SNSSimple Network Solutions
Article complete
IT Guides10 min readApril 16, 2026

How to Enable BitLocker on Windows 11: Complete Step-by-Step Guide

BitLocker encrypts your entire drive so that if your laptop is lost or stolen, nobody can read your files — even by pulling the drive out and plugging it into another computer. Here is how to turn it on, back up your recovery key, and verify it is working correctly on Windows 11.

MD

Marco Delgado

Senior Cybersecurity Specialist · Simple Network Solutions

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

CybersecurityPenetration TestingHIPAA/FINRA ComplianceIncident Response
How to Enable BitLocker on Windows 11: Complete Step-by-Step Guide

BitLocker is Windows' built-in full-disk encryption tool. When it is enabled, every file on your drive is encrypted using AES-256 — the same encryption standard used by banks and government agencies. If your laptop is lost, stolen, or someone tries to access your drive by removing it and connecting it to another computer, they see nothing but unreadable encrypted data. For businesses handling client information, financial records, or any sensitive data, BitLocker is not optional — it is a baseline security requirement. This guide walks you through enabling it on Windows 11, step by step.

Before you start: BitLocker is available on Windows 11 Pro, Enterprise, and Education editions. Windows 11 Home includes a limited version called "Device Encryption" (covered in Method 2 below). To check your edition, press Windows key + I → System → About and look at "Windows specifications."

What You Need Before Enabling BitLocker

  • A Trusted Platform Module (TPM) chip version 1.2 or later — most computers made after 2016 have this. BitLocker uses the TPM to store the encryption key securely.
  • Administrator access to the computer — you must be logged in as an administrator.
  • A way to save your recovery key — you will need this if you ever forget your PIN or the TPM fails. Options: save to your Microsoft account, save to a USB drive, save to a file, or print it.
  • Sufficient battery charge or a power connection — encryption takes time and you do not want the process interrupted.

How to Check If Your Computer Has a TPM

Get monthly IT tips for Miami businesses

No spam · Unsubscribe anytime · Practical advice only

  1. 1Press Windows key + R to open the Run dialog.
  2. 2Type tpm.msc and press Enter.
  3. 3The TPM Management console will open. If it shows "The TPM is ready for use" with a version number (1.2 or 2.0), you are good to go.
  4. 4If it says "Compatible TPM cannot be found," your computer either does not have a TPM or it is disabled in the BIOS/UEFI. Check your computer manufacturer's documentation for how to enable it in BIOS settings.

Method 1: Enable BitLocker Through Windows Settings (Recommended)

This is the simplest method and works on Windows 11 Pro, Enterprise, and Education.

  1. 1Press Windows key + I to open Settings.
  2. 2Click Privacy & security in the left sidebar.
  3. 3Scroll down and click Device encryption. If you see a toggle here, your device supports Device Encryption (see Method 2). If you see "BitLocker drive encryption," click it to proceed.
  4. 4On the BitLocker Drive Encryption page, find your C: drive (labeled "Operating system drive") and click "Turn on BitLocker."
  5. 5Windows will check your system for compatibility. If your TPM is not activated, you may be prompted to restart to enable it.
  6. 6On the "How do you want to back up your recovery key?" screen, choose one of the following options: "Save to your Microsoft account" (easiest — accessible from account.microsoft.com), "Save to a USB flash drive" (requires a spare USB drive), "Save to a file" (saves a text file — store it somewhere safe, not on the same drive you are encrypting), or "Print the recovery key" (print and store securely).
  7. 7Click Next after saving your recovery key.
  8. 8Choose how much of your drive to encrypt: "Encrypt used disk space only" (faster, good for new computers) or "Encrypt entire drive" (slower but more thorough — recommended for computers already in use).
  9. 9Choose your encryption mode: "New encryption mode (best for fixed drives on this device)" for internal drives, or "Compatible mode" for drives you might use on older Windows versions.
  10. 10Click Next, then click "Start encrypting."
  11. 11Encryption will begin in the background. You can continue using your computer. A lock icon will appear on the drive in File Explorer when encryption is complete.

Pro Tip

Encryption time depends on drive size and speed. A 256GB SSD typically takes 15–30 minutes for used-space-only encryption. A 1TB HDD with full-drive encryption can take several hours. You can check progress by returning to the BitLocker Drive Encryption page in Settings.

Method 2: Enable Device Encryption on Windows 11 Home

Windows 11 Home does not include the full BitLocker interface, but it does include "Device Encryption" — a simplified version that provides the same AES-256 encryption. It requires a Microsoft account and a compatible device.

  1. 1Make sure you are signed in with a Microsoft account (not a local account). Device Encryption automatically backs up your recovery key to your Microsoft account.
  2. 2Press Windows key + I to open Settings.
  3. 3Click Privacy & security in the left sidebar.
  4. 4Click Device encryption.
  5. 5If the toggle is Off, click it to turn it On.
  6. 6If you do not see the Device encryption option, your device may not meet the hardware requirements (Modern Standby/InstantGo support is required). In that case, upgrading to Windows 11 Pro is the path to BitLocker.

Method 3: Enable BitLocker Using Control Panel (Alternative Method)

  1. 1Press Windows key + S and search for "Control Panel." Open it.
  2. 2Click System and Security.
  3. 3Click BitLocker Drive Encryption.
  4. 4Next to your C: drive, click "Turn on BitLocker."
  5. 5Follow the same steps as Method 1 from step 6 onward (choosing how to save your recovery key, encryption scope, and encryption mode).

Method 4: Enable BitLocker Using Command Prompt (For IT Administrators)

IT administrators managing multiple computers can enable BitLocker from the command line using the manage-bde tool. This is useful for scripting and remote management.

