solution, than check answer in English. Table below helps to know how correctly this phrase sounds in English.

id English (U.S.) English
0x406Encryption is now in progress. Encryption is now in progress.
0x414Used Space Only encryption is now in progress. Used Space Only encryption is now in progress.
0x418Full Encryption is now complete. Full Encryption is now complete.
0x419Used Space Only encryption is now complete. Used Space Only encryption is now complete.
0x41BBitLocker protection is now on. BitLocker protection is now on.
0x500Decryption is now in progress. Decryption is now in progress.
0x502BitLocker protection is now off. BitLocker protection is now off.
0x603Encryption of the volume has been paused. Encryption of the volume has been paused.
0x604Decryption of the volume has been paused. Decryption of the volume has been paused.
0x609Free space wiping of the volume has been paused. Free space wiping of the volume has been paused.
0x703Encryption of the volume is now in progress. Encryption of the volume is now in progress.
0x704Decryption of the volume is now in progress. Decryption of the volume is now in progress.
0x706Free space wiping of the volume is now in progress. Free space wiping of the volume is now in progress.
0x800Volume %1!s! is now locked Volume %1!s! is now locked
0x903The file \"%1!s!\" successfully unlocked volume %2!s!. The file \"%1!s!\" successfully unlocked volume %2!s!.
0x905The password successfully unlocked volume %1!s!. The password successfully unlocked volume %1!s!.
0x907The certificate successfully unlocked volume %1!s!. The certificate successfully unlocked volume %1!s!.
0x910A SID-based Identity protector successfully unlocked the volume %1!s!. A SID-based Identity protector successfully unlocked the volume %1!s!.
0xA03Automatic unlock is disabled on volume %1!s!.NOTE: An associated External Key protector was created on this data volumewhen automatic unlock was enabled. To also delete this protector, type\"manage-bde -protectors %1!s! -delete -id %2!s!\". Automatic unlock is disabled on volume %1!s!.NOTE: An associated External Key protector was created on this data volumewhen automatic unlock was enabled. To also delete this protector, type\"manage-bde -protectors %1!s! -delete -id %2!s!\".
0xA05All automatic unlock keys are removed from volume %1!s!. All automatic unlock keys are removed from volume %1!s!.
0xB10Saved to directory %1!s! Saved to directory %1!s!
0xC00Key protector with ID \"%1\" deleted. Key protector with ID \"%1\" deleted.
0xE00Key protectors are enabled for volume %1!s!. Key protectors are enabled for volume %1!s!.
0xE01Key protectors are disabled for volume %1!s!. Key protectors are disabled for volume %1!s!.
0x1200The volume has been upgraded. The volume has been upgraded.
0x1800Free space wiping is now in progress. Free space wiping is now in progress.
0x1803Wipe of free space has now been canceled. Wipe of free space has now been canceled.
0x40000001BitLocker Drive Encryption: Configuration Tool version %1!s!Copyright (C) 2013 Microsoft Corporation. All rights reserved. BitLocker Drive Encryption: Configuration Tool version %1!s!Copyright (C) 2013 Microsoft Corporation. All rights reserved.
0x40000100manage-bde[.exe] -parameter [arguments]Description: Configures BitLocker Drive Encryption on disk volumes.Parameter List: -status Provides information about BitLocker-capable volumes. -on Encrypts the volume and turns BitLocker protection on. -off Decrypts the volume and turns BitLocker protection off. -pause Pauses encryption, decryption, or free space wipe. -resume Resumes encryption, decryption, or free space wipe. -lock Prevents access to BitLocker-encrypted data. -unlock Allows access to BitLocker-encrypted data. -autounlock Manages automatic unlocking of data volumes. -protectors Manages protection methods for the encryption key. -SetIdentifier or -si Configures the identification field for a volume. -ForceRecovery or -fr Forces a BitLocker-protected OS to recover on restarts. -changepassword Modifies password for a data volume. -changepin Modifies PIN for a volume. -changekey Modifies startup key for a volume. -KeyPackage or -kp Generates a key package for a volume. -upgrade Upgrades the BitLocker version. -WipeFreeSpace or -w Wipes the free space on the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -on C: -RecoveryPassword -RecoveryKey F:\\ manage-bde -unlock E: -RecoveryKey F:\\84E151C1...7A62067A512.bek manage-bde[.exe] -parameter [arguments]Description: Configures BitLocker Drive Encryption on disk volumes.Parameter List: -status Provides information about BitLocker-capable volumes. -on Encrypts the volume and turns BitLocker protection on. -off Decrypts the volume and turns BitLocker protection off. -pause Pauses encryption, decryption, or free space wipe. -resume Resumes encryption, decryption, or free space wipe. -lock Prevents access to BitLocker-encrypted data. -unlock Allows access to BitLocker-encrypted data. -autounlock Manages automatic unlocking of data volumes. -protectors Manages protection methods for the encryption key. -SetIdentifier or -si Configures the identification field for a volume. -ForceRecovery or -fr Forces a BitLocker-protected OS to recover on restarts. -changepassword Modifies password for a data volume. -changepin Modifies PIN for a volume. -changekey Modifies startup key for a volume. -KeyPackage or -kp Generates a key package for a volume. -upgrade Upgrades the BitLocker version. -WipeFreeSpace or -w Wipes the free space on the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -on C: -RecoveryPassword -RecoveryKey F:\\ manage-bde -unlock E: -RecoveryKey F:\\84E151C1...7A62067A512.bek
0x40000101manage-bde -status [Volume] [{-ProtectionAsErrorLevel|-p}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Provides information about BitLocker-capable volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\". -ProtectionAsErrorLevel or -p Used in developing batch files. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -status e: manage-bde -status e: -ProtectionAsErrorLevel manage-bde -status [Volume] [{-ProtectionAsErrorLevel|-p}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Provides information about BitLocker-capable volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\". -ProtectionAsErrorLevel or -p Used in developing batch files. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -status e: manage-bde -status e: -ProtectionAsErrorLevel
0x40000102manage-bde -status [Volume] [{-ProtectionAsErrorLevel|-p}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Provides information about BitLocker-capable volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\". If not provided, displays all BitLocker-capable volumes. -ProtectionAsErrorLevel or -p Used in developing batch files. Returns an error level that identifies whether the volume is BitLocker-protected. Returns 0 if no volume is specified or if the specified volume is BitLocker-protected. Returns 1 otherwise. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -status e: manage-bde -status e: -ProtectionAsErrorLevel manage-bde -status [Volume] [{-ProtectionAsErrorLevel|-p}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Provides information about BitLocker-capable volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\". If not provided, displays all BitLocker-capable volumes. -ProtectionAsErrorLevel or -p Used in developing batch files. Returns an error level that identifies whether the volume is BitLocker-protected. Returns 0 if no volume is specified or if the specified volume is BitLocker-protected. Returns 1 otherwise. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -status manage-bde -status e: manage-bde -status e: -ProtectionAsErrorLevel
0x40000103manage-bde -on Volume [{-RecoveryPassword|-rp} [NumericalPassword] ] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-UsedSpaceOnly|-used}] [{-EncryptionMethod|-em} {aes128|aes256|xts_aes128|xts_aes256}] [{-SkipHardwareTest|-s}] [{-Synchronous|-sync}] [{-DiscoveryVolumeType|-dv} {FAT32|[none]|[default]}] [{-ForceEncryptionType|-fet} {Hardware|Software}] [{-RemoveVolumeShadowCopies|-rvsc}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Encrypts the volume and turns BitLocker protection on.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. -RecoveryKey or -rk Adds an External Key protector for recovery. -StartupKey or -sk Adds an External Key protector for startup. -Certificate or -cert Adds a public key protector for the data volume. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. -Password or -pw Adds a password key protector for the volume. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. -UsedSpaceOnly or -used Performs encryption of the existing used space on the volume. -EncryptionMethod or -em Configures the encryption algorithm and key size. -SkipHardwareTest or -s Begins encryption without a hardware test. -Synchronous or -sync Forces manage-bde to wait until the -on command has finished before displaying the command prompt. -DiscoveryVolumeType or -dv Specify file system to use for the discovery volume. -ForceEncryptionType or -fet Forces BitLocker to use either software or hardware encryption. -RemoveVolumeShadowCopies or -rvsc Forces deletion of Volume Shadow Copies for the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -on C: -RecoveryPassword manage-bde -on C: -RecoveryKey e:\\ -RecoveryPassword manage-bde -on C: -rp -rk \"f:\\Folder\" -SkipHardwareTest manage-bde -on E: -pw manage-bde -on E: -UsedSpaceOnly manage-bde -on E: -sid Domain\\User manage-bde -on E: -sid Domain\\Machine$ -service manage-bde -on Volume [{-RecoveryPassword|-rp} [NumericalPassword] ] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-UsedSpaceOnly|-used}] [{-EncryptionMethod|-em} {aes128|aes256|xts_aes128|xts_aes256}] [{-SkipHardwareTest|-s}] [{-Synchronous|-sync}] [{-DiscoveryVolumeType|-dv} {FAT32|[none]|[default]}] [{-ForceEncryptionType|-fet} {Hardware|Software}] [{-RemoveVolumeShadowCopies|-rvsc}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Encrypts the volume and turns BitLocker protection on.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. -RecoveryKey or -rk Adds an External Key protector for recovery. -StartupKey or -sk Adds an External Key protector for startup. -Certificate or -cert Adds a public key protector for the data volume. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. -Password or -pw Adds a password key protector for the volume. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. -UsedSpaceOnly or -used Performs encryption of the existing used space on the volume. -EncryptionMethod or -em Configures the encryption algorithm and key size. -SkipHardwareTest or -s Begins encryption without a hardware test. -Synchronous or -sync Forces manage-bde to wait until the -on command has finished before displaying the command prompt. -DiscoveryVolumeType or -dv Specify file system to use for the discovery volume. -ForceEncryptionType or -fet Forces BitLocker to use either software or hardware encryption. -RemoveVolumeShadowCopies or -rvsc Forces deletion of Volume Shadow Copies for the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -on C: -RecoveryPassword manage-bde -on C: -RecoveryKey e:\\ -RecoveryPassword manage-bde -on C: -rp -rk \"f:\\Folder\" -SkipHardwareTest manage-bde -on E: -pw manage-bde -on E: -UsedSpaceOnly manage-bde -on E: -sid Domain\\User manage-bde -on E: -sid Domain\\Machine$ -service
