MBAM 2.5 Deployment Guide PDF
MBAM 2.5 Deployment Guide PDF
MBAM 2.5 Deployment Guide PDF
Administration and
Monitoring
Deployment Guide
Microsoft BitLocker Administration and Monitoring (MBAM) is an enterprisescalable solution for managing BitLocker technologies, such as BitLocker Drive
Encryption and BitLocker To Go. MBAM, which is part of the Microsoft Desktop
Optimization Pack, helps you improve security compliance on devices by
simplifying the process of provisioning, managing, and supporting BitLockerprotected devices. This guide helps you choose a deployment method for
MBAM and provides step-by-step instructions for each method.
| INTRODUCTION 1
Introduction
Organizations rely on BitLocker Drive Encryption and BitLocker To Go to protect data on
computers running the Windows 8.1, Windows 8, or Windows 7 operating systems; Windows to
Go; fixed data drives; and removable drives. Microsoft BitLocker Administration and Monitoring
(MBAM) version 2.5, which is included in the Microsoft Desktop Optimization Pack (MDOP) for
Microsoft Software Assurance, makes BitLocker implementations easier to deploy and manage
and allows administrators to provision and monitor encryption for operating system and fixed
data drives.
Reduced support effort. A customized MBAM Control Panel app replaces the default
BitLocker Control Panel item and allows users to manage local MBAM and BitLocker
| INTRODUCTION 2
configuration. Secure, web-based recovery key management portals allow help desk staff
and users recover BitLocker-enabled devices. Together, the customized Control Panel
app and these portals allow users and IT staff to perform common tasks, such managing
the BitLocker PIN, without you having to grant administrative rights to the managed
devices. Enabling self-service support helps reduce BitLocker-related help desk tickets by
enabling users to reset their own PINs and recover their own BitLocker-protected drives.
To learn more about taking advantage of MBAM in your business, see the Microsoft BitLocker
Administration and Monitoring content on the Microsoft Desktop Optimization Pack website.
This guide describes how to deploy MBAM, including the server architecture, with a focus on
automating the deployment and configuration of the MBAM client to managed devices. It first
describes the MBAM components. Then, it shows you how to prepare for deployment and
provides step-by-step instructions for deploying the MBAM client by using the following tools
and technologies:
| MBAM COMPONENTS 3
MBAM components
MBAM uses a clientserver model to manage BitLocker. You can deploy MBAM in either a
stand-alone or System Center Configuration Manager Integration topology. The following
sections describe each.
| MBAM COMPONENTS 4
Description
Administration and
Monitoring Server
| MBAM COMPONENTS 5
Computer or device
Description
Database Server
| MBAM COMPONENTS 6
Computer or device
Description
Management workstation
Managed device
| MBAM COMPONENTS 7
Computer or device
Description
If your organization does not have a System Center Configuration Manager infrastructure, see
MBAM Stand-alone topology.
| MBAM COMPONENTS 8
| MBAM COMPONENTS 9
Description
Administration and
Monitoring Server
Database Server
| MBAM COMPONENTS 10
Computer or device
Description
Configuration Manager
Primary Site Server
Management workstation
| MBAM COMPONENTS 11
Computer or device
Description
Managed device
AD DS domain controller
AD DS. MBAM requires an AD DS infrastructure and that the MBAM clients be domain
members.
SQL Server. MBAM requires SQL Server for storing MBAM compliance, audit, and recovery
information. MBAM also requires SQL Server Reporting Services for MBAM reports. For more
information on SQL Server requirements, see the section, SQL Server database
requirements, in the Microsoft BitLocker Administration and Monitoring 2.5 administrators
guide, which is available on Microsoft TechNet. For more information about deploying
SQL Server in the:
Group Policy. You manage MBAM client configuration by using Group Policy settings.
MBAM allows you to manage BitLocker and MBAM settings from a single template. For
more information, see Deploying the MBAM Group Policy settings.
Web server (Microsoft Internet Information Services [IIS]). The Administration and
Monitoring website and the Self-Service Portal run on IIS, which is installed as part of the
Web Server (IIS) server role.
The process to install the MBAM 2.5 server software is different from earlier MBAM versions. In
earlier versions, you installed and configured the software at the same time. In MBAM 2.5, you
use a two-step process to install and configure the software, which you repeat on each server in
your topology:
1. Run MBAMserversetup.exe to install the MBAM server software.
You can use the Microsoft BitLocker Administration and Monitoring Setup Wizard or
script installation by using command-line options. For more information, see the section
Installing the MBAM 2.5 Server Software in the Microsoft BitLocker Administration and
Monitoring 2.5 administrators guide.
2. Perform one of the following tasks to configure the databases, reports, web apps, and
optional System Center Configuration Manager Integration topology:
For more information, see the section Configuring the MBAM 2.5 Server Features in the
Microsoft BitLocker Administration and Monitoring 2.5 administrators guide.
Description
Stand-alone topology
Configuration Manager
Integration topology
For more information about MBAM server prerequisites, see the section MBAM 2.5
Server Prerequisites for Stand-alone and Configuration Manager Integration Topologies
in the Microsoft BitLocker Administration and Monitoring 2.5 administrators guide.
