Quick fix: Open Command Prompt (Admin). Run: manage-bde -protectors -disable C: -RebootCount 1. BitLocker suspends until the next reboot, then auto-re-enables. For multi-reboot maintenance: -RebootCount 3 (3 reboots before auto-re-enable). For permanent suspend: omit RebootCount. To resume manually: manage-bde -protectors -enable C:.
BitLocker protects the drive but locks the boot environment to specific TPM measurements. Before hardware changes (motherboard, TPM, BIOS update), suspend BitLocker so it doesn’t trigger recovery prompts. After the change, re-enable.
Affects: Windows 11 Pro/Enterprise with BitLocker.
Fix time: ~5 minutes (plus maintenance time).
What causes this need
BitLocker uses TPM measurements (PCRs) to validate boot environment. After BIOS update, firmware change, motherboard replacement, or hardware reconfiguration, PCRs change. BitLocker detects this as “tampering” and demands recovery key on next boot. Annoying if you have to enter 48 digits. Suspending BitLocker first avoids this.
Method 1: Suspend via manage-bde with reboot count
The standard route.
- Open Command Prompt (Admin).
- Suspend with auto-resume after 1 reboot:
manage-bde -protectors -disable C: -RebootCount 1After the next reboot, BitLocker auto-resumes.
- For BIOS update needing multiple reboots: use
-RebootCount 3(or higher). - For maintenance lasting days: omit
-RebootCount. Suspends permanently. Run resume command afterward. - Verify status:
manage-bde -status C:. Protection Status: Off (Suspended). - Now perform hardware maintenance. Boot will proceed without recovery prompt.
- Resume manually if used permanent suspend:
manage-bde -protectors -enable C: - Status: Protection Status: On.
This is the standard usage.
Method 2: Suspend via PowerShell
For scripting.
- Open PowerShell (Admin).
- Suspend with reboot count:
Suspend-BitLocker -MountPoint "C:" -RebootCount 1 - For permanent suspend:
Suspend-BitLocker -MountPoint "C:" -RebootCount 0. - Resume:
Resume-BitLocker -MountPoint "C:". - Status:
Get-BitLockerVolume -MountPoint "C:". Look at ProtectionStatus. - For multiple drives: loop through Get-BitLockerVolume and call Suspend-BitLocker on each.
- For scheduled maintenance script:
Suspend-BitLocker -MountPoint "C:" -RebootCount 5 Write-Host "BitLocker suspended for 5 reboots; perform maintenance now" - Confirm with the user. Auto-resume happens after the reboot count is exhausted.
This is the PowerShell route.
Method 3: Suspend via Control Panel UI
For GUI users.
- Open Control Panel → BitLocker Drive Encryption.
- For the encrypted drive (usually C:), click Suspend protection.
- Confirmation dialog: warns that BitLocker protection will be suspended. Click Yes.
- Status changes to Suspended.
- Note: GUI suspend is “permanent until manually resumed.” No reboot count option.
- After hardware maintenance: click Resume protection. Status: On.
- For corporate-managed PCs: BitLocker may be managed by Intune / SCCM. Disable via management console instead.
- For UEFI firmware update tools: some BIOS update utilities suspend BitLocker automatically. Check vendor docs.
This is the GUI route.
How to verify the fix worked
manage-bde -status C:shows Protection Status: Off (Suspended).- Reboot — PC boots without recovery key prompt.
- If used reboot count: count decrements each reboot until 0 → auto-resume.
- After resume:
manage-bde -status C:shows Protection Status: On.
If none of these work
If suspend fails: Permission denied: must run as Admin. Suspended already: check status. For dual-drive encryption: each drive suspends independently. Use separate commands for D:, E:. For Windows Home with Device Encryption: same manage-bde commands work. For BitLocker on Server: similar; with potential cluster-aware adjustments. For chronic suspension after each update: TPM detecting changes you didn’t intend. Update vendor BIOS to latest. For lost recovery key after suspend: re-print recovery key from aka.ms/myrecoverykey if linked to Microsoft account. Auto-Unlock with another drive: maintain auto-unlock during suspension; resume re-validates.
Bottom line: manage-bde -protectors -disable C: -RebootCount 1 in Admin Command Prompt. Or PowerShell Suspend-BitLocker -MountPoint "C:" -RebootCount 1. Avoid recovery key prompts during BIOS / hardware changes.