Quick intro

BitLocker is like backup. It’s good to have it. It’s better to have the restore verified as well.

If you’re planning to implement BitLocker into your organization (or already have that), it’s good to know what’s the choice of storing the recovery password:

More information can be found here.

For me, the best approach would be to:

This also ensures that encryption won’t start if recovery key failed to be backed up to AD.

This doesn’t introduce the cost of MBAM or SCCM.

What if you already have your drives encrypted, and now want to improve the process of recovering information? As always - PowerShell to the rescue. To send information to AD we can use Backup-BitLockerKeyProtector. It can accept either KeyProtectorID or the ID itself. Retrieving those is simple.

Ways to get BitLocker recovery key information to AD and Azure AD

Manage-BDE

We can get the information using manage-bde tool:

  1. Retrieve information manage-bde retrieve

  2. Send to AD manage-bde backup

PowerShell

This is more fun (objects not strings!). Let’s first get information about our volumes:

Get-BitLocker volume

As you can see I have only one drive, encrypted with TPM. To get the same information as before let’s select-object Get-BitLocker details

This returns two objects for each drive. We’re interested in the second object Get-BitLocker details 2

Active Directory

Let’s store the information to ActiveDirectory now:

Get-BitLocker backup

If I would have more drives, this would come in handy:

More volumes

$BitLockerVolumes = Get-BitLockerVolume
foreach ($blv in $BitLockerVolumes) {
  Backup-BitLockerKeyProtector -MountPoint $blv.MountPoint -KeyProtectorId (($blv.KeyProtector)[1] | Select-Object -ExpandProperty KeyProtectorID)
}
 ComputerName: NBMCZERNIAWSKI2

VolumeType      Mount CapacityGB VolumeStatus           Encryption KeyProtector              AutoUnlock Protection
                Point                                   Percentage                           Enabled    Status
----------      ----- ---------- ------------           ---------- ------------              ---------- ----------
OperatingSystem C:        236.22 FullyEncrypted         100        {Tpm, RecoveryPassword}              On

Update 2019-04-23

For this above to work you have to be:

  1. AD User
  2. Member of local adminstrators on your machine.

That is not a desirable configuration :grin:
And using Invoke-Command to remote machines will fail too.
To fix this you will have to delegate proper permissions to SELF object:

  1. Right click on root domain:
    Delegate1
  2. Click Next, Click Add, type SELF then Check Names and OK
    Delegate2
  3. Click Next, Create a custom task to delegate, Next, select Only the following object in the folder and select Computer Objects then Next
  4. De-Select General and Select Property-Specific.
    Then from the list select Write msTPM-OwnerInformation and click Next
  5. Finish the wizard
    Delegate3

This will allow to use both Invoke-Command to remotely (in automated way) store all BitLocker Keys in ActiveDirectory!

More information can be found here.


Azure Active Directory

Same goes with sending RecoveryKey to Azure AD, this time with BackupToAAD-BitLockerKeyProtector:

Backup to Azure AD

$BitLockerVolumes = Get-BitLockerVolume
foreach ($blv in $BitLockerVolumes) {
  BackupToAAD-BitLockerKeyProtector -MountPoint $blv.MountPoint -KeyProtectorId (($blv.KeyProtector)[1] | Select-Object -ExpandProperty KeyProtectorID)
}
ComputerName: NBMCZERNIAWSKI2

VolumeType      Mount CapacityGB VolumeStatus           Encryption KeyProtector              AutoUnlock Protection
                Point                                   Percentage                           Enabled    Status
----------      ----- ---------- ------------           ---------- ------------              ---------- ----------
OperatingSystem C:        236.22 FullyEncrypted         100        {Tpm, RecoveryPassword}              On

Retrieve RecoveryKey

From Active Directory

Now the best part - how to get the information back. Since Windows 2008 BitLocker Recovery Key is stored in AD in msFVE-RecoveryInformation objectclass aassociated to Computer. To get that we first need to get Computer Object and then search Active Directory for ObjecClass of given type. This is assuming your account have rights to read the information from AD in the first place! (great article here)

Retrieve key

I’m using custom objects for better readability. The date shows when the drive was encrypted!, not when the information was backed up.

From Azure AD

There is a delay between using BackupToAAD-BitLockerKeyProtector and the information showing on AzureAD. Give it time to synchronize :)

Navigate to https://myapps.microsoft.com, go to the Profile page and see all the registered devices:

Profile page

From there You can view the recovery password for You devices. Btw - it’s not very intuitive - You cannot access this informatorom directly from office.com -> profie pages.