If you’re an IT administrator and want to prevent your clients from turning off BitLocker encryption or decrypting their drives, this article is for you. Note that if the client’s account is a standard account, it can’t turn off BitLocker as the decrypting process requires administrative privileges. So if you change user account type to standard user, you can prevent turning off BiLocker from your clients.

However, if client’s account have admin privileges, they can simply turn off BitLocker and decrypt their drive. To prevent this, you can create an AppLocker rule and deploy it to client’s machine. Here is the how-to part:

How To Prevent Administrators From Turning Off BitLocker In Windows 10/8.1/7

1. Open Services snap-in by running services.msc command.

2. In Services snap-in, make sure Application Identity service is running. You can right click on this service and select Start, if it isn’t running.

How To Prevent Administrators From Turning Off BitLocker

3. Then press W8K + R and put secpol.msc in Run dialog box to open Security Policy snap-in. Click OK.

4. Next, in the Security Policy snap-in window, navigate here:

Security Settings > Application Control Policies > AppLocker > Executable Rules

5. Right click on Executable Rules, select Create New Rule.

How To Prevent Administrators From Turning Off BitLocker

6. Under Create Executable Rules, on Permissions tab, select Action Deny. Then select the administrator accounts or users which you want to prevent turning off BitLocker. Click Next.

How To Prevent Administrators From Turning Off BitLocker

7. On the next section, select Publisher and click Next.

How To Prevent Administrators From Turning Off BitLocker

8. Under Publisher, browse to C:\Windows\System32 and select manage-bde.exe file. Click Next.

How To Prevent Administrators From Turning Off BitLocker

9. Under Name, provide a justified description and click Create.

How To Prevent Administrators From Turning Off BitLocker

10. Then for AppLocker warning prompt, click Yes.

How To Prevent Administrators From Turning Off BitLocker

11. Finally, we’ve created the rule to prevent administrators from turning off BitLocker.

How To Prevent Administrators From Turning Off BitLocker

12. Close Security Policy snap-in and run gpupdate /force command to update machine policies on client system.

Now when administrators or users try to turn off BitLocker, they should get Access denied error as the policy is controlled by Group Policy. However, clients can still turn on BitLocker as usual, but can’t turn it off.

Check this video to illustrate above steps:

That’s it!

8 Comments

Add your comment

  • Tom Klaver

    Hi Kapil, but what about the local admin user disabling the AppLocker Policy?

  • Kapil Arya

    ^^ Tom, if you’re deploying this policy via DC, local admin users may not able to suppress it.

  • Thomas

    Hi Kapil, I just try you method. Seems it no longer work today. The local admins can still disable the bitlocker even with the policy. Do you have any update on this method? Thanks.

  • Kapil Arya

    ^^ Are you Windows 11 or 10? Have you tried the steps exactly?

  • Thomas

    Hi Kapil, I am using Windows 10 and I followed all your steps exactly. When I test it with local admin, it doesn’t reject me and just starts to decrypt

  • Kapil Arya

    ^^ Check step 6, make sure you select Deny and added correct group/users.

  • Thomas

    Hi Kapil, no matter I select the built in Administrators group or the built in user Administrator in step 6, I can decrypt using the built in user Administrator.

  • Kanhaiya Prasad

    How to enable bitlocker command for certain users via GPO?

  • Leave a Reply

    Your email address will not be published. Required fields are marked *