BitLocker is Microsoft's built-in full-disk encryption for Windows. When enabled, it encrypts your entire drive so that if a device is lost or stolen, the data on it stays unreadable—even if someone pulls the drive out and plugs it into another machine.
It comes built into Windows Pro, Enterprise, and Education editions, works best with a TPM 2.0 chip, and runs silently in the background with no impact on your day-to-day workflow.
This guide covers how BitLocker works, how to enable it (individually and at fleet scale), what it protects, and—just as importantly—what it doesn't.
What is BitLocker (and what are its limits)?
BitLocker is Microsoft's built-in full-disk encryption for Windows that protects data at rest by encrypting entire drives and unlocking them only with authorized keys (TPM, PIN, or USB key). If a laptop is lost or stolen, files remain unreadable without the key. Limits: BitLocker doesn't stop malware or credential theft, and it protects only data at rest—so you still need strong access controls, backups, and device management for key recovery and policy enforcement.
What is BitLocker? (in detail)
The simple answer:
It's a Windows feature that encrypts your drive so data remains unreadable if a device is lost, stolen, or booted from external media. BitLocker ties the decryption key to the device's hardware (TPM) and your chosen key protector (like a pre-boot PIN), unlocking seamlessly for authorized users and blocking offline access for everyone else.
Now let's dive deeper:
BitLocker is a disk encryption feature created by Microsoft and released in 2006 as part of the Windows Vista operating system. It uses advanced AES encryption algorithms to protect sensitive data stored on a computer or server from unauthorized access. It can also encrypt entire drives and uses Trusted Platform Modules (TPM) to store encrypted keys to ensure that only authorized users can access the device.
The trusted platform module plays a crucial role in BitLocker encryption, working alongside it to verify device integrity when offline. This is particularly important for ensuring that the device has not been tampered with while powered off. For devices without a TPM installed, BitLocker provides alternative methods for encryption, ensuring that all Windows devices can benefit from this level of security.
It also offers pre-boot authentication, which prevents unauthenticated users from accessing a computer's content without proper credentials. This means that information protected by this software can only be accessed by those who have the recovery keys, protecting it from unauthorized third parties.
How BitLocker works
BitLocker uses hardware-backed cryptography so data stays unreadable if the device is lost or tampered with. Under the hood, AES-XTS encrypts the drive, the decryption key is sealed inside the TPM, and Windows only releases it at boot if the device passes integrity checks (Secure Boot, firmware, and platform state).
When you power on, the TPM asks, "Is this the same PC I encrypted?" If the answer is yes, Windows unlocks silently (or after a pre-boot PIN, if you require one) and loads as usual. If something important changed—new motherboard, firmware reset, suspicious boot—BitLocker stops and asks for the recovery key. That protects data from offline attacks and disk removal.
- Encryption Process: When BitLocker is enabled, it encrypts all data on your drive using AES (Advanced Encryption Standard), making files inaccessible without the proper decryption key. It protects the entire drive, including the operating system.
- Creating and Storing the Key: BitLocker generates a unique encryption key stored in the TPM chip (or on a USB drive on devices without TPM). The TPM releases the key only after verifying the device hasn't been tampered with.
- Pre-Boot Security Check: Before the OS starts, BitLocker runs integrity checks. If suspicious changes are detected, it locks the system until the correct key or recovery key is provided.
- Alternative Authentication Methods: BitLocker can require a PIN or password alongside the key for an extra layer of protection.
- Recovery Key: During setup, you're prompted to save a 48-digit recovery key—a backup you can use if you lose access to your primary authentication method.
- BitLocker To Go: BitLocker also encrypts removable storage (USB drives, external HDDs) through BitLocker To Go.
- Protection Against Unauthorized Changes: Any attempt to change the startup environment, access the BIOS, or tamper with hardware triggers BitLocker to require the recovery key before booting.
- Automatic Device Encryption: On certain Windows devices, BitLocker automatically encrypts data during setup, offering seamless protection without user intervention.
- Decommissioning: When devices are retired or recycled, BitLocker ensures data on the drive remains encrypted and inaccessible even if the hardware is repurposed.
What BitLocker does
BitLocker keeps your data unreadable if someone gets the laptop—or even just the drive.
- Lost or stolen laptop: A thief can power it on, pull the SSD, or boot from a USB stick—they still can't read your files without the proper key or recovery flow.