0x40000104manage-bde -on Volume [{-RecoveryPassword|-rp} [NumericalPassword] ] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-UsedSpaceOnly|-used}] [{-EncryptionMethod|-em} {aes128|aes256|xts_aes128|xts_aes256}] [{-SkipHardwareTest|-s}] [{-Synchronous|-sync}] [{-DiscoveryVolumeType|-dv} {FAT32|[none]|[default]}] [{-ForceEncryptionType|-fet} {Hardware|Software}] [{-RemoveVolumeShadowCopies|-rvsc}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Encrypts the volume and turns BitLocker protection on. Use parameters to add key protectors for the encryption key. These protectors unlock access to BitLocker-encrypted data. Automatically adds a TPM protector to the OS volume if your computer has a supported TPM. For the OS volume, encryption begins on the next restart, after a hardware test.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. Required to begin encryption if one has not already been added. Leave the argument blank to generate a random numerical password (recommended). These passwords have special format requirements. Provide any argument such as \"?\" to read the requirements. -RecoveryKey or -rk Adds an External Key protector for recovery. Optional. Provide the absolute directory path where the file containing the randomly-generated external key will be saved. Example: \"E:\" -StartupKey or -sk Adds an External Key protector for startup. Required if the computer does not have a supported TPM and one has not already been added. To use a startup key, the saved external key file must be located on the root directory of a USB flash drive. Since both the -RecoveryKey and -StartupKey parameters produce External Key protectors, the saved files can be used interchangeably. -Certificate or -cert Adds a public key protector for the data volume. The user's certificate store is queried for a valid BitLocker certificate. If exactly one certificate is found, the certificate is used as the BitLocker encryption certificate. If two or more certificates are found the operation will fail and the thumbprint of a valid BitLocker certificate should be specified. Optional. Provide the location of a valid certificate file or provide the certificate thumbprint of a valid BitLocker certificate that will be present locally in the certificate store. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. Optional. You will be prompted for a 4-20 digit numeric PIN that must be typed each time the computer starts. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. Optional. To use a startup key, the saved file must be located on the root directory of a USB flash drive. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. TPM-only, TPM And PIN, and TPM And Startup Key protectors on the volume are removed. manage-bde -on Volume [{-RecoveryPassword|-rp} [NumericalPassword] ] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-UsedSpaceOnly|-used}] [{-EncryptionMethod|-em} {aes128|aes256|xts_aes128|xts_aes256}] [{-SkipHardwareTest|-s}] [{-Synchronous|-sync}] [{-DiscoveryVolumeType|-dv} {FAT32|[none]|[default]}] [{-ForceEncryptionType|-fet} {Hardware|Software}] [{-RemoveVolumeShadowCopies|-rvsc}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Encrypts the volume and turns BitLocker protection on. Use parameters to add key protectors for the encryption key. These protectors unlock access to BitLocker-encrypted data. Automatically adds a TPM protector to the OS volume if your computer has a supported TPM. For the OS volume, encryption begins on the next restart, after a hardware test.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. Required to begin encryption if one has not already been added. Leave the argument blank to generate a random numerical password (recommended). These passwords have special format requirements. Provide any argument such as \"?\" to read the requirements. -RecoveryKey or -rk Adds an External Key protector for recovery. Optional. Provide the absolute directory path where the file containing the randomly-generated external key will be saved. Example: \"E:\" -StartupKey or -sk Adds an External Key protector for startup. Required if the computer does not have a supported TPM and one has not already been added. To use a startup key, the saved external key file must be located on the root directory of a USB flash drive. Since both the -RecoveryKey and -StartupKey parameters produce External Key protectors, the saved files can be used interchangeably. -Certificate or -cert Adds a public key protector for the data volume. The user's certificate store is queried for a valid BitLocker certificate. If exactly one certificate is found, the certificate is used as the BitLocker encryption certificate. If two or more certificates are found the operation will fail and the thumbprint of a valid BitLocker certificate should be specified. Optional. Provide the location of a valid certificate file or provide the certificate thumbprint of a valid BitLocker certificate that will be present locally in the certificate store. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. Optional. You will be prompted for a 4-20 digit numeric PIN that must be typed each time the computer starts. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. Optional. To use a startup key, the saved file must be located on the root directory of a USB flash drive. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. TPM-only, TPM And PIN, and TPM And Startup Key protectors on the volume are removed.
0x40000105manage-bde -off Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Decrypts the volume and turns BitLocker protection off. Removes all key protectors when decryption completes.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -off C: manage-bde -off Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Decrypts the volume and turns BitLocker protection off. Removes all key protectors when decryption completes.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -off C:
0x40000106manage-bde -pause Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Pauses encryption, decryption, or free space wipe.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -pause C: manage-bde -pause Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Pauses encryption, decryption, or free space wipe.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -pause C:
0x40000107manage-bde -resume Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Resumes encryption, decryption, or free space wipe.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -resume C: manage-bde -resume Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Resumes encryption, decryption, or free space wipe.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -resume C:
0x40000108manage-bde -lock Volume {-ForceDismount|-fd} [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Prevents access to BitLocker-encrypted data. Once a data volume is locked, it can only be unlocked using one of the key protectors on the volume. No key protectors are deleted.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ForceDismount or -fd Attempts to lock the volume even if it is in use. This allows the volume to be locked when applications have non-exclusive access to the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -lock e: manage-bde -lock e: -ForceDismount manage-bde -lock Volume {-ForceDismount|-fd} [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Prevents access to BitLocker-encrypted data. Once a data volume is locked, it can only be unlocked using one of the key protectors on the volume. No key protectors are deleted.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ForceDismount or -fd Attempts to lock the volume even if it is in use. This allows the volume to be locked when applications have non-exclusive access to the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -lock e: manage-bde -lock e: -ForceDismount
0x40000109manage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword] | [{-RecoveryKey|-rk} PathToExternalKeyFile]} [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint} {-pin}] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} [{SID|domain\\user|domain\\group}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Allows access to BitLocker-encrypted data with a recovery password, recovery key, certificate, or password.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Provide a recovery password to unlock the volume. -RecoveryKey or -rk Provide an external key file to unlock the volume. -Certificate or -cert Query the local user certificate store for a BitLocker certificate to unlock the volume. -Password or -pw Prompt for a password to unlock the volume. -ADAccountOrGroup or -sid Attempt to unlock the volume using a SID-based Identity protector. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -unlock -? manage-bde -unlock e: -RecoveryPassword ... manage-bde -unlock e: -RecoveryKey \"f:\\File Folder\\Filename\" manage-bde -unlock e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -unlock e: -pw manage-bde -unlock e: -sid manage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword] | [{-RecoveryKey|-rk} PathToExternalKeyFile]} [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint} {-pin}] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} [{SID|domain\\user|domain\\group}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Allows access to BitLocker-encrypted data with a recovery password, recovery key, certificate, or password.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Provide a recovery password to unlock the volume. -RecoveryKey or -rk Provide an external key file to unlock the volume. -Certificate or -cert Query the local user certificate store for a BitLocker certificate to unlock the volume. -Password or -pw Prompt for a password to unlock the volume. -ADAccountOrGroup or -sid Attempt to unlock the volume using a SID-based Identity protector. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -unlock -? manage-bde -unlock e: -RecoveryPassword ... manage-bde -unlock e: -RecoveryKey \"f:\\File Folder\\Filename\" manage-bde -unlock e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -unlock e: -pw manage-bde -unlock e: -sid
0x4000010Amanage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword] | [{-RecoveryKey|-rk} PathToExternalKeyFile]} [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint} {-pin}] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} [{SID|domain\\user|domain\\group}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Allows access to BitLocker-encrypted data with a recovery password, recovery key, certificate, or password.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Provide a recovery password to unlock the volume. You must have previously created a Numerical Password protector for the encrypted volume. -RecoveryKey or -rk Provide an external key file to unlock the volume. Required if -RecoveryPassword is not provided. You must have previously created an External Key protector for the encrypted volume. -Certificate or -cert The user's certificate store is queried for a certificate with an identical thumbprint as the one used to encrypt the volume. If a certificate is found, the private key is retrieved and used to unlock the volume. Specify either the certificate file or the certificate thumbprint of the certificate. If a PIN is required to access the certificate (such as for a smart card), specify the \"-pin\" parameter and you will be prompted to enter the PIN. -Password or -pw Prompts for a password to unlock the volume. -ADAccountOrGroup or -sid Attempt to unlock the volume using a SID-based Identity protector. If an account name or a SID is provided, attempt to unlock using a protector with a matching SID. Otherwise, try all SID-based Identity protectors to unlock. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\". Cannot be used in conjunction with -Certificate. -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -unlock -? manage-bde -unlock e: -RecoveryPassword ... manage-bde -unlock e: -RecoveryKey \"f:\\File Folder\\Filename\" manage-bde -unlock e: -Certificate -cf \"C:\\File Folder\\Filename.cer\" manage-bde -unlock e: -pw manage-bde -unlock e: -sid S-1-5-21-...-513 manage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword] | [{-RecoveryKey|-rk} PathToExternalKeyFile]} [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint} {-pin}] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} [{SID|domain\\user|domain\\group}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Allows access to BitLocker-encrypted data with a recovery password, recovery key, certificate, or password.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Provide a recovery password to unlock the volume. You must have previously created a Numerical Password protector for the encrypted volume. -RecoveryKey or -rk Provide an external key file to unlock the volume. Required if -RecoveryPassword is not provided. You must have previously created an External Key protector for the encrypted volume. -Certificate or -cert The user's certificate store is queried for a certificate with an identical thumbprint as the one used to encrypt the volume. If a certificate is found, the private key is retrieved and used to unlock the volume. Specify either the certificate file or the certificate thumbprint of the certificate. If a PIN is required to access the certificate (such as for a smart card), specify the \"-pin\" parameter and you will be prompted to enter the PIN. -Password or -pw Prompts for a password to unlock the volume. -ADAccountOrGroup or -sid Attempt to unlock the volume using a SID-based Identity protector. If an account name or a SID is provided, attempt to unlock using a protector with a matching SID. Otherwise, try all SID-based Identity protectors to unlock. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\". Cannot be used in conjunction with -Certificate. -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -unlock -? manage-bde -unlock e: -RecoveryPassword ... manage-bde -unlock e: -RecoveryKey \"f:\\File Folder\\Filename\" manage-bde -unlock e: -Certificate -cf \"C:\\File Folder\\Filename.cer\" manage-bde -unlock e: -pw manage-bde -unlock e: -sid S-1-5-21-...-513
0x4000010Bmanage-bde -autounlock -enable Volumemanage-bde -autounlock -disable Volumemanage-bde -autounlock -clearallkeys OSVolumeDescription: Manages automatic unlocking of data volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -enable Enables automatic unlocking for a data volume. -disable Disables automatic unlocking for a data volume. -ClearAllKeys Removes all stored external keys on the OS volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -autounlock -enable E: manage-bde -autounlock -disable E: manage-bde -autounlock -ClearAllKeys C: manage-bde -autounlock -enable Volumemanage-bde -autounlock -disable Volumemanage-bde -autounlock -clearallkeys OSVolumeDescription: Manages automatic unlocking of data volumes.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -enable Enables automatic unlocking for a data volume. -disable Disables automatic unlocking for a data volume. -ClearAllKeys Removes all stored external keys on the OS volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -autounlock -enable E: manage-bde -autounlock -disable E: manage-bde -autounlock -ClearAllKeys C:
0x4000010Cmanage-bde -autounlock -enable Volumemanage-bde -autounlock -disable Volumemanage-bde -autounlock -clearallkeys OSVolumeDescription: Manages automatic unlocking of data volumes.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -enable Enables automatic unlocking for a data volume. This action creates an External Key protector on the data volume and stores the associated external key onto the BitLocker-protected OS volume. -disable Disables automatic unlocking for a data volume. This action removes the stored external key from the OS volume. An additional step is necessary to delete the External Key protector from the data volume. -ClearAllKeys Removes all stored external keys on the OS volume. This action disables automatic unlocking of all associated data volumes. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -autounlock -enable E: manage-bde -autounlock -disable E: manage-bde -autounlock -ClearAllKeys C: manage-bde -autounlock -enable Volumemanage-bde -autounlock -disable Volumemanage-bde -autounlock -clearallkeys OSVolumeDescription: Manages automatic unlocking of data volumes.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -enable Enables automatic unlocking for a data volume. This action creates an External Key protector on the data volume and stores the associated external key onto the BitLocker-protected OS volume. -disable Disables automatic unlocking for a data volume. This action removes the stored external key from the OS volume. An additional step is necessary to delete the External Key protector from the data volume. -ClearAllKeys Removes all stored external keys on the OS volume. This action disables automatic unlocking of all associated data volumes. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -autounlock -enable E: manage-bde -autounlock -disable E: manage-bde -autounlock -ClearAllKeys C:
0x4000010Dmanage-bde -protectors -get Volume -parameter [arguments]manage-bde -protectors -add Volume -parameter [arguments]manage-bde -protectors -delete Volume -parameter [arguments]manage-bde -protectors -disable Volume -parameter [arguments]manage-bde -protectors -enable Volumemanage-bde -protectors -adbackup Volume -parameter [arguments]manage-bde -protectors -aadbackup Volume -parameter [arguments]Description: Manages protection methods for the encryption key.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -get Displays key protection methods. Include '-?' for parameters. -add Adds key protection methods. Include '-?' for parameters. -delete Deletes key protection methods. Include '-?' for parameters. -disable Suspends protection. Allows anyone to access encrypted data by making the encryption key available unsecured on disk. No key protectors are removed. If the optional RebootCount parameter is not specified, BitLocker protection of the OS volume automatically resumes after Windows is restarted. If a RebootCount parameter is specified, BitLocker protection of the OS volume will resume after Windows has been restarted the number of times specified in the RebootCount parameter. -enable Enables protection by removing the unsecured encryption key from disk. All key protectors take into effect. -adbackup Backs up recovery information for the drive. -aadbackup Backs up recovery information for the drive to Azure Active Directory. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add -? manage-bde -protectors -get -? manage-bde -protectors -disable C: manage-bde -protectors -get Volume -parameter [arguments]manage-bde -protectors -add Volume -parameter [arguments]manage-bde -protectors -delete Volume -parameter [arguments]manage-bde -protectors -disable Volume -parameter [arguments]manage-bde -protectors -enable Volumemanage-bde -protectors -adbackup Volume -parameter [arguments]manage-bde -protectors -aadbackup Volume -parameter [arguments]Description: Manages protection methods for the encryption key.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -get Displays key protection methods. Include '-?' for parameters. -add Adds key protection methods. Include '-?' for parameters. -delete Deletes key protection methods. Include '-?' for parameters. -disable Suspends protection. Allows anyone to access encrypted data by making the encryption key available unsecured on disk. No key protectors are removed. If the optional RebootCount parameter is not specified, BitLocker protection of the OS volume automatically resumes after Windows is restarted. If a RebootCount parameter is specified, BitLocker protection of the OS volume will resume after Windows has been restarted the number of times specified in the RebootCount parameter. -enable Enables protection by removing the unsecured encryption key from disk. All key protectors take into effect. -adbackup Backs up recovery information for the drive. -aadbackup Backs up recovery information for the drive to Azure Active Directory. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add -? manage-bde -protectors -get -? manage-bde -protectors -disable C:
0x4000010Emanage-bde -protectors -add Volume [{-ForceUpgrade}] [{-RecoveryPassword|-rp} [NumericalPassword]] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [-TPM] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Adds key protection methods.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ForceUpgrade Forces the BitLocker version to be upgraded. -RecoveryPassword or -rp Adds a Numerical Password protector. -RecoveryKey or -rk Adds an External Key protector for recovery. -StartupKey or -sk Adds an External Key protector for startup. -Certificate or -cert Adds a public key protector for the data volume. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. -tpm Adds a TPM protector for the OS volume. -Password or -pw Adds a password key protector for the volume. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add e: -RecoveryPassword manage-bde -protectors -add e: -rp -rk h:\\ manage-bde -protectors -add e: -TPMAndPIN manage-bde -protectors -add e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -protectors -add e: -pw manage-bde -protectors -add e: -sid Domain\\User manage-bde -protectors -add e: -sid Domain\\Machine$ -service manage-bde -protectors -add Volume [{-ForceUpgrade}] [{-RecoveryPassword|-rp} [NumericalPassword]] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [-TPM] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Adds key protection methods.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ForceUpgrade Forces the BitLocker version to be upgraded. -RecoveryPassword or -rp Adds a Numerical Password protector. -RecoveryKey or -rk Adds an External Key protector for recovery. -StartupKey or -sk Adds an External Key protector for startup. -Certificate or -cert Adds a public key protector for the data volume. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. -tpm Adds a TPM protector for the OS volume. -Password or -pw Adds a password key protector for the volume. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add e: -RecoveryPassword manage-bde -protectors -add e: -rp -rk h:\\ manage-bde -protectors -add e: -TPMAndPIN manage-bde -protectors -add e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -protectors -add e: -pw manage-bde -protectors -add e: -sid Domain\\User manage-bde -protectors -add e: -sid Domain\\Machine$ -service
0x4000010Fmanage-bde -protectors -add Volume [{-RecoveryPassword|-rp} [NumericalPassword]] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [-TPM] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Adds key protection methods. Use 'manage-bde -on' to encrypt once key protectors have been added.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. Required to begin encryption if one has not already been added. Leave the argument blank to generate a random numerical password (recommended). These passwords have special format requirements. Provide any argument such as \"?\" to read the requirements. -RecoveryKey or -rk Adds an External Key protector for recovery. Optional. Provide the absolute directory path where the file containing the randomly-generated external key will be saved. Example: \"E:\" -StartupKey or -sk Adds an External Key protector for startup. Required if the computer does not have a supported TPM and one has not already been added. To use a startup key, the saved external key file must be located on the root directory of a USB flash drive. Since both the -RecoveryKey and -StartupKey parameters produce External Key protectors, the saved files can be used interchangeably. -Certificate or -cert Adds a public key protector for the data volume. The user's certificate store is queried for a valid BitLocker certificate. If exactly one certificate is found, the certificate is used as the BitLocker encryption certificate. If two or more certificates are found the operation will fail and the thumbprint of a valid BitLocker certificate should be specified. Optional. Provide the location of a valid certificate file or provide the certificate thumbprint of a valid BitLocker certificate that will be present locally in the certificate store. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. Optional. You will be prompted for a 4-20 digit numeric PIN that must be typed each time the computer starts. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. Optional. To use a startup key, the saved file must be located on the root directory of a USB flash drive. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. TPM-only, TPM And PIN, and TPM And Startup Key protectors on the volume are removed. -tpm Adds a TPM protector for the OS volume. This protector specifies TPM-only protection and overrides any other TPM-related protectors. TPM And PIN or TPM And StartupKey protectors are removed and replaced. -Password or -pw Adds a password key protector for the volume. Optional. You will be prompted for a password that will be used to unlock the device. -ADAccountOrGroup or -sid Adds an SID-based Identity protector for the volume. The volume will automatically unlock if the user or computer has the proper credentials. When specifying a computer account, append a '$' to the computer name and specify -service to indicate that the unlock should happen in the context of the BitLocker service (instead of the user). -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add e: -RecoveryPassword manage-bde -protectors -add e: -rp -rk h:\\ manage-bde -protectors -add e: -TPMAndPIN manage-bde -protectors -add e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -protectors -add e: -pw manage-bde -protectors -add e: -sid Domain\\User manage-bde -protectors -add e: -sid Domain\\Machine$ -service manage-bde -protectors -add Volume [{-RecoveryPassword|-rp} [NumericalPassword]] [{-RecoveryKey|-rk} PathToExternalKeyDirectory] [{-StartupKey|-sk} PathToExternalKeyDirectory] [{-Certificate|-cert} {-cf PathToCertificateFile| -ct CertificateThumbprint}] [-TPM] [{-TPMAndPIN|-tp}] [{-TPMAndStartupKey|-tsk} PathToExternalKeyDirectory] [{-TPMAndPINAndStartupKey|-tpsk} -tsk PathToExternalKeyDirectory] [{-Password|-pw}] [{-ADAccountOrGroup|-sid} {SID|domain\\user|domain\\group} [-service]}] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Adds key protection methods. Use 'manage-bde -on' to encrypt once key protectors have been added.Parameter List: Volume Required. A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RecoveryPassword or -rp Adds a Numerical Password protector. Required to begin encryption if one has not already been added. Leave the argument blank to generate a random numerical password (recommended). These passwords have special format requirements. Provide any argument such as \"?\" to read the requirements. -RecoveryKey or -rk Adds an External Key protector for recovery. Optional. Provide the absolute directory path where the file containing the randomly-generated external key will be saved. Example: \"E:\" -StartupKey or -sk Adds an External Key protector for startup. Required if the computer does not have a supported TPM and one has not already been added. To use a startup key, the saved external key file must be located on the root directory of a USB flash drive. Since both the -RecoveryKey and -StartupKey parameters produce External Key protectors, the saved files can be used interchangeably. -Certificate or -cert Adds a public key protector for the data volume. The user's certificate store is queried for a valid BitLocker certificate. If exactly one certificate is found, the certificate is used as the BitLocker encryption certificate. If two or more certificates are found the operation will fail and the thumbprint of a valid BitLocker certificate should be specified. Optional. Provide the location of a valid certificate file or provide the certificate thumbprint of a valid BitLocker certificate that will be present locally in the certificate store. -TPMAndPIN or -tp Adds a TPM And PIN protector for the OS volume. Optional. You will be prompted for a 4-20 digit numeric PIN that must be typed each time the computer starts. