Encrypting endpoint device drives

Coro enables you to remotely encrypt internal and external drives on Windows and macOS devices.

When you apply encryption:

  • Drive encryption takes place in the background.
  • A device does not have to be online at the time you apply encryption. Encryption starts the next time the device is online.
Important

Coro supports encryption on macOS internal drives and external Apple File System (APFS) drives.

Coro uses an implementation of FileVault to encrypt macOS drives. See Apple's FileVault documentation for more details:

Documentation for other macOS versions is also available.

Important

Coro supports encryption on Windows internal and external drives, including:

  • Drives with suspended encryption.
  • Drives encrypted using BitLocker's used space option.

Coro uses an implementation of Microsoft BitLocker to encrypt Windows drives. See Microsoft's BitLocker documentation (https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/) for more details.

Coro supports:

Prerequisites

Before encrypting drives, make sure your devices meet the requirements for their operating system (OS).

macOS

Before you start, make sure:

  • The Coro Agent is running on the endpoint device.
  • The Coro Endpoint Security module is active.
  • FileVault is installed on the device.
  • You have admin user access to your Coro workspace.
    note

    Bulk drive encryption requires MSP admin user access.

Windows

Before you start, make sure:

  • The Coro Agent is running on the endpoint device.
  • The Coro Endpoint Security module is active.
  • BitLocker is installed on the device.
  • A Trusted Platform Module (TPM) is installed on the device.
  • The system drive is first in the boot sequence.
  • You have admin user access to your Coro workspace.
    note

    Bulk drive encryption requires MSP admin user access.

Single-drive encryption

Admin users with sufficient permissions encrypt drives on individual devices within a workspace.

Managed Service Provider (MSP) admin users with sufficient permissions can also encrypt drives on individual devices across parent (channel) and child workspaces.

To activate and manage single-drive encryption, use the Coro console. The method you use depends on your Endpoint Security device posture configuration.

Where you have configured an Unencrypted Endpoint Drive device policy for your devices, Coro creates Unencrypted endpoint drive tickets in the Ticket Log each time such a drive is identified. See Encrypting drives from the Ticket Log.

Alternatively, use the Devices page to browse all devices, then select the Unencrypted Endpoint Drive vulnerability to see all affected drives. See Encrypting drives from the Devices page.

Encrypting drives from the Ticket Log

Admin users and MSP admin users encrypt individual drives from the Ticket Log.

To encrypt a drive from the Ticket Log:

  1. Sign in to the Coro console .
  2. From the sidebar, select Views > Ticket Log :

    Ticket Log

    Coro displays the Ticket Log:

    Ticket Log

    Important

    MSP admin users can also access the Global Ticket Log to view tickets across parent (channel) and child workspaces.

  3. In the Type dropdown, select Unencrypted Endpoint Drive from the Endpoint Security section to show only those tickets indicating unencrypted drives:

    ticket filter

  4. From the left pane, select the ticket referencing the drive you want to encrypt. Then, from the right pane, select ACTIONS > Encrypt drive :

    drive details

    Coro displays a confirmation message:

    confirm

  5. (Optional) Select Close this and related tickets to automatically close this and all related open tickets.
  6. Select YES .

    After encryption is triggered, Coro displays a confirmation message:

    confirm

    Coro updates the corresponding ticket's Activity Log:

    log update

note

If you are satisfied that unencrypted drives in this device are low risk and do not require encryption, select ACTIONS > Allow no encryption to stop further warnings.

Encrypting drives from the Devices page

Admin users and MSP admin users can also encrypt individual drives from the Devices page.

To encrypt a drive from the Devices page:

  1. Sign in to the Coro console .
  2. From the sidebar, select Views > Devices :

    Devices list

    Coro displays the Devices page:

    Devices list

    Important

    MSP admin users can also access the global devices page to encrypt individual drives across parent (channel) and child workspaces.

  3. In the Vulnerability dropdown, select Unencrypted Endpoint Drive :

    Devices list add vulnerability

  4. From the left pane, select the device containing the drive you want to encrypt. Then, from the right pane, locate the affected drive from the Drives section and select ENCRYPT :

    drive details

  5. Follow the confirmation prompt to activate encryption.

    After encryption is complete, expand the Drives section to view the recovery key:

    Recovery key

    important

    Coro manages and displays recovery keys for encrypted drives. It:

    • Displays the recovery key for encrypted drives after they are unlocked with the correct password.
    • Does not display the recovery key for locked encrypted drives.
    • Displays the recovery key for drives it encrypts and for unlocked drives encrypted by third-party software.
    Important

    When a device user decrypts a drive, Coro removes the recovery key from the expanded Drives section.

Bulk drive encryption

MSP admin users can also encrypt drives in bulk across all devices in parent (channel) and child workspaces. This centralizes encryption management and gives organization-wide visibility into device encryption status.

Bulk encrypting drives from the Global devices page

MSP admin users bulk encrypt drives from the global devices page.