To deploy MBAM in the Configuration Manager Integration topology, perform the following
steps:
1. Deploy a supported version of SQL Server.
For more information about the versions of SQL Server that MBAM supports, see the
sections, SQL Server database requirements, SQL Server processor, RAM, and disk
space requirementsStand-alone topology, and SQL Server processor, RAM, and disk
Registering SPNs for the application pool account in the Microsoft BitLocker
Administration and Monitoring 2.5 administrators guide.
MBAM is agnostic in high-availability deployments. You install and configure it the same either
way, and you can use high-availability solutions from Microsoft or other vendors. For more
information about deploying MBAM in high-availability scenarios, see the section Planning for
MBAM 2.5 High Availability in the Microsoft BitLocker Administration and Monitoring 2.5
administrators guide.
19
Installation in the domains central store for ADMX files. Optionally, install the
templates in the central store for ADMX files to make them available to all administrators
editing Group Policy. This method ensures that administrators can edit MBAM Group
Policy settings even if they did not copy the administrative templates locally. However,
once you create a central store for the domain, you only see administrative templates
that are in the central store. Therefore, you must also copy any Windows 8.1, Windows 8,
and Windows 7 administrative templates that you want to use to the central store.
20
Advantages
Copying to
management
computers
Avoids having to
populate SYSVOL with
all of the administrative
templates you need
Only MBAM
administrators have
access to the
administrative
templates
Copying to the
central store for
ADMX files
Disadvantages
For more information about configuring a central store for ADMX files,
see the article Scenario 2: Editing Domain-Based GPOs Using ADMX Files.
Even though this guidance was written for Windows Server 2008, it still
applies to Windows Server 2008 R2 and Windows Server 2012.
21
For more information on how to install the MBAM Group Policy template, see the section,
Copying the MBAM 2.5 Group Policy Templates, in the Microsoft BitLocker Administration and
Monitoring 2.5 administrators guide.
22
Planning for MBAM 2.5 Group Policy Requirements, in the Microsoft BitLocker Administration
and Monitoring 2.5 administrators guide.
With MBAM 2.5, you can enforce encryption policies on operating system
and fixed data drives. You can also limit the number of days that users can
postpone encryption. Configure the new Group Policy setting Encryption
Policy Enforcement Settings in the Operating System Drive and Fixed
Drive categories that Table 5 describes. For more information, see the
section Ability to enforce encryption policies on operating system and
fixed data drives in the Microsoft BitLocker Administration and
Monitoring 2.5 administrators guide.
Description
Global
Client
Management
Fixed Drive
Category
Description
Operating
System Drive
Used to configure the settings that affect the operating system drive,
such as requiring users to encrypt the operating system drive and the
methods for recovering BitLocker-protected operating system drives.
These settings are located in the Operating System Drive node.
Removable
Drive
23
Configure the MBAM Group Policy settings in the GPOs that you have created (based on the
information in Table 5), and then link those GPOs to the OUs that contain the devices you will
use MBAM to manage. For more information on the MBAM Group Policy settings and the
suggested configuration, see the section, Planning for MBAM 2.5 Group Policy Requirements,
in the Microsoft BitLocker Administration and Monitoring 2.5 administrators guide.
24
2. Create a domain security group, such as MBAM Exempt Users, that contains the user
accounts of the users to be exempted.
3. Configure the MBAM User Exemption Policy GPO (created in step 1) to apply only to the
MBAM Exempt Users domain security group (created in step 2) by using GPO security
filtering, as shown in Figure 3.
MBAMClient.msi. This Windows Installer package contains the MBAM client and is
appropriate for deployment methods that require an .msi file, such as Group Policy
software deployment.
You can easily deploy the MBAM client by using almost any software or operating system
deployment tool. Table 6 lists the deployment methods that this guide describes and offers
suggestions for when to use each. You can also use a combination of these methods. For
example, you could use MDT to deploy the MBAM client during operating system deployment
and use Group Policy to deploy the MBAM client to existing computers.
Group Policy
MDT 2013
System Center
Configuration
Manager
Method
Scripted Installation
You want to deploy the MBAM client by using a nonMicrosoft ESD system
Use Windows PowerShell Remoting to run the MBAM client Setup program on a list
of remote computers. For more information about Windows PowerShell Remoting,
see the TechNet article, Running Remote Commands.
Use the Windows Sysinternals PsExec tool to run processes remotely with specific
credentials. For more information about PsExec and the other amazing tools in the
Sysinternals toolset, see the TechNet article, PsTools.
Use Group Policy preferences to schedule a job in Task Scheduler that runs the
MBAM client installation on targeted computers with credentials that you specify in
the task. For more information about scheduling tasks by using Group Policy
preferences, see the TechNet article, Configure a Scheduled Task Item.
In addition, many non-Microsoft tools are available to script the installation of programs
that require elevated permissions. Many of them are free or have a nominal cost.
System partition. This unencrypted partition is used to start the target device. The system
partition must have a minimum of 100 MB of space, but larger partitions are recommended.
If the system partition is 300 MB or larger, the Windows Recovery Environment is
automatically copied to the partition when BitLocker is enabled. By default, MDT
automatically creates a 512-MB system partition.
Windows partition. This encrypted partition contains the Windows operating system,
applications, and user data. It must meet the minimum required available disk space for the
desired operating system.
For new device deployments or when you are replacing an existing device with a new device, the
operating system deployment process automatically creates the appropriate partitions. This is
true if you are performing the deployment by using the operating system deployment media or
by using automated processes such as MDT or System Center 2012 R2 Configuration Manager.