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndStartupKey or -tsk Adds a TPM And Startup Key protector for the OS volume. Optional. To use a startup key, the saved file must be located on the root directory of a USB flash drive. Since TPM-only protection overrides this protector, any TPM protector on the computer is removed and replaced. -TPMAndPINAndStartupKey or -tpsk Adds a TPM And PIN And Startup Key protector for the OS volume. TPM-only, TPM And PIN, and TPM And Startup Key protectors on the volume are removed. -tpm Adds a TPM protector for the OS volume. This protector specifies TPM-only protection and overrides any other TPM-related protectors. TPM And PIN or TPM And StartupKey protectors are removed and replaced. -Password or -pw Adds a password key protector for the volume. Optional. You will be prompted for a password that will be used to unlock the device. -ADAccountOrGroup or -sid Adds an SID-based Identity protector for the volume. The volume will automatically unlock if the user or computer has the proper credentials. When specifying a computer account, append a '$' to the computer name and specify -service to indicate that the unlock should happen in the context of the BitLocker service (instead of the user). -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -add e: -RecoveryPassword manage-bde -protectors -add e: -rp -rk h:\\ manage-bde -protectors -add e: -TPMAndPIN manage-bde -protectors -add e: -Certificate -cf \"c:\\File Folder\\Filename.cer\" manage-bde -protectors -add e: -pw manage-bde -protectors -add e: -sid Domain\\User manage-bde -protectors -add e: -sid Domain\\Machine$ -service
0x40000110manage-bde -protectors -get Volume [{-Type|-t} {RecoveryPassword| ExternalKey| Certificate| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey| Password| Identity}] [-ID KeyProtectorID] [{-SaveExternalKey|-sek} PathToExternalKeyDirectory] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Displays key protection methods. All key protectors are shown unless optional parameters are used.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Type or -t Displays key protectors of a certain type. Optional. -id Displays the key protector with a certain identifier. Optional. -SaveExternalKey or -sek Provide the absolute directory path to save file(s) containing displayed external key(s). These external key files may be used as startup or recovery keys. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -get C: manage-bde -protectors -get C: -Type recoverypassword manage-bde -protectors -get C: -SaveExternalKey \"f:\\Folder\" manage-bde -protectors -get Volume [{-Type|-t} {RecoveryPassword| ExternalKey| Certificate| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey| Password| Identity}] [-ID KeyProtectorID] [{-SaveExternalKey|-sek} PathToExternalKeyDirectory] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Displays key protection methods. All key protectors are shown unless optional parameters are used.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Type or -t Displays key protectors of a certain type. Optional. -id Displays the key protector with a certain identifier. Optional. -SaveExternalKey or -sek Provide the absolute directory path to save file(s) containing displayed external key(s). These external key files may be used as startup or recovery keys. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -get C: manage-bde -protectors -get C: -Type recoverypassword manage-bde -protectors -get C: -SaveExternalKey \"f:\\Folder\"
0x40000111manage-bde -protectors -delete Volume [{-Type|-t} {RecoveryPassword| ExternalKey| Certificate| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey| Password| Identity}] [-ID KeyProtectorID] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Deletes key protection methods. All key protectors are removed unless optional parameters are used. To allow continued access to BitLocker-encrypted data, deleting the last protector disables all key protectors.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Type or -t Deletes key protectors of a certain type. Optional. -id Deletes the key protector with a certain identifier. Optional. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -delete C: -id {84E151C1...7A62067A512} manage-bde -protectors -delete C: -Type TPMAndStartupKey manage-bde -protectors -delete Volume [{-Type|-t} {RecoveryPassword| ExternalKey| Certificate| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey| Password| Identity}] [-ID KeyProtectorID] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Deletes key protection methods. All key protectors are removed unless optional parameters are used. To allow continued access to BitLocker-encrypted data, deleting the last protector disables all key protectors.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Type or -t Deletes key protectors of a certain type. Optional. -id Deletes the key protector with a certain identifier. Optional. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -delete C: -id {84E151C1...7A62067A512} manage-bde -protectors -delete C: -Type TPMAndStartupKey
0x40000113ERROR: Manage-bde cannot manage the Trusted Platform Module (TPM) in thisversion of Windows. To manage the Trusted Platform Module (TPM), use eitherthe TPM Management MMC snap-in or the TPM Management PowerShell cmdlets. ERROR: Manage-bde cannot manage the Trusted Platform Module (TPM) in thisversion of Windows. To manage the Trusted Platform Module (TPM), use eitherthe TPM Management MMC snap-in or the TPM Management PowerShell cmdlets.
0x40000114manage-bde {-forcerecovery|-fr} [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Forces a BitLocker-protected OS into recovery mode on restart. Deletes all TPM-related key protectors from the OS volume. On computer restart, only a recovery password or recovery key can unlock the OS.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -fr manage-bde -forcerecovery x: manage-bde {-forcerecovery|-fr} [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Forces a BitLocker-protected OS into recovery mode on restart. Deletes all TPM-related key protectors from the OS volume. On computer restart, only a recovery password or recovery key can unlock the OS.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -fr manage-bde -forcerecovery x:
0x40000115manage-bde -changepassword [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies password for a data volume.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changepassword e: manage-bde -changepassword [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies password for a data volume.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changepassword e:
0x40000116manage-bde -upgrade Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Upgrades the BitLocker version.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -upgrade C: manage-bde -upgrade Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Upgrades the BitLocker version.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -upgrade C:
0x40000117manage-bde -changepin [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies PIN for a volume. You will be prompted for a new PIN.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changepin e: manage-bde -changepin [Volume] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies PIN for a volume. You will be prompted for a new PIN.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changepin e:
0x40000118manage-bde {-changekey} [Volume] PathToExternalKeyDirectory [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies the startup key for a volume protected with a TPM based protector.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" PathToExternalKeyDirectory The path to save the new startup key in. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changekey c: d:\\ manage-bde {-changekey} [Volume] PathToExternalKeyDirectory [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Modifies the startup key for a volume protected with a TPM based protector.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" PathToExternalKeyDirectory The path to save the new startup key in. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -changekey c: d:\\
0x40000119manage-bde {-SetIdentifier|-si} Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Set the volume identifier field on the volume to the value specified in the Group Policy. This value may be managed by your system administrator.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -SetIdentifier C: manage-bde {-SetIdentifier|-si} Volume [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Set the volume identifier field on the volume to the value specified in the Group Policy. This value may be managed by your system administrator.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -SetIdentifier C:
0x4000011Amanage-bde -protectors -adbackup Volume -ID KeyProtectorID [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Backs up recovery information for the drive.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Backs up the key protector with a certain identifier. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -adbackup C: -id {84E151C1...7A62067A512} manage-bde -protectors -adbackup Volume -ID KeyProtectorID [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Backs up recovery information for the drive.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Backs up the key protector with a certain identifier. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -adbackup C: -id {84E151C1...7A62067A512}
0x4000011Bmanage-bde {-KeyPackage|-kp} Volume -ID KeyProtectorID -path PathToKeyPackageDirectory [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Generates a new key package for the specified volume. The key package can be used in conjunction with the repair tool to repair corrupted disks.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Uses the key protector with a certain identifier. -path Directory path where the key package will be created. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -KeyPackage C: -id {84E151C1...7A62067A512} -path \"f:\\Folder\" manage-bde {-KeyPackage|-kp} Volume -ID KeyProtectorID -path PathToKeyPackageDirectory [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Generates a new key package for the specified volume. The key package can be used in conjunction with the repair tool to repair corrupted disks.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Uses the key protector with a certain identifier. -path Directory path where the key package will be created. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -KeyPackage C: -id {84E151C1...7A62067A512} -path \"f:\\Folder\"
0x4000011Cmanage-bde {-WipeFreeSpace|-w} Volume [-Cancel] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Wipes the free space on the volume removing any data fragments that may have existed in the space. If used with a volume that was encrypted using the data only option provides the same level of protection as if the volume had been encrypted with the full encryption option.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Cancel Cancels wipe of free space. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -w C: manage-bde -w -Cancel C: manage-bde {-WipeFreeSpace|-w} Volume [-Cancel] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Wipes the free space on the volume removing any data fragments that may have existed in the space. If used with a volume that was encrypted using the data only option provides the same level of protection as if the volume had been encrypted with the full encryption option.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -Cancel Cancels wipe of free space. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -w C: manage-bde -w -Cancel C:
