Understanding Disk Encryption Detection via DetectProduct and GetEncryptionState methods
Overview
This article explains how to use the DetectProduct
and GetEncryptionState
methods to assess the presence and operational state of disk encryption solutions on endpoints. It covers how encryption detection is reported and interpreted for both software-based and hardware-based encryption tools, including FileVault and BitLocker.
DetectProduct method Usage
Purpose
The DetectProduct
method identifies all encryption software installed on an endpoint, regardless of whether the encryption is actively running.
Behavior
- When invoked with
category = 3
(encryption), the method returns all disk encryption applications installed. - This includes tools that may not currently be encrypting the system.
Example JSON Input
{
"input": {
"method": 0,
"category": 3
}
}
GetEncryptionState method Insights
The GetEncryptionState
method provides detailed information on whether an endpoint's drives are encrypted and which encryption product is responsible.
Key Response Fields
encryption_active
- Other Products: Indicates
true
if encryption is actively in use, including states like encrypting, encrypted, partially encrypted, or suspended. - FileVault: Reflects whether FileVault is enabled. Returns
true
if FileVault is turned on.
- Other Products: Indicates
fully_encrypted
- Returns
true
if all encryptable drives are completely encrypted. - On Apple Silicon devices, drives may still be encrypted through hardware even if FileVault is off. This is reflected by
"encryption_type": "hardware"
.
- Returns
locations
- Lists all disk volumes with the following relevant sub-fields:
encryptable
: Indicates whether the drive can be encrypted. Does not imply the drive is currently encrypted.state
: Reports encryption status per volume. Possible values include unencrypted, encrypted, suspended, partial, etc.
- Lists all disk volumes with the following relevant sub-fields:
Behavior of Specific Encryption Products
BitLocker
Works optimally in admin mode, which grants full access to retrieve detailed encryption metadata, such as the encryption algorithm.
In normal mode, the methods may report only basic information (e.g., state and path), and omit advanced fields. This difference is due to permission restrictions in normal mode.
FileVault
Provides accurate and consistent values in both encryption_active
and fully_encrypted
.
On Apple Silicon systems, encryption can persist via hardware encryption even when FileVault is off.