However, in refresh device deployment scenarios, the existing device may have a partition
configuration that is inappropriate for BitLockerfor example, refreshing the Windows XP
operating system on an existing device with Windows 8. In these scenarios, you may need to
repartition the drive to support BitLocker before performing operating system deployment and
deploying the MBAM client. Ensure that you create the partitions based on the
The TPM must be physically enabled. The TPM must be physically enabled on the targeted
device before BitLocker and MBAM can use it. Enabling the TPM by using the BIOS or UEFI
on the device or by using scripts to automate the process.
Set ownership of the TPM. Taking ownership of the TPM allows MBAM help desk
personnel to provide users with a file they can use to reset the TPM on their devices.
However, it is not required that MBAM own the TPM. Windows can automatically provision
and take ownership of the TPM, which allows the TPM management within Windows. If
Windows owns the TPM, MBAM will be unable to help users reset the TPM on their device.
manufacturer and sometimes within models. For fully automated deployment, such as MDT or
System Center Configuration Manager, ensure that the TPM for the device is physically enabled
within the BIOS or UEFI prior to image deployment.
Most hardware vendors provide software that allows you to enable the TPM from the command
line. For information about the software for enabling a TPM from a command line, contact each
specific hardware vendor.
For information on how to run the software to enable the TPM from a command line for each
deployment method, see the step for enabling the TPM on targeted devices in the following
sections:
Scripted installation
Table 7 lists the operating systems and the recommendation for configuring TPM ownership.
There are advantages to MBAM owning the TPM and storing recovery passwords versus the
operating system doing the same:
The OwnerAuth password file is more secure, because fewer people have access to the
MBAM database that stores the file.
MBAM help desk users can use the Administration and Monitoring website to provide
recovery passwords to users if their TPM is locked.
Ownership
Windows 7
MBAM owns the TPM, which allows MBAM to help reset the
TPM.
Windows 8.1 and Windows 8 automatically provision the TPM. If you want MBAM to store and
manage TPM recovery keys, you must turn off TPM auto-provisioning in the operating system
and clear the TPM, which the following Windows PowerShell commands do, before deploying
MBAM. Then, restart the computer and confirm that you want to clear the TPM.
# Get an instance of the TPM WMI class
$tpm=get-wmiobject -class Win32_Tpm `
-namespace root\cimv2\security\microsofttpm
# Disable TPM auto-provisioning
$tpm.DisableAutoProvisioning()
# Clear the TPM
$tpm.SetPhysicalPresenceRequest(22)
After disabling auto-provisioning and clearing the TPM, deploy MBAM and use it to provision
the TPM. You must ensure that the Require TPM Backup to AD DS option is not set in the
Turn on TPM backup to Active Directory Domain Services Group Policy setting. See the
section, Configure MBAM to own the TPM and store OwnerAuth passwords, in the Microsoft
BitLocker Administration and Monitoring 2.5 administrators guide for more information.
To perform BitLocker pre-provisioning, the TPM must be enabled by one of the following
methods:
Manually configuring the BIOS or UEFI. This method requires that the user performing
the deployment manually enable the TPM in the BIOS or UEFI. After the TPM is manually
enabled, the operating system deployment can go on as normal.
If you cannot use BitLocker pre-provisioning, you must enable BitLocker after the operating
system is deployed and the full operating system is running. The length of time to encrypt after
the operating system is deployed depends on the operating system, as shown in Table 8.
Encryption behavior
Windows 8
Can use the Used Disk Space Only feature to reduce the
amount of time needed to encrypt the drive. This is the
default behavior for MDT task sequences.
Windows 7
Can use the Used Disk Space Only feature to reduce the
amount of time needed to encrypt the drive when using
Windows PE 4.0 or a later version. This is the default behavior
for MDT task sequences.
it prepares the TPM and pre-provisions BitLocker for MBAM. The property
OSDBitLockerMode must be set to TPM. Run this script early in the task sequence,
preferably in the Preinstall Phase, and set the condition Task sequence variable
_SMSTSWTG not equals TRUE so that it does not run on Windows To Go. Disable the
existing Enable BitLocker (Offline) step in the Preinstall Phase. You can also run this
script in the State Restore phase of Refresh scenarios to partition the drive for BitLocker,
if it is running from a live operating system with a single partition occupying the entire
hard drive.
To target MBAM client installation, link the GPO to specific OUs, use security filtering, or use
Windows Management Instrumentation (WMI) filtering. For example, you can filter the GPO to
target computers in a particular security group or computers that are running Windows 8 or
Windows 7.
You cannot use command-line options when you use Group Policy to
deploy the MBAM client. In this scenario, the easiest way to configure the
MBAM client is to use the MBAM Group Policy administrative templates.
Alternatively, you can create a transform for the MBAM client Windows
Installer package files and apply that transform when you create the GPO.
Step 1: Ensure that partitions on targeted devices are configured for BitLocker
Before you can enable encryption with MBAM, you must ensure that the partitions on the
targeted devices are configured properly for BitLocker deployment. Group Policy software
installationbased deployments are always performed on devices where the operating system
has been deployed. Ensure that the partitions on the targeted devices are configured properly
for BitLocker deployment, as described in the section, BitLocker partition configuration
requirements in this guide.
In some instances, the vendor-specific software may be scripts and cannot be easily
packaged as an .msi file. In these instances, use one of the other methods for enabling
TPM.
