For almost a decade Windows has quietly enabled BitLocker (or "Device Encryption") automatically on new devices.
Probably without the owner's knowledge.
BitLocker is like a protective case around your data, with a padlock guarding the contents. The padlock is automatically 'closed' by signing into a Microsoft account. A 48‑digit recovery 'key' for the padlock should be uploaded to that Microsoft account when the process finishes.
The daily opening and closing of the secure case is handled seamlessly in the background by the device.
Unless it detects a change that indicates tampering with the system.
Hardware swaps, motherboard replacements, firmware changes, or certain operating system updates can all trigger BitLocker to demand the recovery key. An old Microsoft Premier Field Engineering internal document had over 200 known potential triggers. Many related to the secure boot and trusted platform module (TPM) operations. With the rollout of updated Secure Boot certificates on the horizon, it would be prudent to have those recovery keys to hand, just in case.