- Disk removal: Plugging the drive into another computer shows encrypted noise, not spreadsheets and emails.
- Simple for users: Nothing new to learn. They sign in like always; encryption runs in the background.
Why IT cares:
- Stops offline attacks and blocks disk-removal access to data at rest.
- Reduces breach impact when a device goes missing—encrypted data lowers incident severity.
- Supports compliance: full-disk encryption is a core control for ISO 27001, HIPAA, GDPR.
- Protects everywhere: works on OS and fixed data drives; BitLocker To Go covers USB/external media.
Features and limitations of BitLocker
Features:
- Pre-Boot Authentication: Requires users to verify identity before the OS starts, preventing access even if someone has physical possession of the device.
- Automatic Device Encryption: On compatible devices, BitLocker automatically encrypts all drives upon activation—no user intervention needed.
- Portable Storage Protection (BitLocker To Go): Extends encryption to removable storage like USB drives and external HDDs.
- TPM Integration: Works with the TPM chip to verify hardware integrity before releasing the decryption key.
- Customizable Authentication: Supports PINs, passwords, smart cards, and USB keys in addition to or instead of TPM.
- Active Directory Integration: For organizations, BitLocker integrates with AD to store recovery keys and manage encrypted devices across the network.
Limitations:
- Compatibility Issues: Requires TPM chips for full functionality—older devices without TPM need external storage (USB) for the encryption key, which is less secure.
- Cold Boot and DMA Vulnerabilities: Advanced attackers using cold boot or Thunderbolt DMA attacks can potentially extract encryption keys from RAM on a running or recently-powered-off system.
- Dependence on User Configuration: Poor implementation—not setting up pre-boot authentication or mismanaging recovery keys—significantly weakens protection.
- No Protection Against Online Threats: BitLocker protects data at rest only. It does nothing against malware, phishing, or credential theft on a running system.
- Recovery Key Management Risk: Losing the recovery key means losing access to the encrypted data permanently.
- Performance Impact on Older Hardware: On older HDDs or budget SSDs, there can be a slight reduction in read/write speeds. On modern NVMe hardware, the impact is negligible.
Is BitLocker Secure? Is It Worth Using?
Short answer: yes, within its scope. The important word is within.
What BitLocker protects you from
- A stolen laptop: the thief gets hardware, not data. The drive is encrypted noise without the key.
- Disk removal: someone pulls the SSD and connects it to another machine—still can't read it.
- Decommissioned devices: recycling or disposing of a PC without wiping it is a common data leak vector. BitLocker eliminates it.
- Offline attacks: cold-boot and disk-removal attacks against a powered-off device hit a wall.
What BitLocker does NOT protect you from
- Ransomware: ransomware runs while the system is unlocked and authenticated. BitLocker has no visibility into what software is doing with data once the drive is decrypted. A ransomware attack encrypts on top of BitLocker.
- Malware and credential theft: if an attacker is already inside your system, BitLocker is irrelevant—the OS already decrypted the drive for them.
- Sleep mode attacks: in sleep mode, decryption keys remain in RAM. DMA attacks via Thunderbolt ports can extract them. For high-risk roles, disable sleep mode or require TPM+PIN.
- Logged-in theft: if someone grabs your open laptop while you're signed in, they have full access. BitLocker only protects data at rest.
Is it worth using?
| Profile | Recommendation |
|---|---|
| IT team managing a fleet | Yes—mandatory. Full stop. |
| Healthcare, finance, legal, education | Yes—likely required for compliance (HIPAA, GDPR, FERPA) |
| Remote/hybrid workforce | Yes—devices outside the office perimeter are high-risk |
| Small business with sensitive data | Yes—simple to enable, cost is zero |
| Personal home user, non-sensitive data | Optional—adds some friction, minimal benefit |
For IT teams, the question isn't "should we use BitLocker?"—it's "why aren't all our devices already encrypted?" A single stolen laptop with unencrypted drives can trigger a reportable data breach. BitLocker prevents that scenario entirely.
Requirements for editions, TPM 2.0, and UEFI/Secure Boot
Before you flip BitLocker on, take one calm lap around the basics. A minute of prep here prevents recovery-key surprises later.
1) Windows editions
- BitLocker is built into Windows 10/11 Pro and Enterprise.