2. Create a network shared folder that contains the .msi package created in the previous
step.
3. Create a GPO to install the .msi package (such as Enable TPM Policy).
4. Configure the existing MBAM client installation GPO (MBAM Client Installation) to use a
WMI query to determine whether the TPM is enabled on targeted devices.
5. Target the Enable TPM Policy GPO for different processor versions (64 bit or 32 bit), if
applicable.
6. Link the Enable TPM Policy GPO to the appropriate OUs.
Step 3: Share the installation files
You must create a network share that contains the MBAM client Setup files. This network share
must be accessible to all computers on which you want to install the MBAM client. Grant Read
access to the Domain Computers group or to the Authenticated Users group.
To create and share a folder for the MBAM client installation files
1. On SERVER, create MBAM_Client_Setup, where SERVER is the name of the file server and
MBAM Client Setup is the name of the folder you are creating to contain the MBAM client
installation files.
2. Configure NTFS file system permissions for the folder MBAM_Client_Setup, as Table 9
describes. To configure NTFS file system permissions, right-click the folder, click
Properties, and then click Advanced on the Security tab.
Permissions
Applies to
Administrators
Full control
Authenticated Users
3. Share the folder MBAM_Client_Setup by using the permissions that Table 10 describes. To
configure share permissions, right-click the folder, click Properties, and then click
Advanced Sharing on the Sharing tab.
Permissions
Authenticated Users
Read
4. Copy the contents of the MBAM\Installers\2.5 folder from the MBAM distribution media
to \\SERVER\MBAM_Client_Setup.
The MBAM\Installers\2.5 folder includes the x64 and x86 folders, which contain the 64bit and 32-bit versions of the MBAM client, respectively. Copy the entire contents of the
folder so that both versions are available for deployment.
Step 4: Create a GPO to install the MBAM client
You create GPOs by using the Group Policy Management Console (GPMC) on a server or on a
client running the Remote Server Administration Tools. You can create a GPO that installs only
the MBAM client, or you can configure the MBAM client by using the same GPO to keep all of
your MBAM policies in one location. The steps in this section install both the x64 and x86 agents
by using a single GPO, allowing Group Policy to determine the correct version to install.
To create and edit a GPO to deploy the x64 and x86 MBAM client
1. In the GPMC, create a new GPO for MBAM client installation (e.g., MBAM Client
Installation):
a. Right-click Group Policy Objects under Forest\Domains\Domain, and then click
New.
b. In the Name box, type MBAM Client Installation, and then click OK.
2. In the navigation pane, right-click MBAM Client Installation, and then click Edit.
Description
Security
filtering
Method
Description
WMI
filtering
Windows 8.1 and Windows 8 include the BitLocker Used Disk Space Only
encryption feature, which encrypts only the disk space currently in use
instead of the entire disk volume. This feature dramatically reduces the
time required to encrypt a volume. By default, MDT automatically
performs Used Disk Space Only encryption to reduce deployment time
when enabling BitLocker for Windows 8. MDT does not support MBAM
natively, however, but you can customize it to pre-provision and
immediately start MBAM encryption in a task sequence. For more
information, see the section TPM and BitLocker pre-provisioning.
The following sections describe the steps necessary to complete each task in the Deployment
Workbench:
1. Ensure that partitions on targeted devices are configured for BitLocker.
2. Enable the TPM on targeted devices.
3. Add the MBAM client to the Applications node of your deployment share.
4. Configure the MBAM client application to hide it from users in the Deployment Wizard.
5. Add an Install Application step to your existing operating system task sequences.
6. Configure the MDT BitLocker-related configuration settings.
7. Pre-provision BitLocker for the MBAM client (ZTIPrepareBDE.wsf).
8. Start MBAM encryption immediately during tasks sequences (StartMBAMEncryption.wsf).
Step 1: Ensure that partitions on targeted devices are configured for BitLocker
Before you can enable with MBAM, ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment. For new devices or for devices that are being
replaced, MDT automatically creates the necessary partitions to support BitLocker. When
refreshing an existing device, LTI automatically resizes and creates the necessary partitions to
support BitLocker, if there is sufficient available disk space.
Step 2: Enable the TPM on targeted devices
Before you deploy the MBAM client to the targeted devices, enable the TPM on those devices.
The scripts or software for enabling the TPM are different for each device manufacturer and
sometimes even across models within a device manufacturer.
By default, LTI performs BitLocker pre-provisioning for new device and replace device
deployment scenarios. BitLocker pre-provisioning occurs while the target device is running
Windows PE in the Preinstall phase of the task sequence. If the scripts or software for enabling
the TPM can:
Forgo BitLocker pre-provisioning and encrypt after the operating system is deployed but
still as a part of the task sequence
For more information on the TPM and BitLocker pre-provisioning, see TPM and BitLocker preprovisioning.
To automatically enable the TPM and support BitLocker pre-provisioning by using scripts
or software that can run in Windows PE
1. Create a network shared folder that contains the vendor-specific software for enabling the
TPM.
2. Create an MDT application that contains the software in the previous step.
3. Install the application by using the Install Application task sequence step.
Place the Install Application task sequence step in the Preinstall group immediately before
the Enable BitLocker (Offline) task sequence step.
To automatically enable the TPM by using scripts or software that can run only in a
Windows operating system (no BitLocker pre-provisioning support)
1. Create a network shared folder that contains the vendor-specific software for enabling the
TPM.