0x4000011Dmanage-bde -protectors -disable Volume [{-RebootCount|-rc} argument] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Suspends protection. Allows anyone to access encrypted data by making the encryption key available unsecured on disk. No key protectors are removed. If the optional RebootCount parameter is not specified, BitLocker protection of the OS volume automatically resumes after Windows is restarted. If a RebootCount parameter is specified, BitLocker protection of the OS volume will resume after Windows has been restarted the number of times specified in the Rebootcount parameter.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RebootCount or -rc Protection of the OS volume is suspended and will resume after Windows has been restarted the number of times specified in the RebootCount parameter. Only a number between 0 and 15 is a valid argument. Specify 0 to suspend protection indefinitely. If this parameter is not specified BitLocker protection will automatically resume for the OS volume when Windows is restarted. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -disable C: -rc 10 manage-bde -protectors -disable Volume [{-RebootCount|-rc} argument] [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Suspends protection. Allows anyone to access encrypted data by making the encryption key available unsecured on disk. No key protectors are removed. If the optional RebootCount parameter is not specified, BitLocker protection of the OS volume automatically resumes after Windows is restarted. If a RebootCount parameter is specified, BitLocker protection of the OS volume will resume after Windows has been restarted the number of times specified in the Rebootcount parameter.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -RebootCount or -rc Protection of the OS volume is suspended and will resume after Windows has been restarted the number of times specified in the RebootCount parameter. Only a number between 0 and 15 is a valid argument. Specify 0 to suspend protection indefinitely. If this parameter is not specified BitLocker protection will automatically resume for the OS volume when Windows is restarted. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -disable C: -rc 10
0x4000011E-Password or -pw Adds a password key protector for the volume. Optional. You will be prompted for a password to turn on BitLocker on the device. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. The volume will automatically unlock if the user or computer has the proper credentials. When specifying a computer account, append a '$' to the computer name and specify -service to indicate that the unlock should happen in the context of the BitLocker service (instead of the user). -UsedSpaceOnly or -used Sets the encryption mode to Used Space Only encryption. The sections of the volume containing used space will be encrypted, but the free space will not. If not specified, all used space and free space on the volume will be encrypted. -EncryptionMethod or -em Configures the encryption algorithm and key size used for an unencrypted volume. Choose between AES 128 bit (\"aes128\"), AES 256 bit (\"aes256\"), XTS-AES 128 bit (\"xts_aes128\") or XTS-AES 256 bit (\"xts_aes256\"). Unless otherwise specified, AES 128 bit is used to encrypt the disk. -SkipHardwareTest or -s Begins encryption without a hardware test. Optional. If not specified, you must restart and pass a hardware test before encryption will begin on the OS volume. The test checks whether the TPM works as expected and whether the computer can read an external key file from a USB drive during boot. -Synchronous or -sync Forces manage-bde to wait until the -on command has finished before displaying the command prompt. This switch only applies when turning on BitLocker. -DiscoveryVolumeType or -dv Define the file system to use for the discovery volume. A native BitLocker volume (\"[none]\") is not recognized by earlier versions of Windows; the data is not accessible and the OS might offer to format the drive. The discovery volume is an overlay that is recognized by earlier versions of Windows. It also provides an application to provide access to the encrypted data. If this parameter is not specified or \"[default]\" a FAT32 discovery volume is used if the volume contains a FAT file system. -ForceEncryptionType or -fet Forces BitLocker to use either software or hardware encryption. If the \"hardware\" parameter is selected, but the drive does not support hardware encryption, manage-bde returns an error. If group policy forbids the selected parameter, manage-bde returns an error. -RemoveVolumeShadowCopies or -rvsc Forces deletion of Volume Shadow Copies for the volume. You will not be able to restore this volume using previous system restore points afterwards. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -on C: -RecoveryPassword manage-bde -on C: -RecoveryKey e:\\ -RecoveryPassword manage-bde -on C: -rp -rk \"f:\\Folder\" -SkipHardwareTest manage-bde -on C: -rp -StartupKey \"f:\\\\\" manage-bde -on C: -rp -TPMAndPIN -em aes128 manage-bde -on E: -rp -Certificate -cf \"C:\\File Folder\\Filename.cer\" manage-bde -on E: -pw manage-bde -on E: -UsedSpaceOnly manage-bde -on E: -sid Domain\\User manage-bde -on E: -sid Domain\\Machine$ -service -Password or -pw Adds a password key protector for the volume. Optional. You will be prompted for a password to turn on BitLocker on the device. -ADAccountOrGroup or -sid Adds a SID-based Identity protector for the volume. The volume will automatically unlock if the user or computer has the proper credentials. When specifying a computer account, append a '$' to the computer name and specify -service to indicate that the unlock should happen in the context of the BitLocker service (instead of the user). -UsedSpaceOnly or -used Sets the encryption mode to Used Space Only encryption. The sections of the volume containing used space will be encrypted, but the free space will not. If not specified, all used space and free space on the volume will be encrypted. -EncryptionMethod or -em Configures the encryption algorithm and key size used for an unencrypted volume. Choose between AES 128 bit (\"aes128\"), AES 256 bit (\"aes256\"), XTS-AES 128 bit (\"xts_aes128\") or XTS-AES 256 bit (\"xts_aes256\"). Unless otherwise specified, AES 128 bit is used to encrypt the disk. -SkipHardwareTest or -s Begins encryption without a hardware test. Optional. If not specified, you must restart and pass a hardware test before encryption will begin on the OS volume. The test checks whether the TPM works as expected and whether the computer can read an external key file from a USB drive during boot. -Synchronous or -sync Forces manage-bde to wait until the -on command has finished before displaying the command prompt. This switch only applies when turning on BitLocker. -DiscoveryVolumeType or -dv Define the file system to use for the discovery volume. A native BitLocker volume (\"[none]\") is not recognized by earlier versions of Windows; the data is not accessible and the OS might offer to format the drive. The discovery volume is an overlay that is recognized by earlier versions of Windows. It also provides an application to provide access to the encrypted data. If this parameter is not specified or \"[default]\" a FAT32 discovery volume is used if the volume contains a FAT file system. -ForceEncryptionType or -fet Forces BitLocker to use either software or hardware encryption. If the \"hardware\" parameter is selected, but the drive does not support hardware encryption, manage-bde returns an error. If group policy forbids the selected parameter, manage-bde returns an error. -RemoveVolumeShadowCopies or -rvsc Forces deletion of Volume Shadow Copies for the volume. You will not be able to restore this volume using previous system restore points afterwards. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -on C: -RecoveryPassword manage-bde -on C: -RecoveryKey e:\\ -RecoveryPassword manage-bde -on C: -rp -rk \"f:\\Folder\" -SkipHardwareTest manage-bde -on C: -rp -StartupKey \"f:\\\\\" manage-bde -on C: -rp -TPMAndPIN -em aes128 manage-bde -on E: -rp -Certificate -cf \"C:\\File Folder\\Filename.cer\" manage-bde -on E: -pw manage-bde -on E: -UsedSpaceOnly manage-bde -on E: -sid Domain\\User manage-bde -on E: -sid Domain\\Machine$ -service
0x4000020CComputer Name: %1!s! Computer Name: %1!s!
0x4000020DVolume %1!s! [%2!s!] Volume %1!s! [%2!s!]
0x4000020E[Data Volume] [Data Volume]
0x4000020F[OS Volume] [OS Volume]
0x40000210ACTIONS REQUIRED: ACTIONS REQUIRED:
0x40000211%1!d!. Save this numerical recovery password in a secure location away from your computer: %2!s! To prevent data loss, save this password immediately. This password helps ensure that you can unlock the encrypted volume. %1!d!. Save this numerical recovery password in a secure location away from your computer: %2!s! To prevent data loss, save this password immediately. This password helps ensure that you can unlock the encrypted volume.
0x40000212%1!d!. Insert a USB flash drive with an external key file into the computer. %1!d!. Insert a USB flash drive with an external key file into the computer.
0x40000213%1!d!. Restart the computer to run a hardware test. (Type \"shutdown /?\" for command line instructions.) %1!d!. Restart the computer to run a hardware test. (Type \"shutdown /?\" for command line instructions.)
0x40000214%1!d!. Type \"manage-bde -status\" to check if the hardware test succeeded. %1!d!. Type \"manage-bde -status\" to check if the hardware test succeeded.
0x40000215NOTE: Encryption will begin after the hardware test succeeds. NOTE: Encryption will begin after the hardware test succeeds.
0x40000300Disk volumes that can be protected withBitLocker Drive Encryption: Disk volumes that can be protected withBitLocker Drive Encryption:
0x40000301Size: %1!s! GB Size: %1!s! GB
0x40000302Conversion Status: %1!s! Conversion Status: %1!s!
0x40000303Percentage Encrypted: %1!s!%% Percentage Encrypted: %1!s!%%
0x40000304Encryption Method: %1!s! Encryption Method: %1!s!
0x40000305Protection Status: %1!s!%2!s! Protection Status: %1!s!%2!s!
0x40000306Lock Status: %1!s! Lock Status: %1!s!
0x40000307Automatic Unlock: %1!s! Automatic Unlock: %1!s!
0x40000308Key Protectors: None Found Key Protectors: None Found
0x40000309Key Protectors: Key Protectors:
0x4000030A%1!s!%2!s! %1!s!%2!s!
0x4000030BERROR: The hardware test failed with code 0x%1!08x!. All key protectorswere removed. Possible reasons that the hardware test failed are: 1. A USB flash drive with an external key file was not found. - Insert a USB flash drive with an external key file into the computer. - If this failure persists, the computer cannot read USB drives during boot. You may not be able to use external keys to unlock the OS volume during boot. 2. The external key file on the USB flash drive was corrupt. - Try a different USB flash drive to store the external key file. 3. The TPM is off. - To manage the Trusted Platform Module (TPM), use either the TPM Management MMC snap-in or the TPM Management PowerShell cmdlets. 4. The TPM detected a change in OS boot components. - Remove any bootable CD or DVD from the computer. - If this failure persists, check that the latest firmware and BIOS upgrades are installed, and that the TPM is otherwise working properly. 5. The provided PIN was incorrect. 6. The TPM storage root key (SRK) has an incompatible authorization value. - To reset this value, run the TPM Initialization Wizard. ACTIONS REQUIRED: 1. Resolve the hardware test failure above. 2. Re-run the command to turn on BitLocker. ERROR: The hardware test failed with code 0x%1!08x!. All key protectorswere removed. Possible reasons that the hardware test failed are: 1. A USB flash drive with an external key file was not found. - Insert a USB flash drive with an external key file into the computer. - If this failure persists, the computer cannot read USB drives during boot. You may not be able to use external keys to unlock the OS volume during boot. 2. The external key file on the USB flash drive was corrupt. - Try a different USB flash drive to store the external key file. 3. The TPM is off. - To manage the Trusted Platform Module (TPM), use either the TPM Management MMC snap-in or the TPM Management PowerShell cmdlets. 4. The TPM detected a change in OS boot components. - Remove any bootable CD or DVD from the computer. - If this failure persists, check that the latest firmware and BIOS upgrades are installed, and that the TPM is otherwise working properly. 5. The provided PIN was incorrect. 6. The TPM storage root key (SRK) has an incompatible authorization value. - To reset this value, run the TPM Initialization Wizard. ACTIONS REQUIRED: 1. Resolve the hardware test failure above. 2. Re-run the command to turn on BitLocker.
0x4000030DIdentification Field: %1!s! Identification Field: %1!s!
0x40000405NOTE: This command did not create any new key protectors. Type\"manage-bde -protectors -add -?\" for information on adding more key protectors. NOTE: This command did not create any new key protectors. Type\"manage-bde -protectors -add -?\" for information on adding more key protectors.
0x40000407NOTE: Encryption is already complete. NOTE: Encryption is already complete.
0x40000408NOTE: Encryption is already in progress.Type \"manage-bde -status -?\" for information on the encryption status.BitLocker protection will be on when encryption completes. NOTE: Encryption is already in progress.Type \"manage-bde -status -?\" for information on the encryption status.BitLocker protection will be on when encryption completes.
0x40000409BitLocker protection is already on. BitLocker protection is already on.
0x4000040ATurned on BitLocker protection by enabling key protectors. Turned on BitLocker protection by enabling key protectors.
0x40000415Percentage Wiped: %1!s!%% Percentage Wiped: %1!s!%%
0x40000416Attempting to perform synchronous full encryption of the volume.This may take some time. Please wait. Attempting to perform synchronous full encryption of the volume.This may take some time. Please wait.