- Some Home devices ship with Device Encryption (a lighter feature). Your fleet guidance should target BitLocker, not the Home variant.
- Quick check: Settings → System → About → look at Edition.
2) Hardware: TPM 2.0
- A TPM 2.0 chip lets Windows unlock the drive quietly at boot when the device looks normal.
- No TPM? You can still use BitLocker—require a USB startup key or startup password—but standardize on TPM over time.
- Quick check: press Win+R → tpm.msc → look for Status: The TPM is ready for use and Specification Version: 2.0.
3) Firmware: UEFI + Secure Boot
- UEFI with Secure Boot helps prove the bootloader hasn't been tampered with. BitLocker only releases the decryption key when platform checks pass.
- Quick check: press Win+R → msinfo32 → confirm BIOS Mode: UEFI and Secure Boot State: On.
If Secure Boot is Off: enable it in firmware, then suspend BitLocker, change the setting, and resume.
4) Policy note for mixed fleets
- Standardize two line items in your enrollment checklist: TPM = On and Secure Boot = On.
- Document minimums (Windows 10/11 Pro or Enterprise, TPM 2.0, UEFI) and put exceptions on a short timer.
5) Pre-deployment sanity pass
- One device per model: verify TPM 2.0 present, Secure Boot on, BIOS up-to-date.
- Enable BitLocker on the pilot unit and confirm the recovery key gets escrowed (Azure AD/AD).
- Reboot twice: if you get surprise recovery prompts, suspend → update firmware → resume.
6) Common gotchas
- Firmware/BIOS updates: suspend BitLocker before flashing, resume after.
- Board swaps / storage changes: expect a recovery key challenge—that's BitLocker doing its job.
- UEFI turned off by image: some legacy images flip devices back to Legacy/CSM. Fix the image; don't fight BitLocker.
- Virtualization quirks: VMs don't use physical TPM unless a vTPM is provisioned—plan policies accordingly.
BitLocker vs. Device Encryption — What's the Difference?
If you've opened Windows Settings and seen "Device Encryption" instead of "BitLocker," you're not alone. These are two different things, and the confusion is common.
Device Encryption is a simplified version included in Windows Home. It automatically encrypts the OS drive when you sign in with a Microsoft account. You don't control the settings—it just runs.
BitLocker Drive Encryption is the full version, available on Windows Pro, Enterprise, and Education. It gives IT teams granular control: which drives to encrypt, which key protector to use (TPM-only, TPM+PIN, USB key), where to store recovery keys (Azure AD, Active Directory, Microsoft account), and enforcement via Intune or Group Policy.
| Feature | Device Encryption | BitLocker |
|---|---|---|
| Available on Windows Home | Yes | No |
| Available on Windows Pro/Enterprise | Yes | Yes |
| IT-managed via Intune/GPO | No | Yes |
| Key protector options | TPM only | TPM, PIN, USB, password |
| Recovery key storage | Microsoft account only | Azure AD, AD DS, Microsoft account |
| Encrypts external drives | No | Yes (BitLocker To Go) |
| Configurable encryption algorithm | No | Yes |
Windows 11 24H2 update: Starting with Windows 11 24H2, Microsoft expanded the eligibility requirements for automatic Device Encryption, so more devices—including some that previously didn't qualify—now get encrypted automatically on setup. This matters for IT teams managing mixed fleets where some devices run Home.
Bottom line for IT teams: If you're managing a fleet, you want BitLocker—not Device Encryption. BitLocker gives you policy control, centralized key management, and compliance reporting. Device Encryption is fine for a personal laptop; it's not a fleet management tool.
How to Enable BitLocker
For individual devices (via Control Panel)
- Open the Start menu, search for "Manage BitLocker", and open it.
- Under Operating system drive, click Turn on BitLocker.
- Choose how to back up your recovery key: save to your Microsoft account (recommended for personal use), save to a file, or print it.
- Choose what to encrypt: Encrypt used disk space only (faster, good for new devices) or Encrypt entire drive (recommended for devices already in use).
- Select New encryption mode (XTS-AES 128-bit, default for fixed drives).
- Run the BitLocker system check, then restart.
BitLocker will encrypt in the background—the device is usable during the process.
To verify BitLocker is enabled: Open PowerShell as admin and run manage-bde -status. Look for Protection Status: Protection On. Alternatively: Settings → Privacy & Security → Device Encryption.
