Quick fix: BitLocker suspends if it detects boot environment changes (TPM PCR mismatch). Update BIOS or pending Windows Update may trigger. Run manage-bde -protectors -enable C: in Terminal (Admin) to resume protection. For chronic auto-suspends: check Event Viewer for the trigger cause.
BitLocker is enabled. Each boot: protection status shows Suspended. You resume via Control Panel; works fine. Next reboot: Suspended again. The cause is TPM detecting boot environment changes — some setting keeps changing.
Affects: Windows 11 Pro/Enterprise with BitLocker.
Fix time: ~15 minutes.
What causes this
BitLocker uses TPM (Trusted Platform Module) to seal encryption keys against measurements of boot environment (PCRs – Platform Configuration Registers). If any PCR changes between boots, BitLocker assumes tampering and suspends. Common causes: pending firmware update, BIOS setting change, Secure Boot state change, removed/added hardware, Windows Update modifying boot loader.
Method 1: Resume BitLocker and identify trigger
The diagnostic step.
- Open Terminal (Admin).
- Check current status:
manage-bde -status C:Shows Protection Status: Off (Suspended) or On.
- Resume:
manage-bde -protectors -enable C:Protection reactivates with current PCRs.
- Reboot. Re-check status. If suspends again: TPM PCR is still changing.
- Check Event Viewer: Windows Logs → System → filter for source BitLocker-Driver or TPM. Look at recent entries to identify what triggered the suspend.
- Common log messages: “BitLocker has been suspended due to boot configuration change.”
This identifies the cause.
Method 2: Address common triggers
The fixes.
- Pending firmware update: Settings → Windows Update. If firmware update is pending: install it. BitLocker auto-suspends to allow firmware change. After install, won’t recur.
- BIOS setting change: each time you change BIOS settings, PCRs change. Stop changing BIOS settings. If you intentionally changed something: re-enable BitLocker after.
- Secure Boot state: ensure Secure Boot enabled and stays enabled. Disabling/enabling causes PCR change. Verify via msinfo32 → Secure Boot State: On.
- Hardware change: adding/removing TPM, RAM modules, or graphics card can trigger. Stop changing hardware, or accept suspend after changes.
- Windows feature update: feature updates modify boot loader. BitLocker auto-suspends during install, resumes after.
- For chronic recurring issue: clear TPM and re-set BitLocker.
tpm.msc → Clear TPM. Then disable and re-enable BitLocker.
This addresses common causes.
Method 3: Adjust BitLocker PCR profile to be less strict
For advanced users.
- BitLocker monitors specific PCRs by default. Reducing PCRs means less sensitive to changes (less secure but more tolerant).
- Open Group Policy Editor:
gpedit.msc. - Navigate to Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives.
- Open Configure TPM platform validation profile for native UEFI firmware configurations. Set to Enabled.
- Tick which PCRs to validate: by default 0, 2, 4, 11. For more tolerant: untick PCR 7 if it’s the trigger.
- PCR 7 measures Secure Boot State. Untick if you intentionally change Secure Boot. PCR 11 measures BitLocker control. Untick is more lenient.
- Run
gpupdate /force. Reboot. Test. - Trade-off: less PCR validation = less protection against boot tampering. Don’t disable all PCRs.
This is for chronic cases where you accept some security trade-off.
How to verify the fix worked
manage-bde -status C:shows Protection Status: On after each reboot.- Event Viewer: no recent BitLocker-Driver suspend events.
- Settings → System → About → Device encryption (or BitLocker) shows On.
If none of these work
If BitLocker keeps suspending: Failing TPM: TPM may be faulty. tpm.msc shows TPM state. If errors: clear and reinitialize. For BIOS that resets settings: weak CMOS battery causes BIOS settings reset each boot. Replace CMOS battery. For software-related: third-party AV or boot-modifying tools (BIOS tweakers, overclocking utilities) trigger suspends. Uninstall. Last resort — disable BitLocker entirely: if can’t maintain stable. Decrypt drive. Use VeraCrypt as alternative.
Bottom line: manage-bde -protectors -enable C: resumes protection. Identify trigger via Event Viewer. Common causes: pending firmware update, BIOS changes, Secure Boot state. Adjust PCR profile via Group Policy for chronic cases.