Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Prompted for BitLocker recovery key after installing updates to Surface UEFI or TPM firmware on Surface device


View products that this article applies to.

↑ Back to the top


Symptoms

You encounter one or more of the following symptoms on your Surface device:

  • At startup, you are prompted for your BitLocker recovery key, and you enter the correct recovery key, but Windows doesn’t start up.
  • You boot directly into the Surface Unified Extensible Firmware Interface (UEFI) settings.
  • Your Surface device appears to be in an infinite reboot loop.

↑ Back to the top


Cause

This behavior can occur in the following scenario:

  • BitLocker is enabled and configured to use Platform Configuration Register (PCR) values other than the default values of PCR 7 and PCR 11, for example when:
    • Secure Boot is turned off.
    • PCR values have been explicitly defined, such as by Group Policy.
  • You install a firmware update that updates the firmware of the device TPM or changes the signature of the system firmware. For example, you install the Surface dTPM (IFX) update.

Note You can verify the PCR values that are in use on a device by running the following command from an elevated command prompt:

manage-bde.exe -protectors -get <OSDriveLetter>:

Note PCR 7 is a requirement for devices that support Connected Standby (also known as InstantGO or Always On, Always Connected PCs), including Surface devices. On such systems, if the TPM with PCR 7 and Secure Boot are correctly configured, BitLocker binds to PCR 7 and PCR 11 by default. For more information see "About the Platform Configuration Register (PCR)" at BitLocker Group Policy Settings.

↑ Back to the top


Workaround

Method 1: Suspend BitLocker during TPM or UEFI firmware updates

You can avoid this scenario when installing updates to system firmware or TPM firmware by temporarily suspending BitLocker before applying updates to TPM or UEFI firmware by using Suspend-BitLocker.

Note TPM and UEFI firmware updates may require multiple reboots during installation. So suspending BitLocker must be done through the Suspend-BitLocker cmdlet and using the Reboot Count parameter to specify a number of reboots greater than 2 to keep BitLocker suspended during the firmware update process. A Reboot Count of 0 will suspend BitLocker indefinitely, until BitLocker is resumed through the PowerShell cmdlet Resume-BitLocker or another mechanism.

To suspend BitLocker for installation of TPM or UEFI firmware updates:

  1. Open an administrative PowerShell session.
  2. Enter the following cmdlet and press Enter:

    Suspend-BitLocker -MountPoint "C:" -RebootCount 0

    where C: is the drive assigned to your disk
  3. Install Surface device driver and firmware updates.
  4. Following successful installation of the firmware updates, resume BitLocker by using the Resume-BitLocker cmdlet as follows:

    Resume-BitLocker -MountPoint "C:"

Method 2: Enable Secure Boot and restore default PCR values

We strongly recommend that you restore the default and recommended configuration of Secure Boot and PCR values after BitLocker is suspended to prevent entering BitLocker Recovery when applying future updates to TPM or UEFI firmware.

To enable Secure Boot on a Surface device that has BitLocker enabled:

  1. Suspend BitLocker by using the Suspend-BitLocker cmdlet as described in Method 1.
  2. Boot your Surface device to UEFI by using one of the methods defined in Using Surface UEFI on Surface Laptop, new Surface Pro, Surface Studio, Surface Book, and Surface Pro 4.
  3. Select the Security section.
  4. Click Change Configuration under "Secure Boot."
  5. Select Microsoft Only and click OK.
  6. Select Exit, and then Restart to reboot the device.
  7. Resume BitLocker by using the Resume-BitLocker cmdlet as described in Method 1.

To change the PCR values used to validate BitLocker Drive Encryption:

  1. Disable any Group Policies that configure PCR, or remove the device from any groups where such policies apply. See "Deployment Options" at BitLocker Group Policy Reference for more information.
  2. Suspend BitLocker by using the Suspend-BitLocker cmdlet as described in Method 1.
  3. Resume BitLocker by using the Resume-BitLocker cmdlet as described in Method 1.

Method 3: Remove protectors from the boot drive

If you have installed a TPM or UEFI update and your device is unable to boot, even when the correct BitLocker Recovery Key is entered, you can restore the ability to boot by using the BitLocker recovery key and a Surface recovery image to remove the BitLocker protectors from the boot drive.

To remove the protectors from the boot drive by using your BitLocker recovery key:

  1. Obtain your BitLocker recovery key from go.microsoft.com/fwlink/p/?LinkId=237614, or if BitLocker is managed by other means such as Microsoft BitLocker Administration and Monitoring (MBAM), contact your administrator.
  2. From another computer, download the Surface recovery image from Download a recovery image for your Surface and create a USB recovery drive.
  3. Boot from the USB Surface recovery image drive.
  4. Select your operating system language when you are prompted.
  5. Select your keyboard layout.
  6. Select Troubleshoot.
  7. Select Advanced Options.
  8. Select Command Prompt.
  9. Run the following commands:

    manage-bde -unlock -recoverypassword <password> C:

    manage-bde -protectors -disable C:

    where C: is the drive assigned to your disk and <password> is your BitLocker recovery key as obtained in step 1.


    Note For more information about using this command, see the Microsoft Docs article Manage-bde: unlock.
  10. Reboot the computer.
  11. When you are prompted, enter your BitLocker recovery key as obtained in step 1.

Note After disabling the BitLocker protectors from your boot drive, your device will no longer be protected by BitLocker Drive Encryption. You can re-enable BitLocker by selecting Start, typing Manage BitLocker and pressing Enter to launch the BitLocker Drive Encryption Control Panel applet and following the steps to encrypt your drive.

Method 4: Recover data and reset your device with Surface Bare Metal Recovery (BMR)

To recover data from your Surface device if you are unable to boot into Windows:

  1. Obtain your BitLocker recovery key from https://go.microsoft.com/fwlink/p/?LinkId=237614, or if BitLocker is managed by other means such as Microsoft BitLocker Administration and Monitoring (MBAM), contact your administrator.
  2. From another computer, download the Surface recovery image from Download a recovery image for your Surface and create a USB recovery drive.
  3. Boot from the USB Surface recovery image drive.
  4. Select your operating system language when you are prompted.
  5. Select your keyboard layout.
  6. Select Troubleshoot.
  7. Select Advanced Options.
  8. Select Command Prompt.
  9. Run the following command:

    manage-bde -unlock -recoverypassword <password> C:

    where C: is the drive assigned to your disk and <password> is your BitLocker recovery key as obtained in step 1
  10. After the drive is unlocked, use copy or xcopy commands to copy the user data to another drive.

    Note For more information about the these commands, see the Windows Command Line Reference.

To reset your device by using a Surface recovery image: Follow the instructions in  "How to reset your Surface using your USB recovery drive" at Creating and using a USB recovery drive.

↑ Back to the top


Keywords: kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 4057282
Revision : 46
Created on : 7/19/2019
Published on : 7/19/2019
Exists online : False
Views : 380