For IT teams — via Microsoft Intune
- In the Intune admin center, go to Endpoint security → Disk encryption → Create policy.
- Select Platform: Windows 10 and later, Profile: BitLocker.
- Configure: Require device encryption (Yes), key protector (TPM or TPM+PIN for high-risk roles), recovery key storage (Azure AD—mandatory).
- Assign the policy to your device groups and Save.
Intune pushes the policy at next device sync. Recovery keys are automatically escrowed to Azure AD and accessible via Devices → BitLocker keys in the admin center.
For IT teams — via Group Policy
- Open Group Policy Management and create or edit a GPO.
- Navigate to:
Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Operating System Drives - Enable "Require additional authentication at startup" and configure TPM options.
- Under "Choose how BitLocker-protected OS drives can be recovered", set recovery key backup to Active Directory Domain Services and check "Do not enable BitLocker until recovery information is stored in AD DS."
- Apply the GPO to the relevant OUs.
Verify compliance after rollout with PowerShell: Get-BitLockerVolume -MountPoint "C:" | Select-Object VolumeStatus, ProtectionStatus, KeyProtector
Key protectors: TPM, PIN, password, USB, recovery key ID
BitLocker won't unlock a drive unless a key protector says it's safe to do so. Think of protectors as different ways to prove "this is the right device and the right person."
TPM-only (the smooth default)
- What it is: The TPM releases the decryption key when the PC's boot measurements look normal.
- Why teams like it: Seamless boot—no extra prompt for users.
- Good for: Most knowledge workers on trusted, managed hardware.
- Watch-outs: If the device is stolen while unlocked, data in the current session is still accessible.
TPM + PIN (pre-boot PIN)
- What it is: Everything from TPM-only plus a short PIN before Windows loads.
- Why teams use it: Adds "something you know" to "something you have," stopping attackers who can pass hardware checks but don't know the PIN.
- Good for: Admins, finance, executives, travelers, devices with privileged data.
- Tip: Set a minimum length (6–8 digits) and a lockout threshold.
Startup password or USB startup key
- What it is: A password typed at boot, or a USB key inserted to release the protector.
- Why it exists: Useful on legacy hardware without TPM, lab/bench devices, or special workflows.
- Trade-offs: More friction; USB keys can be lost. Use sparingly and document where they live.
Recovery key + recovery key ID (your safety net)
- What it is: A 48-digit recovery key that unlocks the drive when BitLocker detects changes (firmware reset, board swap, suspicious boot).
- Non-negotiable: Always escrow recovery keys centrally (Azure AD/Active Directory) and rotate them after use.
- Helpdesk flow: Ask for the recovery key ID, fetch the matching key from your directory, unlock once, then rotate.
Choosing the right protector
| Role / scenario | Recommended protector | Notes |
|---|---|---|
| Standard users on managed laptops | TPM-only | Lowest friction, good baseline. |
| Admins, finance, execs | TPM + PIN | Pre-boot human step; stronger against targeted theft. |
| Frequent travelers / high-risk regions | TPM + PIN (required when traveling) | Use conditional policies to enforce on travel profiles. |
| Legacy or lab devices (no TPM) | Startup password or USB startup key | Plan a hardware refresh; keep inventory tight. |
| Shared kiosks / training rooms | TPM-only + tight sign-out policy | Minimize PIN sharing; rely on session controls. |
Friendly guardrails
- Keep it recoverable: verify keys escrow to Azure AD/AD at enablement.
- Suspend before firmware updates: suspend BitLocker, update BIOS/UEFI, then resume.
- Train the 30-second script: users should know what a pre-boot PIN is and how to read a recovery key ID to the helpdesk.
- Rotate after recovery: treat any use of the recovery key as a signal to rotate and review why it triggered.
- Don't over-PIN: TPM-only is fine for the majority. Save TPM+PIN for roles that truly need it.
Operating system vs fixed data drives vs BitLocker To Go
Not every drive plays the same role. BitLocker handles each a little differently.
Operating system drive (C:)
- What it is: The Windows volume and boot path.
- How it behaves: Unlocks with your chosen key protector (TPM-only or TPM+PIN). If the device looks "off" after a firmware change, BitLocker asks for the recovery key—by design.
- Good default: Encrypt C: at enrollment, escrow the recovery key, keep Secure Boot on.
