You’ve run into a fairly common side effect of using third‑party imaging with BitLocker: most tools restore the data, but not the encryption state.
Why BitLocker gets disabled after restore
In general, imaging tools handle BitLocker system drives in one of two ways:
- “Intelligent”/file‑level style imaging: The tool uses VSS to read the decrypted contents of the volume and stores that in the image.
On restore, it creates a normal NTFS partition and writes the data back. Result: system works, but the volume is no longer BitLocker‑encrypted, so you must turn BitLocker on again and wait for re‑encryption.
- Sector‑by‑sector (forensic) imaging: The tool copies every sector, including BitLocker metadata and ciphertext, without understanding the filesystem.
On restore, you usually get the original BitLocker‑encrypted volume back as‑is. Downsides: images are bigger and slower to create/restore.
From what’s described (and from what AOMEI has documented in the past), AOMEI Backupper’s normal/full system backup behaves like the first method. So what you’re seeing is expected behavior for that mode.
Experiences with other tools (in general)
Without speaking for specific members here, typical behavior across common tools tends to be:
- Many third‑party imaging tools (including several popular ones) back up BitLocker volumes in decrypted form and restore them as unencrypted NTFS. BitLocker must be turned back on and the drive re‑encrypted after restore.
- Some toolsoffer a “sector‑by‑sector” / “forensic” / “clone all sectors” option that can preserve BitLocker as‑is, but:
- Images are as large as the used space (or entire disk, depending on implementation).
- Backups and restores are significantly slower.
- Not every product supports this for system disks, and there may be restrictions on restoring to disks of different sizes.
- Windows built‑in tools: Behavior has changed between Windows versions and tools (old “System Image Backup”, wbadmin, etc.). Some workflows still require you to re‑enable BitLocker manually after bare‑metal restore. I wouldn’t rely on them to “magically” preserve encryption unless confirmed in current Microsoft docs for your exact method.
So what you’re seeing with AOMEI is not unusual. It’s more a design choice than a bug.
What you can try with AOMEI Backupper
A few practical approaches (you’d have to check AOMEI’s current docs/options for your version):
- Check for sector‑by‑sector options:
Look whether there is a “sector by sector backup/clone” or similar option for the system drive. If available and supported for your scenario:
- Create an image with that mode.
- Restore and then check BitLocker state (
manage-bde -status).
If BitLocker stays enabled, you’ve solved the re‑encryption problem at the cost of larger/slower backups. If not, then the product simply doesn’t support preserving the encrypted state.
- Accept re‑encryption but optimize the process:
- Always make sure you have your BitLocker recovery key backed up before experimenting.
- After every full restore, plan to turn BitLocker on immediately and leave the system idle so it can encrypt as fast as possible.
- If you have an SSD and CPU with AES‑NI, encryption speed is often quite acceptable; it’s mostly a time‑planning issue.
- Use a different strategy for frequent restores:
If you do very frequent test‑restores or “lab” work, some people:
- Keep the test OS image unencrypted, but encrypt only the data partitions that matter.
- Or use a VM for testing and keep BitLocker only on the host.
Obviously, this is a trade‑off vs. security, so not ideal for your main daily‑driver install.
What I’d suggest next
- Check AOMEI’s documentation or support for your specific version to see if they explicitly mention BitLocker behavior on restore.
- Experiment once with any “sector‑by‑sector” or equivalent mode (if present) to see whether it preserves encryption for you.
- If preserving BitLocker state is critical and your current tool can’t do that, you might want to test an alternative imaging solution in a non‑production scenario and see how it behaves with BitLocker on your hardware.
Hopefully other members will chime in with which imaging tools they use with BitLocker, and whether their restores come back encrypted or require full re‑encryption each time.