Windows OS Hub
  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu

 Windows OS Hub / Active Directory / Storing BitLocker Recovery Keys in Active Directory

February 27, 2023 Active DirectoryGroup PoliciesWindows 10Windows Server 2019

Storing BitLocker Recovery Keys in Active Directory

You can use Active Directory to securely store backups of BitLocker recovery keys (passwords) from client computers. It is very convenient if you have multiple users using BitLocker to encrypt their data. You can configure Group Policies in your domain so that when encrypting any drive with BitLocker, the computer will save the recovery key in its computer object account in AD (like storing a local computer administrator password generated using LAPS).

To configure storing BitLocker keys in Active Directory, your infrastructure must meet the following requirements:

  • Client computers running Windows 10 or Windows 8.1 with Pro and Enterprise editions;
  • AD schema version: Windows Server 2012 or higher;
  • Your GPO ADMX files must be updated to the latest versions.

Contents:
  • How to Configure Group Policy to Store BitLocker Recovery Keys in AD?
  • How to View and Manage BitLocker Recovery Keys in Active Directory?

How to Configure Group Policy to Store BitLocker Recovery Keys in AD?

To automatically save (backup) BitLocker recovery keys to the Active Directory domain, you need to configure a special GPO.

  1. Open the Domain Group Policy Management console (gpmc.msc), create a new GPO and link it to an OU with the computers you want to enable automatic BitLocker key saving in AD;
  2. Go to Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption;
  3. Enable the Store BitLocker recovery information in Active Directory Domain Services policy with the following settings: Require BitLocker backup to AD DS and Select BitLocker recovery information to store: Recovery passwords and key packages; GPO: Store BitLocker recovery information in Active Directory Domain Services
  4. Then go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption -> Operating System Drives and enable the policy Choose how BitLocker-protected operating system drives can be recovered. Note that it is recommended to check Do not enable BitLocker until recovery information is stored to AD DS for operating system drives. If you check the option, BitLocker will not start drive encryption until the computer saves a new recovery key in AD (if you are a mobile user, you will have to wait for the next connection to the domain network);
  5. In our case, automatic saving of a BitLocker key is enabled for the operating system drive. If you want to save BitLocker recovery keys for external media devices or other drives, configure a similar policy in these GPO sections: Fixed Data Drives and Removable Data Drives; Group Policy to save BitLocker recovery keys to Active Directory
  6. Update Group Policy settings on the clients: gpupdate /force
  7. Encrypt the system drive of your computer running Windows 10 Pro using BitLocker (Turn BitLocker on); turn on BitLocker for a system drive
  8. Windows 10 will save the BitLocker recovery key for the computer in Active Directory and encrypt the drive.
    You may have multiple BitLocker recovery passwords for a single computer (for example, for different removable devices).

If a computer disk is already encrypted using BitLocker, you can manually sync in AD. Run the command:

manage-bde -protectors -get c:

Copy the Numerical Password ID value (for example, 22A6A1F0-1234-2D21-AF2B-7123211335047).

Run the command below to save the recovery key to the current computer’s AD account:

manage-bde -protectors -adbackup C: -id {22A6A1F0-1234-2D21-AF2B-7123211335047}

You will see this message:

Recovery information was successfully backed up to Active Directory
Or you can backup the BitLocker recovery key for your system drive to Active Directory using PowerShell:

BackupToAAD-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId ((Get-BitLockerVolume -MountPoint $env:SystemDrive ).KeyProtector | where {$_.KeyProtectorType -eq "RecoveryPassword" }).KeyProtectorId

How to View and Manage BitLocker Recovery Keys in Active Directory?

To manage BitLocker recovery keys from the Active Directory Users and Computers snap-in (ADUC, dsa.msc), you must install the Remote Server Administration Tools (RSAT).

In Windows Server, you can install the BitLocker Drive Encryption Administration Utility feature using Server Manager (it contains BitLocker Drive Encryption Tools and BitLocker Recovery Password Viewer) .

RSAT install BitLocker Drive Encryption Administration Utility

Or you can install these Windows Server features using PowerShell:

Install-WindowsFeature RSAT-Feature-Tools-BitLocker-BdeAducExt, RSAT-Feature-Tools-BitLocker-RemoteAdminTool, RSAT-Feature-Tools-BitLocker

powershell install BitLocker Active Directory tools

In Windows 10 you have to install RSAT-Feature-Tools-BitLocker from RSAT.

Now, if you open the properties of any computer in the ADUC console, you will see a new BitLocker Recovery tab.

Here you can view when a password was created, get the Password ID and the BitLocker recovery key.

View BitLocker recovery password in ADUC console

Then if a user forgets his BitLocker password, he can tell the first 8 symbols of the recovery key displayed on the computer screen to the administrator, and the administrator can find the recovery key of the computer in ADUC using Action —> Find BitLocker recovery password and tell it to the user. The recovery password (48-digit number) will help to unlock a Bitlocker-protected drive.

Windows shows recovery key id on startup

find BitLocker recovery password in Active Directory by key ID

By default, only domain administrators can view BitLocker recovery keys. In Active Directory, you can delegate permissions to view BitLocker recovery keys in a specific OU to any user group. To do it, delegate the permission to view msFVE-RecoveryInformation attribute value.

So, in this article, we have shown how to configure an automatic backup of BitLocker recovery keys in Active Directory. If a user forgets the BitLocker password, you can get it and restore access to the data on the user’s device.

If the BitLocker system information area of the hard drive is damaged, you can try to decrypt the data according to this article.

1 comment
2
Facebook Twitter Google + Pinterest
previous post
Configuring Kerberos Token Size Using the MaxTokenSize Parameter
next post
Enabling Modern or Basic Authentication for Microsoft 365

Related Reading

How to Connect VPN Before Windows Logon

November 14, 2023

Using WPAD (Web Proxy Auto-Discovery Protocol) on Windows

November 7, 2023

Zabbix: How to Get Data from PowerShell Scripts

October 27, 2023

Tracking Printer Usage with Windows Event Viewer Logs

October 19, 2023

How to Use Ansible to Manage Windows Machines

September 25, 2023

1 comment

cube07 January 9, 2022 - 8:49 pm

Backup to AD – powershell cmd Backup-BitLockerKeyProtector not BackupToAAD.. 🙂

Reply

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMWare
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • How to Connect VPN Before Windows Logon

    November 14, 2023
  • Removing Azure Arc Setup Feature on Windows Server 2022

    November 9, 2023
  • Using WPAD (Web Proxy Auto-Discovery Protocol) on Windows

    November 7, 2023
  • Send Emails with Microsoft Graph API and PowerShell

    November 6, 2023
  • Zabbix: How to Get Data from PowerShell Scripts

    October 27, 2023
  • Tracking Printer Usage with Windows Event Viewer Logs

    October 19, 2023
  • PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

    October 15, 2023
  • Reset Root Password in VMware ESXi

    October 12, 2023
  • How to Query and Change Teams User Presence Status with PowerShell

    October 8, 2023
  • How to Increase Size of Disk Partition in Ubuntu

    October 5, 2023

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Configure Google Chrome Settings with Group Policy
  • Get-ADUser: Find Active Directory User Info with PowerShell
  • How to Find the Source of Account Lockouts in Active Directory
  • How to Disable or Enable USB Drives in Windows using Group Policy
  • Get-ADComputer: Find Computer Properties in Active Directory with PowerShell
  • Configuring Proxy Settings on Windows Using Group Policy Preferences
  • Deploy PowerShell Active Directory Module without Installing RSAT
Footer Logo

@2014 - 2023 - Windows OS Hub. All about operating systems for sysadmins


Back To Top