Fixed data drives (D:, E:, etc.)
- What they are: Extra internal volumes—project disks, second SSDs, partitions users stash exports on.
- Good default: Auto-encrypt fixed drives, inherit the OS policy, and block writes until encryption completes.
BitLocker To Go (USB/external drives)
- What it is: BitLocker for removable media—thumb drives and external HDD/SSD.
- Why it matters: Prevents "pocket exfiltration" when files walk out on a USB stick.
- Good default: Require a password and auto-encrypt on first write.
Policy tip
- Block write access to unencrypted removable media. Users can still read from personal USBs but can't save to them until BitLocker To Go turns on.
Privacy & compliance (encryption at rest)
You turned on BitLocker, chose your key protector, and escrowed the recovery key. What does that buy you when something goes wrong?
The real-world win
A lost or stolen laptop isn't automatically a data incident. With encryption at rest in place, what's on disk is unreadable without the right key. That lowers the temperature of the investigation and often the severity of the incident report.
How BitLocker maps to the rules
Most frameworks ask for exactly this: full-disk encryption, keys under control, and proof it's enabled. BitLocker helps you align with ISO 27001, HIPAA, GDPR, and the checks on most vendor questionnaires—without adding extra agents.
What good practice looks like
- Encrypt at enrollment: new Windows 10/11 Pro/Enterprise devices get BitLocker before a user ever signs in.
- Escrow keys automatically: store recovery keys in Azure AD/Active Directory; rotate after any recovery event.
- Keep the platform honest: standardize TPM 2.0, UEFI, and Secure Boot.
- Cover the easy leak: enforce BitLocker To Go and block writes to unencrypted USB drives.
- Audit, don't guess: report BitLocker status per device—on/off, protector type, key-escrow presence.
What to save for your paper trail
- A simple encryption posture dashboard for execs (percent encrypted, exceptions, trend).
- Per-device facts: edition, TPM state, Secure Boot state, BitLocker on/off, protector, recovery key escrowed, last check.
- For incidents: attach the device's BitLocker status and escrow proof to the ticket.
BitLocker use cases
BitLocker is a powerful encryption tool that can provide enhanced security for those who need it—but not everyone does. In fact, if you don't store sensitive information on your computer, you're probably fine without it.
Cases in which BitLocker would help
- Business organizations: BitLocker helps companies comply with cybersecurity standards like HIPAA, SOC2, ISO, and NIST by providing full-disk encryption for Windows devices.
- Healthcare and finance: Organizations handling patient records, financial data, or PII have a regulatory obligation to protect data at rest. BitLocker is often the fastest path to satisfying that requirement on Windows fleets.
- Remote and hybrid workforces: Devices that leave the office perimeter—laptops taken home, to client sites, or on travel—are at elevated risk of loss or theft. BitLocker makes that risk manageable.
- Education (K-12 and universities): FERPA requires protecting student data. A stolen Chromebook alternative running Windows should be encrypted before it leaves the building.
Cases in which BitLocker may not be necessary
- Casual home users: If you use your computer for browsing, email, or streaming, BitLocker adds friction with minimal benefit.
- Non-sensitive information: No financial data, no PII, no regulated content—BitLocker is optional.
- Old hardware: Devices without TPM or UEFI support may not run BitLocker properly, and the workarounds (USB startup keys) reduce usability significantly.
Takeaways
BitLocker turns stolen hardware into just hardware—not a data breach. Here's what to carry forward:
- Encrypt at enrollment. Make BitLocker part of your Windows 10/11 setup flow, not an afterthought.
- Choose protectors by role. TPM-only for most users; TPM+PIN for admins, execs, and frequent travelers.
- Keep keys under control. Escrow recovery keys in Azure AD/AD and rotate after any recovery event.
- Close the easy gaps. Auto-encrypt fixed data drives and enforce BitLocker To Go.
- Standardize the platform. TPM 2.0 + UEFI + Secure Boot = predictable, silent unlocks.
- Audit, don't guess. Track encryption status, protector type, escrowed keys, and exceptions in your endpoint tool.
Do this next:
- Add a 60-second readiness check (edition, TPM, UEFI/Secure Boot) to your enrollment runbook.
- Roll out a simple policy: default TPM-only; escalate to TPM+PIN for high-risk roles.
- Turn on BitLocker To Go with auto-encrypt on first write.
- Stand up a weekly encryption posture dashboard and assign an owner.
Frequently Asked Questions
What happens if I lose my BitLocker recovery key?
If BitLocker asks for the 48-digit key and you can't provide it, the drive stays locked—Microsoft can't bypass the encryption. Check: 1) aka.ms/myrecoverykey; 2) your Azure AD/Active Directory account if the PC is managed; 3) any USB stick, printed copy, or password manager used during setup. No backup anywhere means the data is unrecoverable.
Can BitLocker be used on devices without TPM?
Yes, but with limitations. Without a TPM, BitLocker requires a USB startup key or password at boot—and you lose the hardware-backed integrity checks that make TPM-based BitLocker resilient against offline attacks. It's better than nothing, but plan to standardize on TPM 2.0 hardware over time.
Does BitLocker mean I was hacked?
No. When BitLocker suddenly asks for your recovery key, it's doing exactly what it's designed to do. The prompt appears when it detects a significant change it can't verify: a BIOS/UEFI firmware update, a new motherboard, a changed boot order, or too many failed PIN attempts. These changes prevent the TPM from releasing the key automatically, so BitLocker falls back to the recovery key as verification. Enter your 48-digit key and you're back in. The BitLocker prompt is a protection mechanism—not a breach indicator.
Does BitLocker protect against ransomware?
No—and this is one of the most important misconceptions to correct. BitLocker protects data at rest, when the device is powered off or the drive is physically removed. Ransomware attacks while the system is running and authenticated. From the ransomware's perspective, the drive is already decrypted (because you logged in and Windows unlocked it). To protect against ransomware, you need endpoint detection and response (EDR), regular offline backups, and user training—not encryption alone.
Does BitLocker work on Windows Home?
Not directly. BitLocker Drive Encryption is only available on Windows Pro, Enterprise, and Education. Windows Home includes Device Encryption—a simpler, less configurable version that automatically encrypts the OS drive if hardware requirements are met and you're signed in with a Microsoft account. If you need fleet management and centralized key control, you need Windows Pro or Enterprise.
Does BitLocker slow down my computer?
On modern hardware with NVMe SSDs, the impact is negligible—most users never notice it. On older hardware with HDDs, there can be a slight reduction in read/write speeds. Starting with Windows 11 24H2, Microsoft introduced hardware-accelerated BitLocker on supported Intel vPro processors, effectively eliminating overhead on those systems. The initial encryption process runs in the background and normal performance resumes once complete.
How long does the BitLocker encryption process take?
Anywhere from 20 minutes to several hours, depending on drive size, data volume, and hardware speed. The device remains usable during encryption—it runs in the background. Choosing "Encrypt used disk space only" (vs. the full drive) significantly reduces time on new devices.
Is it necessary to suspend BitLocker before a system update?
For normal Windows or driver updates, leave BitLocker on—Windows handles it. Suspend only for changes that touch firmware or boot components: BIOS/UEFI flashes, motherboard swaps, or disk moves. Suspending prevents an unexpected recovery-key prompt after the hardware change; resume protection once the update finishes.
BitLocker vs. VeraCrypt — which should I choose?
For enterprise IT management on Windows, BitLocker. It integrates natively with Windows, Active Directory, Intune, and Azure AD—no third-party software to deploy, recovery keys escrow centrally, and compliance reporting is built in. VeraCrypt is a strong open-source alternative for cross-platform encryption (Windows, macOS, Linux), encrypted containers rather than full drives, or users on Windows Home where BitLocker isn't available. For most IT teams managing a Windows fleet: use BitLocker.
Can BitLocker encryption be applied to external USB drives?
Yes. BitLocker encrypts external USB drives through BitLocker To Go. You set a password during setup, and the drive requires that password to be read on any Windows machine. On macOS or Linux, you'll need third-party tools to read BitLocker To Go drives.
Why is my computer asking for a BitLocker recovery key after a Windows update?
This is a known issue that has occurred with several Windows updates (notably in 2024 and 2025). Certain updates touching firmware or boot components cause BitLocker to detect changes and trigger the recovery prompt. Enter your 48-digit recovery key to unlock. Microsoft typically releases a fix shortly after. To avoid this: always make sure your recovery key is escrowed in Azure AD or your Microsoft account before updates run.




