:::MENU:::

Configure TPM platform validation profile (Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2)

This policy setting allows you to configure how the computer’s Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection. If you enable this policy setting before turning on BitLocker you can configure the boot components that the TPM will validate before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect the TPM will not release the encryption key to unlock the drive and the computer will instead display the BitLocker Recovery console and require that either the recovery password or recovery key be provided to unlock the drive. If you disable or do not configure this policy setting the TPM uses the default platform validation profile or the platform validation profile specified by the setup script. A platform validation profile consists of a set of Platform Configuration Register (PCR) indices ranging from 0 to 23 The default platform validation profile secures the encryption key against changes to the Core Root of Trust of Measurement (CRTM) BIOS and Platform Extensions (PCR 0) the Option ROM Code (PCR 2) the Master Boot Record (MBR) Code (PCR 4) the NTFS Boot Sector (PCR 8) the NTFS Boot Block (PCR 9) the Boot Manager (PCR 10) and the BitLocker Access Control (PCR 11). The descriptions of PCR settings for computers that use an Extensible Firmware Interface (EFI) are different than the PCR settings described for computers that use a standard BIOS. Warning: Changing from the default platform validation profile affects the security and manageability of your computer. BitLocker’s sensitivity to platform modifications (malicious or authorized) is increased or decreased depending upon inclusion or exclusion (respectively) of the PCRs.


Additional Information

  1. Registry path is:

    HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # Enabled; HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 0 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 1 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 2 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 3 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 4 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 5 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 6 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 7 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 8 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 9 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 10 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 11 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 12 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 13 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 14 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 15 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 16 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 17 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 18 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 19 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 20 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 21 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 22 HKEY_LOCAL_MACHINE -> SOFTWARE -> Policies -> Microsoft -> FVE -> PlatformValidation # 23

  2. The Administrative Template path is:

    Windows Components -> BitLocker Drive Encryption -> Operating System Drives

Notes

* Making mistakes while changing registry values can affect your system adversely. We recommend you to create a System Restore point before making registry manipulation. If you're new to Registry Editor, read this beginner's guide.
** To locate the registry and administrative template path, checkout beginner's guide.
You're here :
Checkout Kapil Sparks™