Export (0) Print
Expand All

DisableEncryptedDiskProvisioning

Updated: August 1, 2012

Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2

DisableEncryptedDiskProvisioning specifies whether Windows® activates encryption on blank drives that are capable of hardware-based encryption during installation.

By default, Windows activates drives that are capable of hardware-based encryption by using a fixed access control list (ACL) that is based on the Opal Security Subsystem Class (Opal SSC) specification.

noteNote
Use the TCGSecurityActivationDisabled unattend setting to enable the Group Policy setting, Do not automatically encrypt files moved to encrypted folders, after Windows is installed and started up. The setting specifies, for unprovisioned eDrives, whether security should be activated on the eDrive during provisioning.

 

true

Specifies that Windows does not activate encryption on blank drives, even if those drives are capable of hardware-based encryption.

false

Specifies that Windows activates encryption on blank drives that are capable of hardware-based encryption. This is the default value.

Microsoft-Windows-Setup | DiskConfiguration | DisableEncryptedDiskProvisioning

For the list of the Windows editions and architectures that this component supports, see Microsoft-Windows-Setup.

The following XML output for the DisableEncryptedDiskProvisioning setting shows how to specify that Windows does not activate encryption on blank drives, even if those drives are capable of hardware-based encryption.

<DisableEncryptedDiskProvisioning>true</DisableEncryptedDiskProvisioning>

See Also

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft