This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.Important: This group policy only applies to computers with BIOS configurations or to computers with UEFI firmware with a Compatibility Service Module (CSM) enabled. Computers using a native UEFI firmware configuration store different values into the Platform Configuration Registers (PCRs). Use the "Configure TPM platform validation profile for native UEFI firmware configurations" group policy setting to configure the TPM PCR profile for computers using native UEFI firmware.If you enable this policy setting before turning on BitLocker you can configure the boot components that the TPM will validate before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect the TPM will not release the encryption key to unlock the drive and the computer will instead display the BitLocker Recovery console and require that either the recovery password or recovery key be provided to unlock the drive.If you disable or do not configure this policy setting BitLocker uses the default platform validation profile or the platform validation profile specified by the setup script. A platform validation profile consists of a set of Platform Configuration Register (PCR) indices ranging from 0 to 23. The default platform validation profile secures the encryption key against changes to the Core Root of Trust of Measurement (CRTM) BIOS and Platform Extensions (PCR 0) the Option ROM Code (PCR 2) the Master Boot Record (MBR) Code (PCR 4) the NTFS Boot Sector (PCR 8) the NTFS Boot Block (PCR 9) the Boot Manager (PCR 10) and the BitLocker Access Control (PCR 11).Warning: Changing from the default platform validation profile affects the security and manageability of your computer. BitLocker's sensitivity to platform modifications (malicious or authorized) is increased or decreased depending upon inclusion or exclusion (respectively) of the PCRs.
Windows Components\BitLocker Drive Encryption\Operating System Drives
Machine
At least Windows Server 2012 or Windows 8
HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!Enabled; HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!0 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!1 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!2 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!3 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!4 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!5 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!6 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!7 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!8 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!9 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!10 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!11 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!12 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!13 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!14 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!15 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!16 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!17 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!18 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!19 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!20 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!21 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!22 HKLM\SOFTWARE\Policies\Microsoft\FVE\OSPlatformValidation_BIOS!23
VolumeEncryption.admx