So we did update two different models that we’re having issues with. BIOS updated to latest and greatest, yet we still experience the issue.
Here’s a question: Documentation states that we must delete and recreate the bitlocker protectors after the conversion… On the systems that work, all we’re doing is this: 1. Suspend Bitlocker 2. Restart into WinPE 3. MBR2GPT conversion 4. BIOS config utility to enable UEFI (We tried taking out Secure Boot section but didn’t fix it.) 5. Enabling RE Agent: cmd.exe /c "REAgentC /Enable" 6. Resuming bitlocker: cmd.exe /c "manage-bde -protectors -enable C:" 7. Restart Computer 8. This is where bitlocker recovery key is required. Now, I would have to test again, but I’m 90% sure we also tried this for our step 5 and 6: 1. cmd.exe /c "manage-bde -protectors -delete c:" 2. cmd.exe /c "REAgentC /Enable" 3. cmd.exe /c "manage-bde -protectors -add c: -tpm" 4. cmd.exe /c "manage-bde -protectors -enable C:" With the above 4 steps, we had no issues but it didn’t seem to fix the bitlocker recovery issue. Are we not properly “removing the protectors and recreating them”? -Nick- From: [email protected] [mailto:[email protected]] On Behalf Of Marable, Mike Sent: Monday, July 31, 2017 7:41 PM To: [email protected] Subject: Re: [mssms] RE: Recovery Key required after SecureBoot Good idea, Paul. It seems HP is notorious for TPM issues that are fixed with BIOs updates. We had some 600 G2s that were giving us fits with BitLocker recovery until HP released an updated BIOs revision. Mike From: <[email protected]<mailto:[email protected]>> on behalf of "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Reply-To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Date: Monday, July 31, 2017 at 6:28 PM To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Subject: RE: [mssms] RE: Recovery Key required after SecureBoot Try updating your bios to latest version On 29 Jul 2017 00:36, "nick aquino" <[email protected]<mailto:[email protected]>> wrote: No, not dense at all. Makes sense... but it is at win10 at this stage of the TS. I'll have to check the Tpm 2.0 settings on monday. There may be something there. These are the older models that are not happy. The 850g3 and 800g2 are working as expected. Thanks Mike. -Nick- Sent from my Verizon 4G LTE smartphone -------- Original message -------- From: "Marable, Mike" <[email protected]<mailto:[email protected]>> Date: 7/28/17 16:23 (GMT-05:00) To: [email protected]<mailto:[email protected]> Subject: [mssms] RE: Recovery Key required after SecureBoot Nick, Are these being imaged as Win7? SecureBoot is completely incompatible with Windows 7. That alone could be tripping the recovery key request. I’ve been finding it doesn’t take much to trip the key request. I had a Dell XPS that was in Legacy BIOs mode and TPM 2.0, but Dell listed that combo as being unsupported and it was tripping the recovery key at every reboot. Once I switched to UEFI + TPM 2.0 it ran smooth. It's been a long day (I’ve been here since 5am) so forgive me if I’m just being dense and missing the obvious. Thanks Mike From: [email protected]<mailto:[email protected]> [mailto:[email protected]<mailto:[email protected]>] On Behalf Of nick aquino Sent: Friday, July 28, 2017 2:05 PM To: [email protected]<mailto:[email protected]> Subject: [mssms] Recovery Key required after SecureBoot Hi all, Building out a Windows 10 1703 in-place upgrade task sequence for HP Models running Windows 7. I’ve run into a few issues with these, one of them being that when I turn on SecureBoot, bitlocker recovery key is required after I re-enable bitlocker. Here are my steps: 1. Disable bitlocker 2. Upgrade Operating system * This reboots on its own 1. Added another restart to fix an issue with the TS Progress bar * (conditional steps to disable bitlocker if, for some reason, it’s enabled again) 1. Restart into WinPE 2. Convert from MBR to GPT 3. Configure BIOS with UEFI and Secure Boot 4. Restart into Default OS 5. Enable bitlocker 6. Restart again into Main OS After Step 9 restarts, we’re presented with the bitlocker recovery screen. We enter the recovery key, boot up, disable bitlocker, restart, enable bitlocker and it’s fine. If I perform all of the same steps but without enabling SecureBoot, we do not have an issue. As soon as I enable secure boot (even if bitlocker is disabled before I restart into the firmware), once bitlocker enables, the recovery key is required upon the next restart. Caveat: This only happens on the models that have legacy boot and secure boot separated into two settings in the BIOS. The models that have it all in one step (i.e. “Legacy boot disabled and SecureBoot enabled”), those do not have the issue at all. I hope this write-up makes sense and someone has a workaround. -Nick- ********************************************************** Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues ********************************************************** Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues

