How to use Hardware Bitlocker with a Samsung Pro 980 SSD.
Prequisites
Step by Step Directions
Hardware
Take a picture of its label before installation in case you need the 32 character PSID Install the Samsung 980 Pro into your computer. I'm using an Alienware x14 to do this.
Boot into Windows to Go
Install Samsung SSD Magician if you haven't already.
Run Magician and select the 980 Pro at the top
If you've used this drive before and want to do a full reset, use the PSID Revert tool to do that. You will need the 32 character code from the SSD's label. This will reset the SSD's encryption status to
Ready to enable
Click the Encrypted Drive at the bottom left to switch to that tab.
If it's not already ready enable, click the option set that.
Shutdown Windows To Go, remove the WTG USB drive
Go to BIOS Setup
- Disable Secure Boot
- Be sure SATA/NVMe is set to ACHI
Boot into Samsung Secure Erase
- Type
y
to accept the warning - Choose the SSD to erase
- Confirm the secure erase
If you get Error 29
, you need to use the PSID Revert tool in Magician to completely reset the drive to factory settings
Go to BIOS Setup
- Enabled Secure Boot again, if desired.
- Look under the Security section in the BIOS for an option called “Disable Block SID”. It will probably be set to Disabled. Set it to Enabled.
- My Alienware x14 has an option called
PPI Bypass for SED Block ID Command
I set that to enabled. - If you're not sure or you want to be certain, use the next section to set it inside of Windows To Go
(Optional, if necessary) Boot into Windows To Go
I prefer to do this route as I'm more certain the correct option is being set to allow the hardware encryption to proceed. Some of my computers have a BIOS setting and some do not.
If you're certain your BIOS setting works as expected, than you can skip this section and go to the next one.
Start Powershell or Terminal as Admin
Execute this command
$tpm = gwmi -n root\cimv2\security\microsofttpm win32_tpm
- Then, execute this command
$tpm.SetPhysicalPresenceRequest(97)
- Shutdown WTG and insert the installation USB drive.
On the next boot the POST screen may alert you that "a configuration change was requested issuing a Block SID command". This is a good sign! My computer required me to push F10 to accept this change.
Windows Setup
Go through setup until you get to the screen where setup asks
Is this the right country or region?
Press
Shift-F10
to open a command promptConfirm the status of the c: drive: \
psmanage-bde -status c:
It should say
Protection Off
Enable protection with hardware encryption \
psmanage-bde -on c: -fet Hardware
You need to reboot to get past the hardware encryption test
shutdown /r /t 0
When you get back to the
Is this the right country or region?
screen, pressShift-F10
again to open the command line.manage-bde -status c:
now showsConversion Status: Fully Encrypted Encryption Method: Hardware Encryption Protection Status: Protection On
What about group policy?
By doing it here, you get Bitlocker set up prior to the group policy prohibiting hardware enceyption goes into effect.
You would still need to enable the group policy to enable bitlocker hardware encryption for any other drives you might add after installation though.
To keep this page shorter, I've moved that process to a separate page
Enable Bitlocker Hardware Encryption in Group Policy
WARNING
Because we did this with the command line, the BitLocker UI will not store a recovery password in your Microsoft account.
Please be sure to create one and store it somewhere safely
Create your recovery password
manage-bde -protectors -add C: -RecoveryPassword
This command will create and display the Recovery Password for you. Be sure to save it.
- If you want to store the recovery in your Microsoft account, you can now do this in the UI after running that command.
(Optional) Re-enable SID Block
If the POST screen told you that the disable "Block SID" config is persistent (and not for just one boot), then you need enable it again. Either in the BIOS (where you disabled it before) or via Windows Powershell. The computers I've tested this on all said one boot.
$tpm = gwmi -n root\cimv2\security\microsofttpm win32_tpm
$tpm.SetPhysicalPresenceRequest(96)
Credits
Frederick Odental with some changes to enable during setup