0x40000417Attempting to perform synchronous Used Space Only encryption of the volume.This may take some time. Please wait. Attempting to perform synchronous Used Space Only encryption of the volume.This may take some time. Please wait.
0x4000041ABitLocker protection is suspended until key protectors are created for thevolume. To enforce BitLocker protection on this volume, add a key protector. BitLocker protection is suspended until key protectors are created for thevolume. To enforce BitLocker protection on this volume, add a key protector.
0x40000420NOTE: If the -on switch has failed to add key protectors or start encryption,you may need to call \"manage-bde -off\" before attempting -on again. NOTE: If the -on switch has failed to add key protectors or start encryption,you may need to call \"manage-bde -off\" before attempting -on again.
0x40000605Type \"manage-bde -resume -?\" for information on resuming encryption. Type \"manage-bde -resume -?\" for information on resuming encryption.
0x40000606Type \"manage-bde -resume -?\" for information on resuming the free space wipe. Type \"manage-bde -resume -?\" for information on resuming the free space wipe.
0x40000607Type \"manage-bde -status -?\" for information on the status of the volume. Type \"manage-bde -status -?\" for information on the status of the volume.
0x4000090DEnter the password for this certificate: %0 Enter the password for this certificate: %0
0x4000090EEnter the password to unlock this volume: %0 Enter the password to unlock this volume: %0
0x40000A00Automatic unlock enabled. Automatic unlock enabled.
0x40000B00All Key Protectors All Key Protectors
0x40000B01Key Protectors of Type %1!s! Key Protectors of Type %1!s!
0x40000B02Key Protector with ID %1!s! Key Protector with ID %1!s!
0x40000B03ERROR: No key protectors found. ERROR: No key protectors found.
0x40000B04%1!s!: %1!s!:
0x40000B07ID: %1!s! ID: %1!s!
0x40000B08External Key File Name: %1!s! External Key File Name: %1!s!
0x40000B09Password: %1!s! Password: %1!s!
0x40000B0ACertificate Thumbprint: %1!s! Certificate Thumbprint: %1!s!
0x40000B0BCertificate Thumbprint: %1!s! Friendly Name: %2!s! Certificate Thumbprint: %1!s! Friendly Name: %2!s!
0x40000B11SID: %1!s! SID: %1!s!
0x40000B12Account Name: %1!s! Account Name: %1!s!
0x40000B13(Unlock using BitLocker Service Context) (Unlock using BitLocker Service Context)
0x40000B14PCR Validation Profile: %1!s! PCR Validation Profile: %1!s!
0x40000B15None%0 None%0
0x40000B16(Uses Secure Boot for integrity validation) (Uses Secure Boot for integrity validation)
0x40000D00Key Protectors Added: Key Protectors Added:
0x40000D0CType the PIN to use to protect the volume: %0 Type the PIN to use to protect the volume: %0
0x40000D0DConfirm the PIN by typing it again: %0 Confirm the PIN by typing it again: %0
0x40000D0EType the password to use to protect the volume: %0 Type the password to use to protect the volume: %0
0x40000D0FConfirm the password by typing it again: %0 Confirm the password by typing it again: %0
0x40001102Type the new password: %0 Type the new password: %0
0x40001103Confirm the new password by typing it again: %0 Confirm the new password by typing it again: %0
0x40001201The volume already has the latest version of BitLocker. The volume already has the latest version of BitLocker.
0x40001302Your PIN has been successfully updated. Your PIN has been successfully updated.
0x40001304Type the new PIN: %0 Type the new PIN: %0
0x40001305Confirm the new PIN by typing it again: %0 Confirm the new PIN by typing it again: %0
0x40001500The volume identifier has been set to %1!s!. The volume identifier has been set to %1!s!.
0x40001601Recovery information was successfully backed up to Active Directory. Recovery information was successfully backed up to Active Directory.
0x40001700The key package was successfully created in directory: %1!s! The key package was successfully created in directory: %1!s!
0x40004000Unknown%0 Unknown%0
0x40004001Label Unknown%0 Label Unknown%0
0x40004002Enabled%0 Enabled%0
0x40004003Disabled%0 Disabled%0
0x40004004Fully Decrypted%0 Fully Decrypted%0
0x40004005Fully Encrypted%0 Fully Encrypted%0
0x40004006Encryption in Progress%0 Encryption in Progress%0
0x40004007Decryption in Progress%0 Decryption in Progress%0
0x40004008Encryption Paused%0 Encryption Paused%0
0x40004009Decryption Paused%0 Decryption Paused%0
0x4000400ALocked%0 Locked%0
0x4000400BUnlocked%0 Unlocked%0
0x4000400CProtection Off%0 Protection Off%0
0x4000400DProtection On%0 Protection On%0
0x4000400FAES 128 with Diffuser%0 AES 128 with Diffuser%0
0x40004010AES 256 with Diffuser%0 AES 256 with Diffuser%0
0x40004011AES 128%0 AES 128%0
0x40004012AES 256%0 AES 256%0
0x40004013External Key%0 External Key%0
0x40004014(Required for automatic unlock)%0 (Required for automatic unlock)%0
0x40004015Numerical Password%0 Numerical Password%0
0x40004016TPM%0 TPM%0
0x40004017TPM And Startup Key%0 TPM And Startup Key%0
0x40004018TPM And PIN%0 TPM And PIN%0
0x40004019TPM And PIN And Startup Key%0 TPM And PIN And Startup Key%0
0x4000401ASmart Card (Certificate Based)%0 Smart Card (Certificate Based)%0
0x4000401BPassword%0 Password%0
0x4000401CBitLocker Version: %1!s! BitLocker Version: %1!s!
0x4000401D2.0%0 2.0%0
0x4000401EWindows Vista%0 Windows Vista%0
0x40004022Data Recovery Agent (Certificate Based)%0 Data Recovery Agent (Certificate Based)%0
0x40004023Network (Certificate Based)%0 Network (Certificate Based)%0
0x40004024Used Space Only Encrypted%0 Used Space Only Encrypted%0
0x40004025Encryption Method: Hardware Encryption - %1!s! Encryption Method: Hardware Encryption - %1!s!
0x40004026Identity%0 Identity%0
0x40004027(SID-based)%0 (SID-based)%0
0x40004028(%1!u! reboots left)%0 (%1!u! reboots left)%0
0x40004029XTS-AES 128%0 XTS-AES 128%0
0x4000402AXTS-AES 256%0 XTS-AES 256%0
0x4000402Bmanage-bde -protectors -aadbackup Volume -ID KeyProtectorID [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Backs up recovery information for the drive.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Backs up the key protector with a certain identifier. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -aadbackup C: -id {84E151C1...7A62067A512} manage-bde -protectors -aadbackup Volume -ID KeyProtectorID [{-ComputerName|-cn} ComputerName] [{-?|/?}] [{-Help|-h}]Description: Backs up recovery information for the drive.Parameter List: Volume A drive letter followed by a colon, a volume GUID path or a mounted volume. Example: \"C:\", \\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\\ or \"C:\\MountVolume\" -id Backs up the key protector with a certain identifier. -ComputerName or -cn Runs on another computer. Examples: \"ComputerX\", \"127.0.0.1\" -? or /? Displays brief help. Example: \"-ParameterSet -?\" -Help or -h Displays complete help. Example: \"-ParameterSet -h\"Examples: manage-bde -protectors -aadbackup C: -id {84E151C1...7A62067A512}
0x4000402CRecovery information was successfully backed up to Azure Active Directory. Recovery information was successfully backed up to Azure Active Directory.
0x4000402DAES 128 (Storage controller assisted)%0 AES 128 (Storage controller assisted)%0
0x4000402EAES 256 (Storage controller assisted)%0 AES 256 (Storage controller assisted)%0
0x4000402FXTS-AES 128 (Storage controller assisted)%0 XTS-AES 128 (Storage controller assisted)%0
0x40004030XTS-AES 256 (Storage controller assisted)%0 XTS-AES 256 (Storage controller assisted)%0
0x80000217WARNING: The script manage-bde.wsf is not supported. Please use manage-bde.exe. WARNING: The script manage-bde.wsf is not supported. Please use manage-bde.exe.
0x80000D08WARNING: The numerical password was not added. The FIPS Group Policy settingon the computer prevents recovery password creation. WARNING: The numerical password was not added. The FIPS Group Policy settingon the computer prevents recovery password creation.
0x80000D12WARNING: \"%1!s!\" was not added to the volume.A SID-based Identity protector for this account already exists on this volume.Only one SID-based Identity protector per account is allowed for this volume. WARNING: \"%1!s!\" was not added to the volume.A SID-based Identity protector for this account already exists on this volume.Only one SID-based Identity protector per account is allowed for this volume.
0x80000E02WARNING: The command was performed successfully, however the optionalparameters specified for this command were not supported on the targetcomputer and were ignored. WARNING: The command was performed successfully, however the optionalparameters specified for this command were not supported on the targetcomputer and were ignored.
0x80001004Only a recovery password or recovery key can unlock volume %1!s!. Only a recovery password or recovery key can unlock volume %1!s!.
0xC0000200ERROR: -cn or -ComputerName must be followed by a computer name ERROR: -cn or -ComputerName must be followed by a computer name
0xC0000201ERROR: Cannot specify multiple computers ERROR: Cannot specify multiple computers
0xC0000202ERROR Cannot specify multiple volumes ERROR Cannot specify multiple volumes
0xC0000203ERROR: A volume letter is required. ERROR: A volume letter is required.
0xC0000204ERROR: The operation cannot be performed because the volume is locked. ERROR: The operation cannot be performed because the volume is locked.
0xC0000205ERROR: An attempt to access a required resource was denied.Check that you have administrative rights on the computer. ERROR: An attempt to access a required resource was denied.Check that you have administrative rights on the computer.
0xC0000206ERROR: An error occurred while connecting to the BitLocker managementinterface.If the \"-cn\" parameter was specified, check that the computer name is correct. ERROR: An error occurred while connecting to the BitLocker managementinterface.If the \"-cn\" parameter was specified, check that the computer name is correct.
0xC0000207ERROR: An error occurred (code 0x%1!08x!): ERROR: An error occurred (code 0x%1!08x!):
0xC0000208ERROR: Invalid Syntax.\"%1!s!\" was not understood.Type \"manage-bde -?\" for usage. ERROR: Invalid Syntax.\"%1!s!\" was not understood.Type \"manage-bde -?\" for usage.
0xC0000209ERROR: Invalid Syntax.\"%1!s!\" cannot be specified multiple times in the same command.Type \"manage-bde -?\" for usage. ERROR: Invalid Syntax.\"%1!s!\" cannot be specified multiple times in the same command.Type \"manage-bde -?\" for usage.
