


If you don’t see one listed, there might still be one on your system, but it might be disabled and need to be enabled in your computer's BIOS. NOTE: To determine if you have a TPM enabled, check the device manager and look for a Security Devices section. If the TPM detects an unauthorized change your PC will boot in a restricted mode to deter potential attackers.


Enables end-users to recover encrypted devices independently by using the Self-Service Portal.Reduces the workload on the Help Desk to assist end-users with BitLocker PIN and recovery key requests.Enables security officers to quickly determine the compliance state of individual computers or even of the enterprise itself.Enables administrators to automate the process of encrypting volumes on client computers across the enterprise.In addition, you can access recovery key information when users forget their PIN or password or when their BIOS or boot record changes. You can also report on the encryption status of an individual computer and on the unit as a whole. You can configure MBAM Group Policy Templates that enable you to set BitLocker Drive Encryption policy options that are appropriate for your unit, and then use them to monitor client compliance with those policies. Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 provides a simplified administrative interface that you can use to manage BitLocker Drive Encryption.
