Begin here with a direct answer: if BitLocker won’t enable or unlock, the most common cause is a configuration or hardware mismatch: either BitLocker isn’t available for your Windows edition or the platform requirements (TPM, system partition, boot mode, policies) aren’t met. This article addresses BitLocker doesn’t work in Windows 10, explains typical causes, and gives step‑by‑step fixes.
You’ll learn how to check edition and TPM status, fix partition and boot issues, adjust Group Policy and services, recover keys, and avoid common pitfalls so BitLocker can be enabled or recover normally.
Key Takeaway
If BitLocker fails, start by confirming your Windows edition and TPM status; most problems are resolved by enabling TPM in firmware, creating/fixing the system partition, or adjusting Group Policy—use the provided step‑by‑step checks and commands to identify and correct the specific cause.
Quick Fix Guide
Quick Fix Guide
Reason for the Problem | Quick Solution |
---|---|
1. Windows edition doesn’t support BitLocker | Upgrade to Windows 10 Pro/Enterprise/Education or use device encryption alternatives. |
2. TPM missing or disabled | Enable TPM in BIOS/UEFI or install a compatible TPM module. |
3. TPM not initialized/owned | Initialize TPM with tpm.msc or use TPM.msc → Prepare the TPM. |
4. Group Policy prevents BitLocker | Run gpedit.msc and change BitLocker policies under Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption. |
5. No proper system partition | Create/repair the 100 MB/ESP system partition using diskpart and bcdboot. |
6. BitLocker service issues | Enable and start BitLocker Drive Encryption Service (if present) and ensure Cryptographic Services are running. |
7. BIOS/UEFI incompatible settings | Switch to UEFI + Secure Boot and set correct SATA mode (AHCI) if required. |
8. Outdated drivers (storage/Intel RST) | Update storage and chipset drivers from OEM or disable RAID drivers temporarily. |
9. MBR/GPT mismatch | Convert drive to GPT for UEFI or ensure BIOS uses Legacy for MBR using mbr2gpt (careful, backup first). |
10. Insufficient system reserved space | Increase size or recreate system reserved partition (100–550 MB) and set it active. |
11. Conflicting disk encryption | Fully decrypt other tools or remove conflicting encryption before enabling BitLocker. |
12. Frequent recovery prompts after updates/hardware changes | Update TPM firmware, add recovery keys to Microsoft account, and avoid changing boot configuration. |
13. Corrupt BitLocker metadata / key protectors | Use manage-bde commands to remove/recreate protectors or restore keys from backup. |
Detailed Fixes for “BitLocker doesn’t work in Windows 10”
Below are the 13 detailed reasons with explanations and step‑by‑step solutions.
1. Windows edition doesn’t support BitLocker
Why this causes the problem
- BitLocker full-disk encryption is only included in Windows 10 Pro, Enterprise, and Education. Windows 10 Home doesn’t include the full BitLocker management UI (though some devices have Device Encryption).
Step-by-step solution
- Check your edition: open Settings → System → About and look at Windows specifications → Edition.
- If you have Home, consider upgrading: open Settings → Update & Security → Activation → Go to Store and select an upgrade to Pro.
- As an alternative, check if “Device encryption” is available: Settings → Update & Security → Device encryption. If present, enable it (less configurable than BitLocker).
Note: Back up your data before an edition upgrade.
2. TPM missing or disabled
Why this causes the problem
- BitLocker typically requires a TPM (Trusted Platform Module) to store keys securely. If the system lacks a TPM or it is disabled in firmware, BitLocker options may be unavailable or require USB key mode.
Step-by-step solution
- Check TPM presence: press Windows Key + R, run tpm.msc. If you see “Compatible TPM cannot be found,” TPM is missing or disabled.
- Enter firmware (BIOS/UEFI): restart and press the OEM key (F2, Delete, Esc, F10 depending on manufacturer).
- In firmware, look for Security → TPM, PTT, or TPM Security and enable it. Save and exit.
- On Windows boot, re-run tpm.msc and follow prompts to prepare/initialize TPM.
Tip: Some Intel systems call it Intel PTT; enabling that is equivalent to TPM.
3. TPM not initialized or owned
Why this causes the problem
- The TPM may be present but not “owned” (initialized), so BitLocker cannot store protectors.
Step-by-step solution
- Open tpm.msc. If it shows TPM is not ready, click Initialize TPM or use the option to Prepare the TPM.
- If initialization fails due to ownership, you may need to clear TPM first from BIOS and reinitialize (this will delete TPM keys—back up recovery keys first).
- From an elevated command prompt run: manage-bde -status to check protector state.
Note: Clearing TPM will invalidate existing BitLocker protectors—ensure you have recovery keys.
4. Group Policy prevents BitLocker or requires extra authentication
Why this causes the problem
- Local or domain Group Policy can disable BitLocker features or require TPM+PIN/USB, blocking normal enablement.
