Partilhar via


DisableEncryptedDiskProvisioning

Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2

DisableEncryptedDiskProvisioning specifies whether Windows® activates encryption on blank drives that are capable of hardware-based encryption during installation.

By default, Windows activates drives that are capable of hardware-based encryption by using a fixed access control list (ACL) that is based on the Opal Security Subsystem Class (Opal SSC) specification.

Note

Use the TCGSecurityActivationDisabled unattend setting to enable the Group Policy setting, Do not automatically encrypt files moved to encrypted folders, after Windows is installed and started up. The setting specifies, for unprovisioned eDrives, whether security should be activated on the eDrive during provisioning.

Values

true

Specifies that Windows does not activate encryption on blank drives, even if those drives are capable of hardware-based encryption.

false

Specifies that Windows activates encryption on blank drives that are capable of hardware-based encryption. This is the default value.

Valid Configuration Passes

windowsPE

Parent Hierarchy

Microsoft-Windows-Setup | DiskConfiguration | DisableEncryptedDiskProvisioning

Applies To

For the list of the Windows editions and architectures that this component supports, see Microsoft-Windows-Setup.

XML Example

The following XML output for the DisableEncryptedDiskProvisioning setting shows how to specify that Windows does not activate encryption on blank drives, even if those drives are capable of hardware-based encryption.

<DisableEncryptedDiskProvisioning>true</DisableEncryptedDiskProvisioning>

See Also

Concepts

DiskConfiguration
TCGSecurityActivationDisabled