2. Create an MDT application that contains the software in the previous step.
3. Install the application by using the Install Application task sequence step.
Place the Install Application task sequence step in the State Restore group.
For more information on enabling the TPM, see Enable the TPM.
Page
Steps
Application Type
Page
Steps
Details
Source
Destination
Command Details
Page
Steps
Summary
1. In the Details area, review the information that the Add New
Application Wizard collected.
2. Click Next.
Progress
Confirmation
If you also need to deploy the 32-bit version of MbamClientSetup.exe, repeat the New
Application Wizard, changing the following:
Required:
o
BDEInstallSuppress=NO
OSDBitLockerMode=TPM
Optional:
o
BDEDriveLetter
BDEDriveSize
TPMOwnerPassword
For more information these MDT properties, see the corresponding sections in the MDT
document Toolkit Reference.
Step 7: Add a task sequence step to pre-provision BitLocker for the MBAM client
Disable the existing Enable BitLocker (Offline) step in the Preinstall Phase. Then, add a new
step to run the script ZTIPrepareBDE.wsf, which pre-provisions BitLocker and is compatible with
MBAM. For more information, see the section TPM and BitLocker pre-provisioning, earlier in
this guide.
Step 8: Add a task sequence step to immediately start encryption by using the MBAM client
Disable the existing Enable BitLocker step in the State Restore Phase. Then, add a new step to
run the script StartMBAMEncryption.wsf, which starts MBAM encryption immediately to report
the recovery key to the MBAM service end point. For more information, see the section TPM
and BitLocker pre-provisioning, earlier in this guide.
Deployment to existing computers. This method deploys the MBAM client to targeted
computers that already exist or deploys the MBAM client immediately after operating
system deployment is complete. The advantage of this method is that it covers both
scenarios (existing computers and new computers). This process will be discussed in the
section, System Center 2012 R2 Configuration Manager Application Model.
Installation during operating system deployment. This method installs the MBAM
client during operating system deployment so that the agent is immediately available.
The benefit of this method is that the encryption can be started or completed before
users receive their device, and the device is protected before the user starts it for the first
time. After you create the application in the Configuration Manager console, simply add
an Install Application step to the operating system deployment task sequence. This
process is discussed in this section.
You can deploy the MBAM client during operating system deployment by using the Zero Touch
Installation (ZTI) and User-Driven Installation (UDI) processes in MDT. You do this by adding the
client installation files as an application, and then adding an Install Application step for the
agent to your existing operating system deployment task sequences.
By installing the MBAM client as part of the operating system deployment task sequence, ZTI
and UDI install the client automatically, which ensures that that the encryption is started or
completed before users receive their device and the device is protected before users starts it for
the first time.. The MBAM client will be ready for use before users log on to the device for the
first time.
Windows 8.1 and Windows 8 include the BitLocker Used Disk Space Only
encryption feature, which encrypts only the disk space currently in use
instead of the entire disk volume. This feature dramatically reduces the
time required to encrypt a volume. By default, MDT automatically
performs Used Disk Space Only encryption to reduce deployment time
when enabling BitLocker for Windows 8. MDT does not support MBAM
natively, however, but you can customize it to pre-provision and
immediately start MBAM encryption in a task sequence. For more
information, see the section TPM and BitLocker pre-provisioning.
The following tasks describe the steps necessary to complete each task:
1. Ensure that partitions on targeted devices are configured for BitLocker.
2. Enable the TPM on targeted devices.
3. Create and share a content folder for the MBAM client installation files.
4. Create a System Center 2012 R2 Configuration Manager application for the MBAM client
installation.
5. Distribute the System Center 2012 R2 Configuration Manager application to the
distribution points.
6. Deploy the System Center 2012 R2 Configuration Manager application to the targeted
computers.
7. Add an Install Application step to your existing operating system task sequences.
8. Configure the MDT BitLocker-related configuration settings.
9. Pre-provision BitLocker for the MBAM client (ZTIPrepareBDE.wsf).
10. Start MBAM encryption immediately during tasks sequences (StartMBAMEncryption.wsf).
Step 1: Ensure that partitions on targeted devices are configured for BitLocker
Before you can use MBAM, you need to ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment. For new devices or devices that are being
replaced, MDT automatically creates the necessary partitions to support BitLocker. When
refreshing an existing device, MDT automatically resizes and creates the necessary partitions to
support BitLocker (if there is sufficient available disk space) after the operating system has been
deployed in the State Restore group.
If you want ZTI and UDI to automatically create the appropriate partitions
for the refresh device deployment scenario in ZTI and UDI, perform a
replace device deployment scenario, and treat the existing device as the
original and replacement device. In this way, you back up the user state
from the device, wipe the device, deploy the operating system, and then
restore the user state to the device. Ensure that you store the user state in
a network shared folder or in local storage on a disk other than where the
operating system will be deployed.
Forgo BitLocker pre-provisioning and encrypt after the operating system is deployed but
still as a part of the task sequence
For more information on the TPM and BitLocker pre-provisioning, see TPM and BitLocker preprovisioning.
To automatically enable the TPM and support BitLocker pre-provisioning by using scripts
or software that can run in Windows PE
1. Create a network shared folder that contains the vendor-specific software for enabling the
TPM.
2. Create an application that contains the software in the previous step.
3. Install the application by using the Install Application task sequence step.
Place the Install Application task sequence step in the Preinstall group immediately before
the Pre-provision BitLocker task sequence step.
