Solved

Bitlocker Troubles on Lenovo T420i

Posted on 2013-11-12
3
419 Views
Last Modified: 2013-11-21
I have a Lenovo T420i that asks for the bitlocker recovery key every time it is re-started or shutdown. The TPM is enabled and BIOS settings are proper per all the documentation I have perused. I have tried suspending bitlocker, re-starting the machine and re-enabling bitlocker. I have also tried un-encrypting and re-encrypting the drive. Group policy is locked down so I cannot modify the PCR's. I have dozens of other Lenovo's that do not have this problem on the same network. Idea's?
0
Comment
Question by:CommCatz
  • 3
3 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
Comment Utility
Hi.

You even decrypted, re-encrypted and right on next start it asked for the key? That's what you say? Is it possible that some oddity is going on caused by an empty BIOS battery or by constantly connecting/disconnecting external devices or extension cards?
0
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
feedback?
0
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
What was the problem?
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Today, security is a big concern in an organization to prevent sensitive data leakage. In Outlook you can secure your Outlook items (emails, calendars, contacts and other stuff) using various techniques like by marking item as private, or you can pu…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now