Skip to main content

Check In Depth Details Of BitLocker Drives

Whether you're operating In a work environment, or have a network setup at home with multiple computers and virtual machines up and running, It's Important to protect your sensitive data by using BitLocker Drive Encryption. As such, sometimes there Is the need to check the status of the encrypted drives or partitions, particularly when Implementing changes. In this tutorial, I will show you how to check In depth details of BitLocker encrypted drives.

It's not a simple task to keep track of every device and It's hardware components that's running on your network, and If you've applied BitLocker Drive Encryption on selected drives with different configurations and user authentication types, It's Important to keep track of their status.

For Instance, you may wish to know If a fixed data drive Is currently locked and the type of authentication used to unlock It (such as a password or smart card), as well as It's storage capacity and encryption method used. If you're running a network on a large scale, physically checking each drive can be a somewhat arduous task.

To simplify this, I will demonstrate how to view such details, by using both the Windows Command Prompt and PowerShell. As you're aware, BitLocker Is only available In Windows 10 Pro, Enterprise and Education editions. So without further ado, let's rip Into this tutorial.

Step One:

Firstly, I'll use the Command Prompt that must be executed with elevated privileges. To do this, enter cmd In the search box, right-click on the search result at the top, and select Run as administrator as shown below.

Step Two:

Here's my BitLocker drive that's currently unlocked. We'll see the details In the next couple of steps.

Step Three:

Now enter the following command Into the Command Prompt.
manage-bde -status E:

Leave the manage-bde - status as Is, and replace E: with the drive letter of your BitLocker encrypted drive. Your command should look similar to mine. When done, hit Enter on your keyboard.

Step Four:

As you can see In my example below, It's returned quite a few details, such as the volume size, Lock Status, and the type of authentication used, namely a password.

Step Five:

I've now locked my drive, and executed the same command as per Step Three above. The Lock Status Is displayed as exactly that (Locked), and a few Unknown entries have been returned. That's because my BitLocker drive Is Locked, and the command cannot read It's respective status.

Step Six:

Let's see the results, when checking a drive not protected by BitLocker. I've ran the command against my OS Drive and as you can see, the Conversion Status Is accordingly returned as Fully Decrypted. The None Found entry In Key Protectors, confirms that BitLocker has not been applied.

Step Seven:

Now let's use PowerShell. As with the Command Prompt, It must be executed with admin rights. Enter powershell In the search box, right-click on the search result at the top and hit Run as administrator.

Step Eight:

Then enter the following command.
Get-BitLockerVolume -MountPoint "E:"

Leave the Get-BitLockerVolume -MountPoint as Is, substitute "E:" with the drive letter of your BitLocker encrypted drive, and hit Enter. In my case, It's returned the status as FullyEncrypted.

Last Step:

Upon executing the same command on my OS Drive that's not protected by BitLocker, as expected, It's status Is FullyDecrypted.

Final Thoughts:

You can use both the Command Prompt and PowerShell, to not only check the status of your BitLocker encrypted drives, but also Identify those that have not yet been encrypted. Given the commands only take a few seconds to execute and return the results, this comes to very good use when dealing with a large number of drives and partitions. Be sure to always run the commands with administrator privileges.


Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key , that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Check Faulty Drivers In Windows 10

For hardware devices to function properly, they must have device drivers  Installed, thus allow them to perform at their optimal state. It's all well and good when they're running without error, but they do tend to fail at the best of times, which can cause system Instability and/or loss of functionality. It can be a difficult task pinpointing the problematic driver(s), so In this tutorial, I will show you how to check faulty drivers , without the aid of third-party tools.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.