To automatically enable the TPM by using scripts or software that can run only in a
Windows operating system (no BitLocker pre-provisioning support)
1. Create a network shared folder that contains the vendor-specific software for enabling the
TPM.
Table 12. NTFS file system permissions for the MBAM client setup
folder
Account
Permissions
Applies to
Administrators
Full control
Site_Server_Account
Read and
Execute
3. Share the folder MBAM_Client_Setup by using the permissions that Table 13 describes. To
configure share permissions, right-click the folder, click Properties, and then click the
Sharing tab.
Table 13. Share permissions for the MBAM client setup folder
Account
Permissions
Administrators
Full control
Site_Server_Account
Full control
4. Copy the contents of the MBAM\Installers\2.5 folder from the MBAM distribution media
to \\SERVER\MBAM Client Setup.
The MBAM\Installers\2.5 folder includes the x64 and x86 folders, which contain the 64bit and 32-bit versions of the MBAM client, respectively. Copy the entire contents of the
folder so that both versions are available for deployment.
Step 4: Create the MBAM client application
When you create a System Center 2012 R2 Configuration Manager application, you must specify
the command that installs it. Although you could run MbamClientSetup.exe to install the MBAM
client, MBAMClient.msi requires less effort because of automatic detection of product codes and
other application settings. Creating applications in System Center 2012 R2 Configuration
Manager is based on MSI files, which:
Allow System Center 2012 R2 Configuration Manager to detect whether the application
is already installed
To create the MBAM client application in System Center 2012 R2 Configuration Manager
1. In the Configuration Manager console, click the Software Library workspace.
Page
Steps
General
General: General
Information
General:
Application
Catalog
1. Click Next.
General:
The text boxes on this page are optional and prompt for
information that you want to display in the application catalog.
However, this deployment guide recommends that you hide the
MBAM client from the application catalog.
Page
Deployment Types
Steps
the MBAM client (MBAMClient.msi in the
MBAM\Installers\2.5\x64 folder).
2. On the General page of the Create Deployment Type
Wizard, click Browse, open MBAMClient.msi from the
location in which you shared the installation sources
(e.g., \\SERVER\MBAM_Client_Setup), and then click Next.
3. On the Import Information page of the Create Deployment
Type Wizard, click Next.
4. On the General Information page of the Create
Deployment Type Wizard, perform the following steps:
a. In the Name box, append x64 to the end of the
name for easier identification later.
b. In the Installation program box, add /q to the end
of the command.
c. Click Next.
5. On the Requirements page of the Create Deployment Type
Wizard, perform the following steps:
a. Click Add.
b. Click Operating system in the Condition list.
c. In the operating system list, select All Windows 7
(64-bit), All Windows 8 (64-bit), and All
Windows 8.1 (64-bit). (Select the 64-bit operating
systems that you want to support.)
d. Click OK.
e. Click Next.
6. On the Dependencies page of the Create Deployment Type
Wizard, click Next.
Page
Steps
7. On the Summary page of the Create Deployment Type
Wizard, review the deployment type details, and then click
Next.
8. On the Completion page of the Create Deployment Type
Wizard, click Close.
9. Repeat steps 1 through 8 on this page for the 32-bit version
of the MBAM client (MBAMClient.msi in the
MBAM\Installers\2.5\x86), and then click Next.
Summary
Progress
Completion
Page
Steps
General
1. Click Next.
General: Content
1. Click Next.
General: Content
Destination
Summary
Progress
Completion
After completing the Distribute Content Wizard, verify successful distribution of the installation
content before continuing to deploy the MBAM client application. To do so, click Refresh in the
Application area of the Ribbon. Click MBAM Client in the results pane to see the distribution
status on the Summary tab at the bottom. When the content status shows that content
distribution is successful, you can deploy the MBAM client application.
Step 6: Deploy the MBAM client application
You can deploy the MBAM client application to users or devices. Because the agent is computercentric, Microsoft recommends that you deploy it to computer collectionsnot user collections.
You use the Deploy Software Wizard in the Configuration Manager console to deploy the
MBAM client application after you have successfully distributed it.
To deploy the MBAM client System Center 2012 R2 Configuration Manager application
1. In the results pane, click MBAM Client.
2. In the Deployment group on the Ribbon, click Deploy.
3. Complete each page of the Deploy Software Wizard:
Page
Steps
General
Content
1. Click Next.
Deployment
Settings
Page
Steps
Scheduling
1. Click Next.
User Experience
Alerts
1. Click Next.
Summary
Progress
Completion
To install the MBAM client in a System Center 2012 R2 Configuration Manager task
sequence
1. In the Configuration Manager console, click the Software Library workspace.
2. In the Software Library workspace, click Task Sequences in Overview\Operating Systems.
3. In the results pane, right-click the task sequence to which you want to add the MBAM
client, and then click Edit.
4. Click the Install Applications group under the State Restore group. The task sequence
editor adds the new step in this group.
5. From the Add menu, click General, and then click Install Application.
6. Click the new Install Application task sequence step that you just added, then perform
the following steps:
a. In the Name box, type Install the MBAM Client.
b. Click New (the button that looks like a star), click the MBAM client application in
the Select The Application To Install dialog box, and then click OK.
c. Optionally, on the Options tab, select the Continue on error check box.
Select this check only if you want the task sequence to continue running if the
MBAM Client fails to install during operating system deployment.