0xC000020AERROR: Parameter \"%1!s!\" requires an argument. ERROR: Parameter \"%1!s!\" requires an argument.
0xC000020BERROR: Missing required parameter.Type \"manage-bde -?\" for usage. ERROR: Missing required parameter.Type \"manage-bde -?\" for usage.
0xC0000216ERROR: While performing the operation, a component unexpectedly returned FALSE. ERROR: While performing the operation, a component unexpectedly returned FALSE.
0xC0000218ERROR: The values you have entered do not match. ERROR: The values you have entered do not match.
0xC0000219ERROR: The value you have entered exceeded the maximum allowed length of%1!d! characters. ERROR: The value you have entered exceeded the maximum allowed length of%1!d! characters.
0xC000030CERROR: There are no disk volumes that can be protected with BitLocker DriveEncryption. ERROR: There are no disk volumes that can be protected with BitLocker DriveEncryption.
0xC000030EERROR: The volume %1!s! could not be opened by BitLocker.This may be because the volume does not exist, or because it is not a validBitLocker volume. ERROR: The volume %1!s! could not be opened by BitLocker.This may be because the volume does not exist, or because it is not a validBitLocker volume.
0xC0000400ERROR: Specifying the parameter '-StartupKey' or '-Password' is required toBitLocker-protect the OS volume.Type \"manage-bde -on -?\" for more information. ERROR: Specifying the parameter '-StartupKey' or '-Password' is required toBitLocker-protect the OS volume.Type \"manage-bde -on -?\" for more information.
0xC0000401ERROR: A numerical recovery password is required to turn on BitLockerprotection.Include \"-RecoveryPassword\" in the command to randomly generate this numericalpassword.Type \"manage-bde -on -help\" for more information. ERROR: A numerical recovery password is required to turn on BitLockerprotection.Include \"-RecoveryPassword\" in the command to randomly generate this numericalpassword.Type \"manage-bde -on -help\" for more information.
0xC0000402ERROR: To turn on BitLocker, a recovery method must exist. Include\"-RecoveryKey [path]\" in the command line to generate and save a recovery key.No key protectors were added. ERROR: To turn on BitLocker, a recovery method must exist. Include\"-RecoveryKey [path]\" in the command line to generate and save a recovery key.No key protectors were added.
0xC0000403ERROR: No key protectors were specified. ERROR: No key protectors were specified.
0xC0000404ERROR: Invalid encryption method '%1!s!'.Valid encryption methods: aes128, aes256, xts_aes128, xts_aes256.Encryption methods aes128_diffuser and aes256_diffuser are deprecated. ERROR: Invalid encryption method '%1!s!'.Valid encryption methods: aes128, aes256, xts_aes128, xts_aes256.Encryption methods aes128_diffuser and aes256_diffuser are deprecated.
0xC000040CERROR: The TPM cannot be used to protect this volume. The TPM Storage RootKey (SRK) has an incompatible authorization value.To reset this value, run the TPM Initialization Wizard (tpminit.exe). ERROR: The TPM cannot be used to protect this volume. The TPM Storage RootKey (SRK) has an incompatible authorization value.To reset this value, run the TPM Initialization Wizard (tpminit.exe).
0xC000040DERROR: The TPM cannot be used to protect this volume. The TPM is off.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets. ERROR: The TPM cannot be used to protect this volume. The TPM is off.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets.
0xC000040EERROR: The TPM cannot be used to protect this volume. The TPM does not havean owner set.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets. ERROR: The TPM cannot be used to protect this volume. The TPM does not havean owner set.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets.
0xC0000410ERROR: Invalid discovery volume type '%1!s!'.Valid volume discovery types: FAT32, [none], [default]. ERROR: Invalid discovery volume type '%1!s!'.Valid volume discovery types: FAT32, [none], [default].
0xC0000411ERROR: The target machine returned an error on the discovery volume argument.Earlier versions of Windows do not support discovery volume creation. ERROR: The target machine returned an error on the discovery volume argument.Earlier versions of Windows do not support discovery volume creation.
0xC0000412ERROR: To turn on BitLocker in a pre-installation or recovery environment, aTPM must be present, enabled, and activated. If the computer has a TPM, pleaseconfigure the BIOS to allow the operating system to use the TPM. ERROR: To turn on BitLocker in a pre-installation or recovery environment, aTPM must be present, enabled, and activated. If the computer has a TPM, pleaseconfigure the BIOS to allow the operating system to use the TPM.
0xC0000413ERROR: To turn on BitLocker in a pre-installation or recovery environment, theTPM must be enabled and activated.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets. ERROR: To turn on BitLocker in a pre-installation or recovery environment, theTPM must be enabled and activated.To manage the Trusted Platform Module (TPM), use either the TPM ManagementMMC snap-in or the TPM Management PowerShell cmdlets.
0xC000041CERROR: To turn on BitLocker with a SID-based Identity protector on this volume,you must provide at least one additional protector for recovery. ERROR: To turn on BitLocker with a SID-based Identity protector on this volume,you must provide at least one additional protector for recovery.
0xC000041DERROR: Invalid encryption type '%1!s!'.Valid volume encryption types: Hardware, Software. ERROR: Invalid encryption type '%1!s!'.Valid volume encryption types: Hardware, Software.
0xC000041EERROR: The encryption methods aes128_Diffuser and aes256_Diffuserare deprecated.Valid volume encryption methods: aes128, aes256, xts_aes128, xts_aes256. ERROR: The encryption methods aes128_Diffuser and aes256_Diffuserare deprecated.Valid volume encryption methods: aes128, aes256, xts_aes128, xts_aes256.
0xC000041FERROR: BitLocker cannot be enabled on the volume because it containsa Volume Shadow Copy. Use the -RemoveVolumeShadowCopies option to deleteall Volume Shadow Copies. You will not be able to restore this volume using previous system restore points afterwards. ERROR: BitLocker cannot be enabled on the volume because it containsa Volume Shadow Copy. Use the -RemoveVolumeShadowCopies option to deleteall Volume Shadow Copies. You will not be able to restore this volume using previous system restore points afterwards.
0xC0000501ERROR: This volume stores external key(s) that can automatically unlockother volumes. Before you can decrypt this volume, you must remove suchkeys.ACTIONS REQUIRED:1. To prevent data loss, check that a recovery password or a recovery key exists for associated data volumes.2. Type \"manage-bde -autounlock -ClearAllKeys Volume\" to remove stored external key(s). ERROR: This volume stores external key(s) that can automatically unlockother volumes. Before you can decrypt this volume, you must remove suchkeys.ACTIONS REQUIRED:1. To prevent data loss, check that a recovery password or a recovery key exists for associated data volumes.2. Type \"manage-bde -autounlock -ClearAllKeys Volume\" to remove stored external key(s).
0xC0000600The command is invalid. No conversion is in progress.Type \"manage-bde -status %1!s!\" for more information. The command is invalid. No conversion is in progress.Type \"manage-bde -status %1!s!\" for more information.
0xC0000601Encryption of the volume is already paused. Encryption of the volume is already paused.
0xC0000602Decryption of the volume is already paused. Decryption of the volume is already paused.
0xC0000608Free space wiping of the volume is already paused. Free space wiping of the volume is already paused.
0xC0000700The command is invalid. No conversion is paused.Type \"manage-bde -status %1!s!\" for more information. The command is invalid. No conversion is paused.Type \"manage-bde -status %1!s!\" for more information.
0xC0000701Encryption of the volume is already in progress. Encryption of the volume is already in progress.
0xC0000702Decryption of the volume is already in progress. Decryption of the volume is already in progress.
0xC0000705Free space wiping of the volume is already in progress. Free space wiping of the volume is already in progress.
0xC0000801ERROR: The volume is already locked. ERROR: The volume is already locked.
0xC0000802ERROR: The volume cannot be locked because it contains the running OS. ERROR: The volume cannot be locked because it contains the running OS.
0xC0000803ERROR: Access was denied when attempting to lock the volume. Applicationsmay be accessing this volume (code 0x80070005).Add the \"-ForceDismount\" parameter to lock the volume even when it is in use.Type \"manage-bde -lock -?\" for more information. ERROR: Access was denied when attempting to lock the volume. Applicationsmay be accessing this volume (code 0x80070005).Add the \"-ForceDismount\" parameter to lock the volume even when it is in use.Type \"manage-bde -lock -?\" for more information.
0xC0000900ERROR: The volume is already unlocked. ERROR: The volume is already unlocked.
0xC0000901ERROR: An error occurred while attempting to read the key from disk. ERROR: An error occurred while attempting to read the key from disk.
0xC0000902ERROR: The file \"%1!s!\" failed to unlock volume %2!s!. ERROR: The file \"%1!s!\" failed to unlock volume %2!s!.
0xC0000904ERROR: The password failed to unlock volume %1!s!. ERROR: The password failed to unlock volume %1!s!.
0xC0000906ERROR: The certificate failed to unlock volume %1!s!. ERROR: The certificate failed to unlock volume %1!s!.
0xC0000908ERROR: An unlock mechanism (password, SID, certificate, recovery password, orrecovery key) must be specified. ERROR: An unlock mechanism (password, SID, certificate, recovery password, orrecovery key) must be specified.
0xC000090BERROR: This operation is not allowed remotely, you must log on to the computerlocally to perform this command. ERROR: This operation is not allowed remotely, you must log on to the computerlocally to perform this command.
0xC000090CERROR: Only one unlock mechanism (password, SID, certificate, recovery password,or recovery key) may be specified. ERROR: Only one unlock mechanism (password, SID, certificate, recovery password,or recovery key) may be specified.
0xC000090FERROR: A SID-based Identity protector failed to unlock volume %1!s!. ERROR: A SID-based Identity protector failed to unlock volume %1!s!.
0xC0000A01ERROR: Automatic unlocking cannot be used on the OS volume. ERROR: Automatic unlocking cannot be used on the OS volume.
0xC0000A02ERROR: Automatic unlock is already enabled on the volume. ERROR: Automatic unlock is already enabled on the volume.
0xC0000A04ERROR: Automatic unlock is already disabled on the volume. ERROR: Automatic unlock is already disabled on the volume.
0xC0000A06ERROR: Keys used to automatically unlock data volumes are only found in theOS volume. The volume letter for the OS volume must be specified. ERROR: Keys used to automatically unlock data volumes are only found in theOS volume. The volume letter for the OS volume must be specified.
0xC0000B06ERROR: Invalid protector type '%1!s!'.Valid protector types: RecoveryPassword, ExternalKey, Certificate, TPM,TPMAndStartupKey, TPMAndPIN, TPMAndPINAndStartupKey, Password, Identity. ERROR: Invalid protector type '%1!s!'.Valid protector types: RecoveryPassword, ExternalKey, Certificate, TPM,TPMAndStartupKey, TPMAndPIN, TPMAndPINAndStartupKey, Password, Identity.
