logo
Bitlocker Active Directory BitLocker Management

What to do with Active Directory BitLocker Management?

I've looked through a lot of materials on backup BitLocker recovery keys to AD, but they're too difficult for me to understand. Can you elaborate it with more clear steps for me?

author

Lydia

The BitLocker recovery keys can be stored in Active Directory Domain Services (AD DS), if your device has already joined to the Active Directory domain. Here are the key steps to manage BitLocker in Active Directory (AD):

1. Check the AD Environment

Ensure that AD had deployed AD DS schema extensions that required for BitLocker recovery data storage.

Steps Use the PowerShell Active Directory module to run the following command to check if the following five attributes of the ms-FVE-RecoveryInformation object exists:

Import-module ActiveDirectory Get-ADObject -SearchBase ((GET-ADRootDSE).SchemaNamingContext) -Filter {Name -like 'ms-FVE-*'}

MS-FVE

2. Install BitLocker Management Tool for Windows Server

Steps Run the following command with Windows Server PowerShell to setup BitLocker Drive Encryption function.

Install-WindowsFeature RSAT-Feature-Tools-Bitlocker-BdeAducExt, RSAT-Feature-Tools-BitLocker-RemoteAdminTool, RSAT-Feature-Tools-BitLocker

For Windows 10/11, use the PowerShell Command to install RSAT BitLocker Recovery Tool package:

Add-WindowsCapability -Online -Name Rsat.BitLocker.Recovery.Tools~~~~0.0.1.0

3. Configure Group Policy to store BitLocker recovery key to AD

Configure computers via Group Policy to ensure the BitLocker recovery information stored in AD. Then you can retrieve the BitLocker recovery keys and recovery passwords from AD when needed.

Step 1 Open Group Policy Management Console (GPMC), create a new Group Policy Object (GPO), and link it to the specific domain.

Create GPO in Domain

Step 2 Right-click on GPO, choose "Edit", expand it, and then navigate to the path below:

Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption

Step 3 Edit "Store BitLocker recovery information in Active Directory Domain Services" policy.

Store BitLocker Recovery Information in AD

Firstly, set it to "Enabled" from more settings. Then tick "Require BitLocker backup to AD DS". For "Select BitLocker recovery information to store", choose "Recovery password and key packages".

Enable Store BitLocker Recovery in AD

Step 4 According to the drive type to store BitLocker recovery information, such as Fixed Data Drives, Operating System Drives, Removable Data Drives, enter into the corresponding folder.

Step 5 Take Removable Data Drives for example, double-click on "Choose how BitLocker-protected removable drives can be recovered" policy, then:

Choose How BitLocker Removable Drives can be Recovered

Enabled it. Tick "Allow data recovery agent" option. In "Configure user storage of BitLocker recovery information" option, select "Allow 48-digit recovery password" and "Allow 256-bit recovery key".

Tick "Save BitLocker recovery information to AD DS for removable data drives" option and "Do not enable BitLocker util recovery information stored to AD DS for removable data drives".

Enable Choose How BitLocker Drives can be Recovered

Step 6 Run Command Prompt as Administrator and use the following command to update Group Policy settings:

gpupdate /force

4. Copy the Device BitLocker recovery key to Active Directory

The Manage-bde command tool in PowerShell can manually add BitLocker recovery key to Active Directory.

Step 1 Get the current BitLocker ID of BitLocker-encrypted drive:

manage-bde -protectors -get e:

Manage-bde Protectors to Get BitLocker ID

Step 2 Send the BitLocker Recovery key to AD via BitLocker ID:

manage-bde -protectors -adbackup e: -id '{CCB52433-509F-4C5F-B9F6-D21F47DE2766}'

Copy BitLocker Key to AD

Step 3 If the command is successfully executed, you can see the following message:

Recovery information was successfully backed up to Active Directory.

Tips: The following backup BitLocker key to AD PowerShell Scripts can get the BitLocker recovery key on system drive and save it to the Active Directory automatically.

$BitVolume = Get-BitLockerVolume -MountPoint $env:SystemDrive $RecoveryKey = $BitVolume.KeyProtector | Where-Object { $_.KeyProtectorType -eq 'RecoveryPassword' } Backup-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId $RecoveryKey.KeyProtectorID BackupToAAD-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId $RecoveryKey.KeyProtectorID

Note: After Group Policy Settings, if you re-enable BitLocker for this computer, the BitLocker recovery key and recovery password will also automatically copy to AD.

5. Manage BitLocker Recovery Information

Search for AD BitLocker recovery key: In Active Directory, you can check the BitLocker recovery information through Active Directory Users and Computers (ADUC) interface. Besides, its BitLocker Recovery tab in properties to view BitLocker recovery key in AD.

BitLocker Recovery Key in AD

Active Directory maintains a historical record of all BitLocker recovery passwords for computer objects. Old recovery keys are not automatically deleted from AD DS unless the computer object itself is deleted.

People Also Ask

How to Create a VHD/VHDX with BitLocker Drive Encryption?

Of course, you can use BitLocker Encryption to mount VHD or VHDX files. Copy and move this VHD/VHDX files as a portable encrypted container file to any Windows computer is permitted.

author Lydia

How to Configure Hardware-Based Encryption for BitLocker

BitLocker is a disk encryption feature included with Windows, designed to protect data by providing encryption for entire volumes. Hardware-based encryption mode, also known as OPAL encryption.

author Benjamin

How to enable BitLocker on VMware Virtual Machine without TPM?

Enabling BitLocker encryption on a virtual machine is similar to doing so on a physical computer, but it requires consideration of virtualization environment specifics.

author Lydia

Can I Install Dual Boot Linux and Windows 10 System with BitLocker Drive Encryption on?

Enabling BitLocker for dual system on different partitions within the same drive won’t affect each other. Because the BitLocker Encryption is based on partitions, not the entire drive.

author Lydia