7. Click OK to close the Task Sequence Editor dialog box.
Required:
o
BDEInstallSuppress=NO
OSDBitLockerMode=TPM
Optional:
o
BDEDriveLetter
BDEDriveSize
TPMOwnerPassword
For more information on these MDT properties, see the corresponding sections in the MDT
document Toolkit Reference.
Step 9: Add a task sequence step to pre-provision BitLocker for the MBAM client
Disable the existing Pre-provision BitLocker step in the Preinstall phase. Then, add a new step
to run the script ZTIPrepareBDE.wsf, which pre-provisions BitLocker and is compatible with
MBAM. For more information, see the section TPM and BitLocker pre-provisioning, earlier in
this guide.
Step 10: Add a task sequence step to immediately start encryption by using the MBAM client
Disable the existing Enable BitLocker step in the State Restore Phase. Then, add a new step to
run the script StartMBAMEncryption.wsf, which starts MBAM encryption immediately to report
the recovery key to the MBAM service end point. For more information, see the section TPM
and BitLocker pre-provisioning, earlier in this guide.
Deployment to existing computers. This method deploys the MBAM client to targeted
computers that already exist or deploys the MBAM client immediately after operating
system deployment is complete. The advantage of this method is that it covers both
scenarios (existing computers and new computers). This process is discussed in this
section.
Installation during operating system deployment. This method installs the MBAM
client during operating system deployment so that the agent is immediately available.
The benefit of this method is that the encryption can be started or completed before
users receive their device, and the device is protected before the user starts it for the first
time. After you create the application in the Configuration Manager console, simply add
an Install Application step to the operating system deployment task sequence. This
process was discussed in the section, Zero Touch Installation and User-Driven Installation
in MDT 2013.
You can also deploy the MBAM client by using the package and program
feature in System Center Configuration Manager 2007. For more
information on how to deploy software using the package and program
feature, see Tasks for Software Distribution.
The following sections describe the steps necessary to complete each task in the Configuration
Manager console:
1. Ensure that the partitions on the targeted devices are configured for BitLocker.
2. Enable the TPM on targeted devices (if not already enabled).
3. Create and share a content folder for the MBAM client installation files.
4. Create a System Center 2012 R2 Configuration Manager application for the MBAM client
installation.
5. Distribute the System Center 2012 R2 Configuration Manager application to the
distribution points.
6. Deploy the System Center 2012 R2 Configuration Manager application to the targeted
computers.
You can automate the steps listed above by creating a custom System
Center Configuration Manager task sequence. For more information, see
the section, To create a custom task sequence, in the TechNet article
How to Create Task Sequences.
For more information about using System Center 2012 R2 Configuration Manager to deploy
applications, see the Microsoft TechNet article, System Center Technical Resources.
Step 1: Ensure that partitions on targeted devices are configured for BitLocker
Before you can enable with MBAM, ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment. Because this section focuses on deploying the
MBAM client on existing devices, the deployment is always performed on devices where the
operating system has been deployed. Ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment as described in the section, BitLocker partition
configuration requirements in this guide.
Table 14. NTFS file system permissions for the MBAM client setup
folder
Account
Permissions
Applies to
Administrators
Full control
Site_Server_Account
Read and
Execute
3. Share the folder MBAM_Client_Setup by using the permissions that Table 15 describes. To
configure share permissions, right-click the folder, click Properties, and then click the
Sharing tab.
Table 15. Share permissions for the MBAM client setup folder
Account
Permissions
Administrators
Full control
Site_Server_Account
Full control
4. Copy the contents of the MBAM\Installers\2.5 folder structure from the MBAM
distribution media to \\SERVER\MBAM Client Setup.
The MBAM\Installers\2.5 folder includes the x64 and x86 folders, which contain the 64bit and 32-bit versions of the MBAM client, respectively. Copy the entire contents of the
folder so that both versions are available for deployment.
Step 4: Create the MBAM client application
When you create a System Center 2012 R2 Configuration Manager application, you must specify
the command that installs it. Although you could run MbamClientSetup.exe to install the MBAM
client, MBAMClient.msi requires less effort because of automatic detection of product codes and
Allow System Center 2012 R2 Configuration Manager to detect whether the application
is already installed
To create the MBAM client application in System Center 2012 R2 Configuration Manager
1. In the Configuration Manager console, click the Software Library workspace.
2. In the Software Library workspace, click Applications in Overview\Application
Management.
3. In the Create group on the Ribbon, click Create Application.
4. Complete each page of the Create Application Wizard:
Page
Steps
General
Page
Steps
General: General
Information
General:
Application
Catalog
1. Click Next.
General:
Deployment Types
The text boxes on this page are optional and prompt for
information that you want to display in the application catalog.
However, this deployment guide recommends that you hide the
MBAM client from the application catalog.
Page
Steps
Deployment Type Wizard, perform the following steps:
a. In the Name box, append x64 to the end of the
name for easier identification later.
b. In the Installation program box, add /q to the end
of the command.
c. Click Next.
5. On the Requirements page of the Create Deployment Type
Wizard, perform the following steps:
a. Click Add.
b. Click Operating system in the Condition list.
c. In the operating system list, select All Windows 7
(64-bit), All Windows 8 (64-bit), and All
Windows 8.1 (64-bit). (Select the 64-bit operating
systems that you want to support.)
d. Click OK.
e. Click Next.