0xC0000B0CERROR: An error occurred while retrieving the volume's key protectors. ERROR: An error occurred while retrieving the volume's key protectors.
0xC0000B0DERROR: The given protector ID was not recognized. ERROR: The given protector ID was not recognized.
0xC0000B0EERROR: Keys cannot be saved to relative paths. Use an absolute pathsuch as \"D:\\\\\". ERROR: Keys cannot be saved to relative paths. Use an absolute pathsuch as \"D:\\\\\".
0xC0000B0FERROR: There was an error while trying to save the key to disk. ERROR: There was an error while trying to save the key to disk.
0xC0000C01ERROR: An error occurred while deleting the key protector. ERROR: An error occurred while deleting the key protector.
0xC0000C02NOTE: Key protectors have been disabled on volume %1!s! to allow continuedaccess to BitLocker-encrypted data.Type \"manage-bde -protectors -enable %1!s!\" to re-enable any new keyprotectors that are added. NOTE: Key protectors have been disabled on volume %1!s! to allow continuedaccess to BitLocker-encrypted data.Type \"manage-bde -protectors -enable %1!s!\" to re-enable any new keyprotectors that are added.
0xC0000C03ERROR: Removal of the data recovery agent certificate must be done using theCertificates snap-in. ERROR: Removal of the data recovery agent certificate must be done using theCertificates snap-in.
0xC0000C04ERROR: Network Unlock can only be disabled within the BitLocker Drive Encryptiongroup policy setting \"Allow network unlock at startup\", or by removing thePublic Key Policies group policy setting \"BitLocker Drive Encryption NetworkUnlock Certificate\" on the domain controller. ERROR: Network Unlock can only be disabled within the BitLocker Drive Encryptiongroup policy setting \"Allow network unlock at startup\", or by removing thePublic Key Policies group policy setting \"BitLocker Drive Encryption NetworkUnlock Certificate\" on the domain controller.
0xC0000D01ERROR: Cannot use both -type and -id. ERROR: Cannot use both -type and -id.
0xC0000D02ERROR: You must specify the Startup Key with -tsk. ERROR: You must specify the Startup Key with -tsk.
0xC0000D03ERROR: This computer either does not have a TPM, or one which is capable ofbeing used with BitLocker. ERROR: This computer either does not have a TPM, or one which is capable ofbeing used with BitLocker.
0xC0000D04ERROR: Only the OS volume may be secured with the TPM. ERROR: Only the OS volume may be secured with the TPM.
0xC0000D05ERROR: You cannot specify -tpm with any other TPM-based protectors. ERROR: You cannot specify -tpm with any other TPM-based protectors.
0xC0000D06ERROR: To use the -Certificate command you must also specify either the pathto the certificate file using the -cf parameter or the certificate thumbprintusing the -ct parameter. ERROR: To use the -Certificate command you must also specify either the pathto the certificate file using the -cf parameter or the certificate thumbprintusing the -ct parameter.
0xC0000D07ERROR: The recovery password provided is not formatted correctly according torequirements for a numerical password.The password must contain exactly 48 digits, which can be divided into 8groups of 6 digits each. Use a hyphen (-) to separate groups of 6 digits onthe command line.Each group of 6 digits in the 48-digit numerical password must be:1. Divisible by 112. Less than 720896For example, \"000000\" is a valid group of 6 digits.Invalid groups include \"123456\", \"720896\", and \"888888\".Use \"-rp\" with no arguments to generate a random password. ERROR: The recovery password provided is not formatted correctly according torequirements for a numerical password.The password must contain exactly 48 digits, which can be divided into 8groups of 6 digits each. Use a hyphen (-) to separate groups of 6 digits onthe command line.Each group of 6 digits in the 48-digit numerical password must be:1. Divisible by 112. Less than 720896For example, \"000000\" is a valid group of 6 digits.Invalid groups include \"123456\", \"720896\", and \"888888\".Use \"-rp\" with no arguments to generate a random password.
0xC0000D09ERROR: BitLocker detected a bootable CD or DVD on the computer. A bootableCD or DVD affects whether the TPM can unlock the OS volume.ACTIONS REQUIRED:1. Remove any bootable CD or DVD from the computer2. Revert any changes made to the disk by running \"manage-bde -off %1!s!\"3. Restart the computer. (Type \"shutdown /?\" for command line instructions.)4. Run this command again. ERROR: BitLocker detected a bootable CD or DVD on the computer. A bootableCD or DVD affects whether the TPM can unlock the OS volume.ACTIONS REQUIRED:1. Remove any bootable CD or DVD from the computer2. Revert any changes made to the disk by running \"manage-bde -off %1!s!\"3. Restart the computer. (Type \"shutdown /?\" for command line instructions.)4. Run this command again.
0xC0000D0AERROR: No valid certificates were found. ERROR: No valid certificates were found.
0xC0000D0BERROR: Two or more valid certificates were found. Re-run this commandspecifying a unique certificate by either the path to the certificate fileusing the -cf parameter or the certificate thumbprint using the -ct parameter. ERROR: Two or more valid certificates were found. Re-run this commandspecifying a unique certificate by either the path to the certificate fileusing the -cf parameter or the certificate thumbprint using the -ct parameter.
0xC0000D10ERROR: Invalid Syntax.\"%1!s!\" was not recognized as a valid SID or account name. ERROR: Invalid Syntax.\"%1!s!\" was not recognized as a valid SID or account name.
0xC0000D11ERROR: BitLocker Drive Encryption could not perform this command.The target computer might be running an earlier version of Windows that doesnot support this command. ERROR: BitLocker Drive Encryption could not perform this command.The target computer might be running an earlier version of Windows that doesnot support this command.
0xC0001000ERROR: No recovery methods exist for volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding arecovery password or recovery key. ERROR: No recovery methods exist for volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding arecovery password or recovery key.
0xC0001001ERROR: BitLocker protection must be turned on to force a recovery forvolume %1!s!.Type \"manage-bde -on -?\" for more information. ERROR: BitLocker protection must be turned on to force a recovery forvolume %1!s!.Type \"manage-bde -on -?\" for more information.
0xC0001002ERROR: This volume has no key protectors to delete. ERROR: This volume has no key protectors to delete.
0xC0001003No changes needed to force recovery for volume %1!s!. No changes needed to force recovery for volume %1!s!.
0xC0001100ERROR: There are no password key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding apassword key protector. ERROR: There are no password key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding apassword key protector.
0xC0001101ERROR: There is more than one password key protector on volume %1!s!.Only one password key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors. ERROR: There is more than one password key protector on volume %1!s!.Only one password key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors.
0xC0001300ERROR: There are no PIN key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding a PINkey protector. ERROR: There are no PIN key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding a PINkey protector.
0xC0001301ERROR: There is more than one PIN key protector on volume %1!s!.Only one PIN key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors. ERROR: There is more than one PIN key protector on volume %1!s!.Only one PIN key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors.
0xC0001303ERROR: Certificate thumbprint or certificate file specified withoutthe -Certificate parameter. ERROR: Certificate thumbprint or certificate file specified withoutthe -Certificate parameter.
0xC0001400ERROR: There are no TPM based startup key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding astartup key protector. ERROR: There are no TPM based startup key protectors on volume %1!s!.Type \"manage-bde -protectors -add -?\" for more information about adding astartup key protector.
0xC0001401ERROR: There is more than one startup key protector on volume %1!s!.Only one startup key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors. ERROR: There is more than one startup key protector on volume %1!s!.Only one startup key protector per volume is supported. Type\"manage-bde -protectors -delete -?\" for information about deleting keyprotectors.
0xC0001600ERROR: Specifying the parameter '-ID' is required to back up recoveryinformation. ERROR: Specifying the parameter '-ID' is required to back up recoveryinformation.
0xC0001602ERROR: Group policy does not permit the storage of recovery informationto Active Directory. The operation was not attempted. ERROR: Group policy does not permit the storage of recovery informationto Active Directory. The operation was not attempted.
0xC0001801ERROR: Wipe of free space is only available on fully encrypted volumes. ERROR: Wipe of free space is only available on fully encrypted volumes.
0xC0001802ERROR: Wipe of free space is not available on hardware encrypted volumes. ERROR: Wipe of free space is not available on hardware encrypted volumes.
0xC0001804ERROR: Wipe of free space is not currently taking place. ERROR: Wipe of free space is not currently taking place.

EXIF

File Name:manage-bde.exe.mui
Directory:%WINDIR%\WinSxS\amd64_microsoft-windows-s..-tool-exe.resources_31bf3856ad364e35_10.0.15063.0_en-us_ce458b608a1d05f3\
File Size:147 kB
File Permissions:rw-rw-rw-
File Type:Win32 DLL
File Type Extension:dll
MIME Type:application/octet-stream
Machine Type:Intel 386 or later, and compatibles
Time Stamp:0000:00:00 00:00:00
PE Type:PE32
Linker Version:14.10
Code Size:0
Initialized Data Size:150016
Uninitialized Data Size:0
Entry Point:0x0000
OS Version:10.0
Image Version:10.0
Subsystem Version:6.0
Subsystem:Windows GUI
File Version Number:10.0.15063.0
Product Version Number:10.0.15063.0
File Flags Mask:0x003f
File Flags:(none)
File OS:Windows NT 32-bit
Object File Type:Executable application
File Subtype:0
Language Code:English (U.S.)
Character Set:Unicode
Company Name:Microsoft Corporation
File Description:BitLocker Drive Encryption: Configuration Tool
File Version:10.0.15063.0 (WinBuild.160101.0800)
Internal Name:manage-bde.exe
Legal Copyright:© Microsoft Corporation. All rights reserved.
Original File Name:manage-bde.exe.mui
Product Name:Microsoft® Windows® Operating System
Product Version:10.0.15063.0

What is manage-bde.exe.mui?

manage-bde.exe.mui is Multilingual User Interface resource file that contain English (U.S.) language for file manage-bde.exe (BitLocker Drive Encryption: Configuration Tool).

File version info

File Description:BitLocker Drive Encryption: Configuration Tool
File Version:10.0.15063.0 (WinBuild.160101.0800)
Company Name:Microsoft Corporation
Internal Name:manage-bde.exe
Legal Copyright:© Microsoft Corporation. All rights reserved.
Original Filename:manage-bde.exe.mui
Product Name:Microsoft® Windows® Operating System
Product Version:10.0.15063.0
Translation:0x409, 1200