Configure use of hardware-based encryption for removable data drives
Jump to overview

Policy overview

Key metadata and intent for this policy.

Computer
Category
Windows Components > BitLocker Drive Encryption > Removable Data Drives
Supported on
At least Windows Server 2012 or Windows 8

Supported OS tags: Windows8, WindowsServer2012

This policy setting allows you to manage BitLocker’s use of hardware-based encryption on removable data drives and specify which encryption algorithms it can use with hardware-based encryption. Using hardware-based encryption can improve performance of drive operations that involve frequent reading or writing of data to the drive. If you enable this policy setting, you can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption and whether you want to restrict the encryption algorithms and cipher suites used with hardware-based encryption. If you disable this policy setting, BitLocker cannot use hardware-based encryption with operating system drives and BitLocker software-based encryption will be used by default when the drive is encrypted. If you do not configure this policy setting, BitLocker will use software-based encryption irrespective of hardware-based encryption availability. Note: The “Choose drive encryption method and cipher strength” policy setting does not apply to hardware-based encryption. The encryption algorithm used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm configured on the drive to encrypt the drive. The “Restrict encryption algorithms and cipher suites allowed for hardware-based encryption” option enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm set for the drive is not available, BitLocker will disable the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID). For example: - AES 128 in CBC mode OID: 2.16.840.1.101.3.4.1.2 - AES 256 in CBC mode OID: 2.16.840.1.101.3.4.1.42

Internal name
RDVEDrive_Name
Policy ID
ef39def32293
Elements
3

Registry values

How enabled and disabled states update the registry.

ScopeRegistry locationTypeEnabled valueDisabled valueCopy
Computer
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVHardwareEncryption
REG_DWORD
HKLM
1
HKLM
0
Registry location
Type REG_DWORD · Computer
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVHardwareEncryption
Hive
HKLM
Enabled value
1
Disabled value
0

Policy elements

Inputs and configuration options exposed by this policy.

ScopeElementTypeRegistry mappingConstraints & behaviorCopy
Computer
Restrict crypto algorithms or cipher suites to the following:
ID RDVAllowedAlgos
text
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVAllowedHardwareEncryptionAlgorithms
Type
REG_SZ
None
Computer
Use BitLocker software-based encryption when hardware encryption is not available
ID RDVUseSW
boolean
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVAllowSoftwareEncryptionFailover
Type
REG_DWORD
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Computer
Restrict encryption algorithms and cipher suites allowed for hardware-based encryption
ID RDVRestrictAlgos
boolean
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVRestrictHardwareEncryptionAlgorithms
Type
REG_DWORD
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Restrict crypto algorithms or cipher suites to the following:
Computer · Type text
Registry mapping
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVAllowedHardwareEncryptionAlgorithms
Type
REG_SZ
DetailsNone
Use BitLocker software-based encryption when hardware encryption is not available
Computer · Type boolean
Registry mapping
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVAllowSoftwareEncryptionFailover
Type
REG_DWORD
Details
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Restrict encryption algorithms and cipher suites allowed for hardware-based encryption
Computer · Type boolean
Registry mapping
Path
SOFTWARE\Policies\Microsoft\FVE
Value name
RDVRestrictHardwareEncryptionAlgorithms
Type
REG_DWORD
Details
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0