Step-by-step solution
- Open Local Group Policy Editor: Windows Key + R → gpedit.msc.
- Navigate to Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption.
- Check policies such as Require additional authentication at startup. If enabled and set to require TPM+PIN or USB, either meet that requirement or set to “Allow BitLocker without a compatible TPM” if you’ll use a USB key.
- After changes, refresh policies: open elevated command prompt and run gpupdate /force.
Note: On domain-joined machines, check domain Group Policy with your IT admin.
5. Missing or incorrect system partition (ESP or System Reserved)
Why this causes the problem
- BitLocker needs a separate unencrypted system partition (EFI System Partition or 100 MB System Reserved) to boot before unlocking the OS drive. If it’s missing, not active, or too small, BitLocker setup can fail.
Step-by-step solution
- Open an elevated PowerShell or CMD and run diskpart, then list disk, select disk 0, list partition to view partitions.
- If there is no small System Reserved or EFI partition (100–550 MB), create or repair it:
- Shrink the OS partition using Disk Management: right-click Start → Disk Management → C: → Shrink Volume. Leave ~200–500 MB.
- Use diskpart to create a partition: create partition primary size=300, format fs=ntfs label=”System Reserved” quick, active (for BIOS/MBR) or format as FAT32 and assign right GUID for EFI on GPT.
- Recreate boot files for Windows: run elevated bcdboot C:\Windows /s
/f ALL . - Try enabling BitLocker again.
Tip: On UEFI systems the ESP should be FAT32 ~100–300 MB; use mountvol or Disk Management to identify.
Why this causes the problem
- BitLocker depends on services such as Cryptographic Services and the BitLocker driver. If services are disabled, operations fail.
Step-by-step solution
- Open Services: Windows Key + R → services.msc.
- Ensure Cryptographic Services is Automatic and Running.
- For older systems, check BitLocker Drive Encryption Service if present and set to Manual or Automatic. Right-click → Start.
- Reboot if needed and retry.
7. BIOS/UEFI incompatible settings (Legacy mode, Secure Boot off, SATA mode)
Why this causes the problem
- Boot mode and SATA controller modes affect BitLocker and TPM behavior. A mismatch between firmware mode and disk partitioning (UEFI + GPT vs Legacy + MBR) will block normal setup.
Step-by-step solution
- Determine boot mode: press Windows Key + R → msinfo32. Look at BIOS Mode (UEFI or Legacy).
- If UEFI is required but BIOS is set to Legacy, switch to UEFI in firmware (requires GPT partitioning).
- Ensure Secure Boot is enabled for maximum compatibility with TPM and BitLocker (firmware setting).
- For SATA controllers, prefer AHCI over RAID/Intel RST during setup. If changing from RAID to AHCI, follow Microsoft’s recommended procedure to avoid BSOD (set safe mode, change driver, reboot).
Warning: Changing boot mode or controller settings can prevent boot—backup and have recovery media.
8. Outdated or incompatible storage drivers (Intel RST, RAID)
Why this causes the problem
- Storage drivers, especially RAID or Intel Rapid Storage Technology (RST), can interfere with BitLocker and cause recovery prompts or failed encryption.
Step-by-step solution
- Open Device Manager (devmgmt.msc). Expand IDE ATA/ATAPI controllers and Storage controllers.
- Update drivers from your PC manufacturer or Intel/AMD support site. Prefer WHQL-certified drivers.
- If using Intel RST and experiencing issues, try switching to the Microsoft AHCI driver temporarily (ensure you follow vendor guidance to avoid boot problems).
- Re-enable BitLocker after driver update.
9. MBR/GPT mismatch and conversion issues
Why this causes the problem
- BitLocker on UEFI requires GPT. If your disk layout (MBR/GPT) doesn’t match firmware boot mode, BitLocker won’t enable or will force recovery.
Step-by-step solution
- Check partition style: open Disk Management → right-click disk → Properties → Volumes → Partition style (Master Boot Record or GUID Partition Table).
- If BIOS Mode is UEFI but disk is MBR, use mbr2gpt.exe (Windows 10 v1703+). Steps:
- Backup data.
- Open elevated command prompt: mbr2gpt /validate /disk:0 /allowFullOS
- If validated: mbr2gpt /convert /disk:0 /allowFullOS
- After conversion, ensure firmware is set to UEFI and reboot.
Warning: Always backup before conversion.
10. Insufficient space on system reserved partition
Why this causes the problem
- The system reserved partition must have enough free space to host boot files and BitLocker metadata. Too small or full partitions prevent setup.
Step-by-step solution
- Identify the system partition and its free space using Disk Management or diskpart.
- If under ~100 MB free, enlarge the partition by shrinking adjacent partition in Disk Management and moving space using a partition tool (use caution and backup).
- Alternatively, recreate the system partition with recommended size (100–550 MB) and restore boot files using bcdboot C:\Windows /s S: /f ALL.