To bulk encrypt drives:

  1. Access the global devices page .
  2. Select Drives :

    Drives

  3. Select the checkboxes next to the drives you want to encrypt.
    • To include or exclude every drive on the current page, use the checkbox at the top of the list:

      Global devices all current page

    • To include or exclude every drives across all pages, select the dropdown next to the checkbox, then choose an action:

      Global devices across all pages

    note

    If you include drives that are already encrypted, Coro only encrypts those that are not yet encrypted.

  4. From the top of the global drives list, select the ACTIONS dropdown:

    Drive bulk actions

  5. Select Encrypt drive :

    Drive bulk encrypt

    note

    To encrypt a single drive, select the three-dot menu for the drive, and then select Encrypt drive.

    Coro displays a confirmation dialog.

  6. Verify your drive selections and then select YES to activate encryption for the selected drives:

    Drive bulk encrypt confirm

    After encryption is complete, expand a drive’s record to view its recovery key.

    Drive bulk encrypt recovery key

    important

    Coro manages and displays recovery keys for encrypted drives as follows:

    • Coro displays the recovery key for encrypted drives after they are unlocked with the correct password.
    • Coro does not display the recovery key for locked encrypted drives.
    • Coro displays the recovery key for drives it encrypts and for unlocked drives encrypted by third-party software.

    When an encryption attempt fails, Coro displays a detailed reason and provides a link to the Coro product documentation for further troubleshooting:

    Encryption failed reason

    Important

    When a device user decrypts a drive, Coro automatically removes the recovery key from the drive’s record in the expanded list.

Troubleshooting encryption failures

This section outlines common issues that can prevent drive encryption from completing. Use the subsections below to identify the cause and follow the recommended steps to resolve the issue.

TPM requirement for device encryption

Important

This section applies to Windows devices.

Coro's remote drive encryption relies on a Trusted Platform Module (TPM) being enabled on the endpoint device. Without a TPM, Coro does not support BitLocker drive encryption.

If your device does not have TPM enabled, the following message appears in the Coro Activity Log:

Activity Log message

To check your device's TPM status, perform the following steps on the target device:

  • Windows 10 and 11:
    • Go to Start > Settings > Update & Security > Windows Security > Device Security .
  • Windows 8 and 8.1:
    • Go to Start > Control Panel , then search for Windows Defender . Locate Device Security .
    • Depending on your Windows version, you might need to search for Security to locate TPM information.
  • Windows 7:
    • Go to Start > Control Panel .
    • Depending on whether you are using Windows Defender or third-party security software, go to System and Security or Action Center .

If your device has a TPM, select Security processor details for more information. If there is no information, your TPM may have been disabled. Coro recommends that you contact your computer's manufacturer for guidance on re-enabling it.

If your TPM is enabled and functioning:

  1. Go to the Security processor details page.
  2. Select Security processor troubleshooting and then select Clear TPM .
  3. Restart your device and try the encryption process again.

Alternatively, to check if your device has a TPM module, enter tpm.msc in the Windows search box or command prompt. From the list of search results, locate and open the "tpm.msc" application. If the device has a TPM, the TPM Management on Local Computer dialog shows The TPM is ready for use, as follows:

TPM management

Common issues with Windows drive encryption

attention

The information provided in this section is adapted from the Microsoft BitLocker FAQ.

This section provides information for various issues that might be encountered when activating encryption for Windows system drives.

The integrity check on the operating system drive fails

Some changes to the device can cause the Trusted Platform Module (TPM) to block BitLocker from unlocking the operating system (OS) drive. This results in an integrity check failure.

Common causes include:

  • Moving the encrypted drive to a different device.
  • Installing a new motherboard.
  • Changing security or encryption settings.
  • Modifying boot components or boot configuration data.
  • Turning off, disabling, or clearing the TPM.

Installing system updates and upgrades

Encryption on Windows drives must be suspended for some software and system updates. For example:

  • Firmware updates.
  • Updates to applications that modify the BIOS configuration.
  • Updates to secure boot databases manually.
  • Updates to BIOS firmware, drivers, or applications.

Recovery mode is triggered when starting the operating system drive

BitLocker helps protect your device from unauthorized access. In some cases, BitLocker may start in recovery mode when you try to start the operating system (OS) drive.

This can happen if:

  • You change the boot order to start from another drive before the device’s OS drive.
  • You add or remove hardware components.
  • You remove, reinsert, or completely deplete the smart battery on a portable device.

A recovery key is repeatedly requested

BitLocker might repeatedly prompt for a recovery key if the device detects an external drive in the boot list, even when no drive is connected.

This typically happens because boot support for Preboot for TBT and USB-C/TBT is enabled by default in the BIOS. To stop the recovery prompts, disable this setting in the BIOS.

You might also encounter this issue in the following situations:

  • When connecting the device to a docking station.
  • When using a Trusted Platform Module (TPM) version earlier than TPM 2.0. To resolve this, upgrade the TPM to the latest supported version.

Common issues with macOS drive encryption

This section provides information for various issues that might be encountered when activating encryption for macOS system drives.

Installing system updates and upgrades

Encryption on macOS drives must be suspended for some software and system updates. For example:

  • Firmware updates.
  • Updates to applications that modify the UEFI configuration.
  • Updates to secure boot databases manually.
  • Updates to UEFI firmware, drivers, or applications.