6. On the Dependencies page of the Create Deployment Type
Wizard, click Next.
7. On the Summary page of the Create Deployment Type
Wizard, review the deployment type details, and then click
Next.
8. On the Completion page of the Create Deployment Type
Wizard, click Close.
9. Repeat steps 1 through 8 on this page for the 32-bit version
of the MBAM client (MBAM\Installers\2.5\x86), and then
click Next.
Page
Steps
Summary
Progress
Completion
Page
Steps
General
1. Click Next.
General: Content
1. Click Next.
General: Content
Destination
Summary
Progress
Completion
After completing the Distribute Content Wizard, verify successful distribution of the installation
content before continuing to deploy the MBAM client application. To do so, click Refresh in the
Application area of the Ribbon. Click MBAM Client in the results pane to see the distribution
status on the Summary tab at the bottom. When the content status shows that content
distribution is successful, you can deploy the MBAM client application.
Page
Steps
General
Content
1. Click Next.
Page
Steps
Deployment
Settings
Scheduling
1. Click Next.
User Experience
Alerts
1. Click Next.
Summary
Progress
Page
Steps
Completion
Scripted installation
If you do not use MDT or System Center 2012 R2 Configuration Manager to deploy applications
in your environment and you do not want to use Group Policy software installation, you can
script installation by using batch scripts, Windows PowerShell scripts, and so on. With this
technique, you are essentially performing a command-line installation. You can use the same
technique to install the MBAM client by using any non-Microsoft ESD system.
The following sections describe the steps necessary to complete each task:
1. Ensure that the partitions on the targeted devices are configured for BitLocker.
2. Enable the TPM on targeted devices (if not already enabled).
3. Create and share a folder containing the MBAM client installation files.
4. Run MbamClientSetup.exe from the network share containing the installation files.
Step 1: Ensure that partitions on targeted devices are configured for BitLocker
Before you can use MBAM, you need to ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment. Because this section focuses on deploying the
MBAM client on existing devices, the deployment is always performed on devices where the
operating system has been deployed. Ensure that the partitions on the targeted devices are
configured properly for BitLocker deployment as described in the section, BitLocker partition
configuration requirements, in this guide.
To configure NTFS file system permissions, right-click the folder, click Properties, and
then click Advanced on the Security tab.
Table 16. NTFS file system permissions for the distribution folder
Account
Permissions
Applies to
Administrators
Full control
Authenticated Users
3. Share the folder MBAM_Client_ Setup by using the permissions that Table 17 describes.
To configure share permissions, right-click the folder, click Properties, and then click the
Sharing tab.
Permissions
Authenticated Users
Read
4. Copy the contents of the MBAM\Installers\2.5 folder structure from the MBAM
distribution media to \\SERVER\MBAM Client Setup.
The MBAM\Installers\2.5 folder includes the x64 and x86 folders, which contain the
64-bit and 32-bit versions of the MBAM client, respectively. Copy the entire contents of
the folder so that both versions are available for deployment.
Step 4: Run MbamClientSetup.exe
For a scripted installation, the command you use to install the MBAM client must include the /q
command-line option to perform an unattended installation. This option runs
MbamClientSetup.exe with no user interaction, as shown in the following example. If you do not
include this command-line option, the Setup program stalls the deployment process to wait for
user interaction.
MbamClientSetup.exe /q
You must run the 64-bit or 32-bit version of MbamClientSetup.exe, based on the target
operating system version.
78
79
80
You can reset a TPM lockout only if MBAM was used to initially provision
the TPM. If the TPM was provisioned prior to MBAM deployment, the TPM
data may be stored in AD DS if the appropriate Group Policy settings
were configured and you cannot reset a TPM lockout by using MBAM.
The MBAM Help Desk Portal returns one of the following results:
A message indicating that no matching TPM owner password file was found
4. Click Save.
Doing so saves the TPM owner password file.
81
5. Run the TPM management console, select the Reset TPM lockout option, and provide
the TPM owner password file to reset the TPM lockout.
The TPM hash value and TPM owner password should only be
used by authorized help desk and support personnel for the
purpose of resolving a TPM lockout scenario. Microsoft does not
recommend providing this information directly to users, because
the TPM information does not change and could pose a security
risk if the information does not remain secure.
For more information about how to reset a TPM lockout and other BitLocker management
tasks that you can perform with MBAM, see the section, Performing BitLocker Management
with MBAM 2.5, in the Microsoft BitLocker Administration and Monitoring 2.5
administrators guide.
| CONCLUSION 82
Conclusion
Deploying MBAM can be easy and requires minimal updates to your existing infrastructure. You
can deploy the MBAM server components in a Stand-alone topology or, if you want to integrate
with an existing System Center Configuration Manager infrastructure, a Configuration Manager
Integration topology. In either case, you can evaluate MBAM on a single server or deploy the
MBAM server components in your production environment on multiple servers so that you can
scale to a size appropriate for your organization.
With the infrastructure in place, you can use highly automated processes such as Group Policy,
MDT, System Center Configuration Manager, or scripted installation methods to deploy the
MBAM client and provision BitLocker on user devices. From there, use the MBAM Group Policy
The Microsoft Desktop Optimization Pack website to learn more about its business benefits
The Microsoft BitLocker Administration and Monitoring content on TechNet for technical
information, including videos that provide an overview and demonstrate how to set up and
configure MBAM