Wiki source code of PIN wird nicht erstellt (Pre-Boot-Tastatur wird nicht gefunden)
Last modified by Sabrina V. on 2025/05/05 09:27
Show last authors
| author | version | line-number | content |
|---|---|---|---|
| 1 | {{aagon.priorisierung}} | ||
| 2 | 160 | ||
| 3 | {{/aagon.priorisierung}} | ||
| 4 | |||
| 5 | {{aagon.floatingbox/}} | ||
| 6 | |||
| 7 | = Initial situation = | ||
| 8 | |||
| 9 | When BitLocker is enabled on a tablet with a startup PIN, you may experience the following difficulties because: | ||
| 10 | |||
| 11 | 1. the PIN is not prompted at startup, | ||
| 12 | 1. the key protectors are no longer enabled after the restart, and | ||
| 13 | 1. the PIN, which must be entered and saved by the user, must be reassigned each time the system is restarted. | ||
| 14 | |||
| 15 | A keyboard is required to enter the PIN when the system is rebooted. If no keyboard is recognised on the first reboot after the key guard //PIN// has been created, the key guard will be deleted from the system. This is necessary so that the user is not locked out. | ||
| 16 | |||
| 17 | Mobile devices rarely have a keyboard attached, so a pre-boot keyboard is required. The pre-boot keyboard may be disabled and needs to be enabled via Group Policy „//Enable the use of BitLocker authentication with required keyboard entry before booting on slates//“. | ||
| 18 | |||
| 19 | == To configure via Group Policy == | ||
| 20 | |||
| 21 | 1. Open Group Policy Editor and navigate to //Computer Configuration //> //Administrative Templates //> //Windows Components// > //BitLocker Drive Encryption// > //Operating System Drives//. | ||
| 22 | 1. Open the „Enable use of BitLocker authentification with required keyboard input before booting on slates“. | ||
| 23 | |||
| 24 | {{figure}} | ||
| 25 | [[image:66_BitLocker Use Case_Editor für lokale Gruppenrichtlinien_1538.png||data-xwiki-image-style-alignment="center"]] | ||
| 26 | |||
| 27 | {{figureCaption}} | ||
| 28 | Setting local Group Policies for operating system drives | ||
| 29 | {{/figureCaption}} | ||
| 30 | {{/figure}} | ||
| 31 | |||
| 32 | 3. Click the Enabled radio button, then click //Apply //and //OK //to save the changes. | ||
| 33 | |||
| 34 | {{figure}} | ||
| 35 | [[image:66_BitLocker Use Case_Verwendung der BitLocker-Authentifizierung_686.png||data-xwiki-image-style-alignment="center"]] | ||
| 36 | |||
| 37 | {{figureCaption}} | ||
| 38 | Enabled BitLocker authentication settings | ||
| 39 | {{/figureCaption}} | ||
| 40 | {{/figure}} | ||
| 41 | |||
| 42 | 4. If the PIN is enabled, it is not possible to enter the PIN using the pre-boot keyboard at startup. | ||
| 43 | |||
| 44 | == Alternative: Enabling Group Policy via the registry == | ||
| 45 | |||
| 46 | If you prefer to customise Group Policy or settings via the registry value, follow these steps: | ||
| 47 | |||
| 48 | 1. Open Registry Editor and navigate to //HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\FVE//. | ||
| 49 | 1. Create a 32-bit DWORD value with the name „//OSEnablePrebootInputProtectorsOnSlates“ //and the value „1“. | ||
| 50 | |||
| 51 | {{figure}} | ||
| 52 | [[image:66_BitLocker Use Case_Registry Wert eintragen_938.png||data-xwiki-image-style-alignment="center"]] | ||
| 53 | |||
| 54 | {{figureCaption}} | ||
| 55 | Customise the registry value | ||
| 56 | {{/figureCaption}} | ||
| 57 | {{/figure}} | ||
| 58 | |||
| 59 | 3. The adjusted registry value will be taken into account the next time the system is rebooted. |

