Do you have TPM? You can check with the get-tpmpowershell command. From elevated command promptCode:
Microsoft Windows [Version 10.0.10586] (c) 2015 Microsoft Corporation. All rights reserved. C:WINDOWSsystem32>powershellWindows PowerShell Copyright (C) 2015 Microsoft Corporation. All rights reserved. PS C:WINDOWSsystem32> get-tpmTpmPresent : False TpmReady : FalseManufacturerId : 0 ManufacturerVersion : ManagedAuthLevel : Full OwnerAuth : OwnerClearDisabled : True AutoProvisioning : NotDefined LockedOut : False LockoutCount : LockoutMax : SelfTest : PS C:WINDOWSsystem32>
If so the TPM enters the password for you and your system is protected by your Windows password. Only if you don't have TPM you can enter a password.
In addition you can enter a PIN and/or use a USB key. A pin is recommended and can be alphanumeric.
What is the best practice for using BitLocker on an operating system drive?The recommended practice for BitLocker configuration on an operating system drive is to implement BitLocker on a computer with a TPM version 1.2 or 2.0 and a Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware implementation, plus a PIN. By requiring a PIN that was set by the user in addition to the TPM validation, a malicious user that has physical access to the computer cannot simply start the computer.
Can PIN length and complexity be managed with Group Policy?Yes and No. You can configure the minimum personal identification number (PIN) length by using the Configure minimum PIN length for startup Group Policy setting and
allow the use of alphanumeric PINs by enabling the Allow enhanced PINs for startup Group Policy setting.However, you cannot require PIN complexity by Group Policy.
Source
You might like to read this thread - it has some discussion / explanations when someone had a similar question. Installed Bitlocker does not ask for password on computer start-up! - Windows 10 blog