Note: Third-party partition editors may be easier.
11. Conflicting third‑party encryption or security software
Why this causes the problem
- Other disk encryption tools or security suites that intercept disk access can conflict with BitLocker.
Step-by-step solution
- Identify installed encryption: check installed programs and disable or fully decrypt disks using vendor tools.
- Uninstall conflicting software or ensure it is compatible with BitLocker.
- Reboot and attempt BitLocker enablement again.
12. BitLocker recovery prompts after updates or hardware changes
Why this causes the problem
- Hardware changes (BIOS update, disk firmware, TPM firmware) or updates may change measurements and trigger recovery. Frequent prompts indicate conservative TPM policy or missing recovery key backup.
Step-by-step solution
- Ensure recovery keys are backed up: open Control Panel → BitLocker Drive Encryption → Back up your recovery key → Save to your Microsoft account / file / print.
- Add additional protectors: manage-bde -protectors -add C: -TPMAndPIN (example for TPM+PIN).
- Update TPM firmware carefully using vendor instructions.
- If recovery prompts occur after planned updates, suspend BitLocker before updating: manage-bde -protectors -disable C: or Suspend Protection in Control Panel, then re-enable after update.
Tip: Always suspend BitLocker before BIOS/UEFI updates.
13. Corrupted BitLocker metadata or invalid key protectors
Why this causes the problem
- Corrupted metadata or broken key protectors prevent unlocking or re-enabling BitLocker.
Step-by-step solution
- Check BitLocker status: open elevated command prompt and run manage-bde -status.
- List protectors: manage-bde -protectors -get C:. Note protector IDs and key types.
- If a protector is invalid, you can remove and re-add protectors:
- Remove: manage-bde -protectors -delete C: -id
- Add new protector (TPM): manage-bde -protectors -add C: -tpm
- Add recovery key backup: manage-bde -protectors -add C: -rk
- Remove: manage-bde -protectors -delete C: -id
- If BitLocker metadata is corrupted and the drive won’t unlock, use recovery key to unlock: manage-bde -unlock C: -RecoveryPassword
then decrypt if needed: manage-bde -off C:.
Warning: If no recovery key exists, data recovery may be impossible; check Microsoft account, Active Directory, or Azure AD backups.
Backing Up and Recovering BitLocker Keys (section ajouté)
Why this is necessary
- Having a recovery key prevents permanent data loss if BitLocker triggers recovery or the TPM is cleared.
How to back up your key
- Microsoft account: If signed in with a Microsoft account, keys may be auto‑backed up to https://account.microsoft.com/devices/recoverykey.
- Save to file: Control Panel → BitLocker Drive Encryption → Back up your recovery key → Save to a file (store on separate USB or external drive).
- Print the key: choose Print the recovery key and store offline.
- Domain/Azure AD: Domain-joined machines can store keys in Active Directory; Azure AD joined devices back up keys to the tenant.
How to recover
- For local recovery, use the printed or saved recovery key: at BitLocker recovery screen enter the 48-digit key.
- Using manage-bde: manage-bde -unlock C: -RecoveryPassword <48-digit-key> then manage-bde -protectors -add C: -tpm to restore normal unlock.
- If key stored in AD/Azure, contact IT or look in Azure AD device blade to retrieve.
Tip: Keep two copies—one offline, one in a secure cloud or AD store.
FAQ
Q: Can I enable BitLocker on Windows 10 Home?
A: Windows 10 Home does not include full BitLocker; upgrade to Pro/Enterprise or use the built‑in Device Encryption if available on your device.
Q: How can I find my BitLocker recovery key if I lost it?
A: Check your Microsoft account online, Active Directory (if domain-joined), Azure AD device settings, printed copies, or files you previously exported. Without the recovery key, you may not be able to unlock the drive.
Q: Is it safe to delete TPM keys or clear the TPM to fix problems?
A: Clearing TPM deletes keys stored in the module, which can prevent unlocking BitLocker-protected drives; only clear TPM if you have backed up recovery keys and understand the impact.
Q: Will enabling Secure Boot break BitLocker?
A: Enabling Secure Boot by itself shouldn’t break BitLocker, but changing boot configuration after enabling BitLocker will trigger recovery prompts unless you suspend protection first.
Q: What advanced tools help repair boot partitions for BitLocker?
A: Use bcdboot, bootrec, diskpart, and mbr2gpt (with caution). Always backup data before changing partitions or boot records.
Conclusion
Most BitLocker failures are caused by edition restrictions, TPM and firmware mismatches, missing system partitions, or Group Policy/settings issues; following the checks and step‑by‑step fixes above will resolve the majority of cases. If you follow best practices—enable TPM in firmware, back up recovery keys, and verify boot/partition configuration—you’ll avoid most problems with BitLocker doesn’t work in Windows 10.