  1. 1Right-click the Start button and select "Terminal (Admin)" or "Command Prompt (Admin)."
  2. 2To enable BitLocker on the C: drive with TPM protection and save the recovery key to a file, run: manage-bde -on C: -RecoveryKey D:\ -RecoveryPassword
  3. 3Replace D:\ with the path where you want to save the recovery key file.
  4. 4To check encryption status: manage-bde -status C:
  5. 5To see all available options: manage-bde -on /?

How to Set a BitLocker PIN (Recommended for Business Computers)

By default, BitLocker unlocks automatically using the TPM chip — you do not need to enter anything at startup. For higher security, especially on laptops that leave the office, you can require a PIN at startup. This means even if someone has the physical computer, they cannot boot it without the PIN.

  1. 1First, you need to enable the PIN option through Group Policy (Windows 11 Pro/Enterprise only). Press Windows key + R, type gpedit.msc, and press Enter.
  2. 2Navigate to: Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives.
  3. 3Double-click "Require additional authentication at startup."
  4. 4Select Enabled. Under "Configure TPM startup PIN," select "Require startup PIN with TPM." Click Apply and OK.
  5. 5Now open Command Prompt as Administrator and run: manage-bde -protectors -add C: -TPMAndPIN
  6. 6You will be prompted to enter and confirm your PIN. Use a PIN you will remember — if you forget it, you will need your recovery key.
  7. 7Restart your computer. You will now be prompted for your PIN before Windows loads.

Important: If you set a BitLocker PIN, write it down and store it separately from your computer. If you forget the PIN and do not have your recovery key, you will not be able to access your data. For business environments, store recovery keys in Active Directory or Azure AD — Simple Network Solutions can configure this as part of managed IT.

How to Find Your BitLocker Recovery Key

If you ever need your recovery key (after a hardware change, forgotten PIN, or TPM issue), here is where to find it depending on how you saved it:

  • Saved to Microsoft account: Go to account.microsoft.com/devices/recoverykey and sign in. Your recovery key will be listed there.
  • Saved to a file: Find the text file named "BitLocker Recovery Key [ID].txt" wherever you saved it.
  • Saved to USB drive: Insert the USB drive — the recovery key file will be on it.
  • Printed: Find the printed copy in your secure storage.
  • Saved to Azure AD (business): Your IT administrator can retrieve it from the Azure Active Directory portal.
  • Saved to Active Directory (business): Your IT administrator can retrieve it from Active Directory Users and Computers.

How to Verify BitLocker Is Working

  1. 1Open File Explorer. Your C: drive should show a gold padlock icon, indicating BitLocker is enabled.
  2. 2For a detailed status check, open Command Prompt as Administrator and run: manage-bde -status C:
  3. 3Look for "Protection Status: Protection On" and "Encryption Method: XTS-AES 128" or "XTS-AES 256." If it shows "Protection Off," encryption may still be in progress — check back after a few minutes.
  4. 4You can also verify through Settings → Privacy & security → Device encryption (or BitLocker Drive Encryption) — it should show "BitLocker on" next to your drive.

How to Disable BitLocker (If Needed)

If you need to disable BitLocker — for example, before a major hardware upgrade or BIOS update — here is how:

  1. 1Go to Settings → Privacy & security → Device encryption (or BitLocker Drive Encryption).
  2. 2Click "Turn off BitLocker" next to your drive.
  3. 3Confirm by clicking "Turn off BitLocker" again in the dialog.
  4. 4Decryption will begin in the background. This takes the same amount of time as encryption. You can continue using your computer during the process.

BitLocker and Business Computers: What IT Administrators Should Know

  • Recovery key escrow: In a business environment, BitLocker recovery keys should be automatically backed up to Azure Active Directory (for Microsoft 365 environments) or on-premises Active Directory. This ensures IT can recover any company device without the user's involvement.
  • Microsoft Intune deployment: BitLocker can be enforced across all company devices through Microsoft Intune (included in Microsoft 365 Business Premium). This ensures every device is encrypted without relying on individual users to enable it.
  • Compliance requirements: HIPAA, PCI DSS, and the FTC Safeguards Rule all require encryption of devices that store covered data. BitLocker is the standard Windows implementation that satisfies these requirements.
  • Encryption reporting: Intune provides a BitLocker encryption report showing which devices are encrypted, which are not, and the status of recovery key escrow — giving IT administrators full visibility across the fleet.

Pro Tip

If you manage Windows 11 computers for your Miami business and want BitLocker deployed and monitored across your entire fleet — with recovery keys automatically escrowed and compliance reporting — Simple Network Solutions handles this as part of our managed IT service. Call (786) 383-2066 or visit our Services page to learn more.

Free Newsletter

Stay ahead of Miami's IT threats & trends

Monthly insights written for South Florida business owners — covering cybersecurity alerts, cost-saving IT strategies, and Miami-specific technology advice.

Cybersecurity alertsCost-saving tipsMiami business focused

No spam. Unsubscribe anytime.

About the Author

MD

Marco Delgado

Senior Cybersecurity Specialist · 14 years experience

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

Marco leads cybersecurity operations at Simple Network Solutions, with 14 years of experience in network security, penetration testing, and compliance for regulated industries. He has responded to over 200 security incidents for Miami businesses and holds four active cybersecurity certifications. He regularly presents at South Florida IT security events and contributes to the FBI InfraGard Miami chapter.

Share:
Ready to Take Action

Questions? Our Miami IT team is standing by.

Turn what you just read into action. Schedule a free consultation with our local team — no sales pressure, just honest technology advice for your Miami business.