There are a handful of situations where you really do need to suspend BitLocker before you start work on a Windows machine. Flashing a BIOS or UEFI firmware update is the most common one. Others include swapping the TPM chip, making changes to the boot partition, or setting up a dual-boot configuration. In each case, the next restart can look to BitLocker like the boot chain has been tampered with — because, in a sense, it has. The drive stays locked and Windows asks for the 48-digit recovery key. If you don't have it to hand, that's a bad morning.
Suspending first takes that risk off the table. It's a two-minute job, and this guide covers both the Control Panel route and the command line so you can pick whichever suits you.
What “suspend” actually means
Suspending BitLocker does not decrypt the drive. The data on disk stays fully encrypted — the cipher hasn't changed. What changes is where the key is stored. Normally the key is sealed inside the TPM and only released after the boot chain passes a set of integrity checks. When you suspend, Windows writes a clear-text copy of the volume master key to disk so the system can boot without those checks. The moment you resume protection, that clear-text key is deleted and the TPM seal is restored.
This is quite different from turning BitLocker off entirely, which triggers a full decrypt of every sector on the drive — an operation that takes hours on a large disk. Suspend and resume takes seconds.
Method 1: the Control Panel way
This is the quickest route if you're already on the desktop. No administrator terminal required.
Open Manage BitLocker
PressWin + S, type Manage BitLocker, and press Enter. Alternatively, open Control Panel, go to System and Security, then select BitLocker Drive Encryption.Suspend protection on the OS drive
You’ll see your drives listed with their current BitLocker status. Next to the operating-system drive (usuallyC:), click Suspend protection.Confirm
A small dialogue asks whether you’re sure. Click Yes. The status line changes to show a yellow warning icon — protection is now suspended.
Method 2: the command line
If you're working remotely, running a script, or just prefer the terminal, the manage-bde tool handles it cleanly. You need an elevated prompt — run Command Prompt or Terminal as administrator.
Open an elevated terminal
PressWin + X, then choose Terminal (Admin) or Command Prompt (Admin).Suspend BitLocker (auto-resumes after next restart)
Run:manage-bde -protectors -disable C:
Without any extra flags, BitLocker automatically re-enables itself after the next restart. This is the right choice if you're doing a single firmware flash and rebooting straight into Windows afterwards.Or: suspend indefinitely until you manually resume
If you need the machine to stay suspended across multiple reboots — say, you're partitioning a drive or running a sequence of updates — add the-RebootCount 0flag:manage-bde -protectors -disable C: -RebootCount 0
A value of0tells Windows not to count reboots at all. Protection stays suspended until you explicitly re-enable it. Values 1 through 15 are also valid — for instance,-RebootCount 2would let the machine restart twice before automatically resuming.
How to turn BitLocker back on
Once the firmware update, hardware swap, or whatever you were doing is finished, resume protection before the machine goes back into service.
Control Panel route
Return to Manage BitLocker (same path as above). The OS drive will now show a Resume protection link. Click it, then confirm. The yellow warning icon disappears and the TPM seal is restored.Command line route
In an elevated terminal, run:manage-bde -protectors -enable C:
That’s it. BitLocker reads the TPM state, validates the boot chain, and removes the clear-text key from disk.
Don't leave it suspended
A suspended drive is relying on a clear-text key stored on the disk itself. Anyone who gets physical access to that machine — or pulls the drive — can read the data without a password or recovery key. Always resume BitLocker protection as soon as the work is done. If you used-RebootCount 0, it will not resume on its own — you have to do it manually.If you end up locked out before getting the chance to suspend — a firmware update applied automatically overnight, for instance — you'll need your recovery key. The recovery key guide covers every place Windows might have saved it: your Microsoft account, Active Directory, an Azure AD tenant, or a printout you made at setup. And if your laptop is in for repair, it's worth knowing that PostMend suspends BitLocker as standard practice before any firmware or motherboard work — you can read more about what that involves on the services page.
Need a hand with your Dell?
We diagnose every laptop free. Post it in and we'll take a look.
Get in touch