Bitlocker removal

Posted on 2015-02-12
Last Modified: 2015-02-20
I have a laptop that was once the company laptop, and used to get in the via bitlocker. Today I had a scary incidence that the bitlocker tmp file was corrupted and for a long time could not get in. Admin wouldn't help because the laptop is out of company support. Luckily I found the recovery key printed from a long time ago and came in very handy. For future, is there a way I remove this bitlocker procedure from this laptop.. I am ok w/ non-encrypted files and it is my personal computer. Please walk me thro' it as am MS challenged when it comes to security. Please make it so that I do not get locked in again.

Question by:totaram
  • 3
  • 3

Expert Comment

by:Network Zero
ID: 40606049
Once the drive is unlocked you should be able to click on drive (right click) and click unencrypted drive
LVL 46

Expert Comment

ID: 40606063
Press Start - in search pane type: Bitlocker - then open the selected Bitlocker Drive Encryption.
Once opened you can an option either to remove it or turn it on.

Author Comment

ID: 40606118
Thanks noxcho... please confirm that when I reboot the laptop, it does not ask for the bitlocker ever again? I am sort of spooked by it.
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

LVL 46

Expert Comment

ID: 40606295
Once you remove it and see in the screen which I posted no volume with bitlocker on - it will not ask for Bitlocker password.

Author Comment

ID: 40606310
Thank noxcho..
Please see the picture as below, which one do I choose turn off bitlocker or suspend protection?
LVL 46

Accepted Solution

noxcho earned 500 total points
ID: 40606441
Turn off is your option.

Author Closing Comment

ID: 40622408

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now