{"id":14126,"date":"2019-04-17T08:26:18","date_gmt":"2019-04-17T08:26:18","guid":{"rendered":"https:\/\/www.top-password.com\/blog\/?p=14126"},"modified":"2019-04-17T08:32:35","modified_gmt":"2019-04-17T08:32:35","slug":"use-gpo-to-save-bitlocker-recovery-key-in-active-directory","status":"publish","type":"post","link":"https:\/\/www.top-password.com\/blog\/use-gpo-to-save-bitlocker-recovery-key-in-active-directory\/","title":{"rendered":"Use GPO to Automatically Save BitLocker Recovery Key in Active Directory"},"content":{"rendered":"<p>As a system administrator, you may find it&#8217;s difficult to keep track of BitLocker recovery keys for all computers in company network, especially when number of machines is more than 100. In this tutorial we&#8217;ll show you how to set the group policy to automatically backup BitLocker recovery information to Active Directory, so you can centrally manage the recovery keys\/passwords in one place.<\/p>\n<p><strong>How to Configure GPO to Automatically Save BitLocker Recovery Key to AD<\/strong><\/p>\n<ol>\n<li>Click the Search icon in the taskbar and type &#8220;<strong>group policy<\/strong>&#8220;. You can then click <strong>Group Policy Management<\/strong> to launch it.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/open-group-policy-management.png\" alt=\"\" width=\"420\" height=\"522\" class=\"alignnone size-full wp-image-14134\" \/>\n<\/li>\n<li>Now in the left pane of Group Policy Management, right-click your AD domain and select &#8220;<strong>Create a GPO in this domain, and Link it here\u2026<\/strong>&#8221; from the menu.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/create-a-gpo-in-this-domain.png\" alt=\"\" width=\"599\" height=\"511\" class=\"alignnone size-full wp-image-14135\" \/>\n<\/li>\n<li>In the New GPO dialog, give the GPO a name and click <strong>OK<\/strong>.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/name-the-new-gpo.png\" alt=\"\" width=\"386\" height=\"180\" class=\"alignnone size-full wp-image-14136\" \/>\n<\/li>\n<li>Right-click the newly-created GPO in the left pane, and select <strong>Edit<\/strong>.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/edit-domain-policy.png\" alt=\"\" width=\"599\" height=\"436\" class=\"alignnone size-full wp-image-14137\" \/>\n<\/li>\n<li>Browse to <code>Computer Configuration -&gt; Policies -&gt; Administrative Templates -&gt; Windows Components -&gt; BitLocker Drive Encryption<\/code>, and then double-click the policy &#8220;<strong>Store BitLocker recovery information in Active Directory Domain Services<\/strong>&#8220;.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/bitlocker-drive-encryption-policy.png\" alt=\"\" width=\"603\" height=\"376\" class=\"alignnone size-full wp-image-14138\" \/>\n<\/li>\n<li>Set the policy to <strong>Enabled<\/strong>. Make sure the &#8220;<strong>Require BitLocker backup to AD DS<\/strong>&#8221; option is checked, and select to store both recovery passwords and key packages.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/require-bitlocker-backup-to-ad-ds.png\" alt=\"\" width=\"587\" height=\"541\" class=\"alignnone size-full wp-image-14139\" \/>\n<\/li>\n<li>Next, expand <strong>BitLocker Drive Encryption<\/strong> in the left pane. You&#8217;ll see three nodes: Fixed Data Drives, Operating System Drives, Removable Data Drives. Just select Fixed Data Drives and double-click the policy &#8220;<strong>Choose how BitLocker-protected fixed drives can be recovered<\/strong>&#8220;.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/choose-how-bitlocker-drive-be-recovered.png\" alt=\"\" width=\"598\" height=\"376\" class=\"alignnone size-full wp-image-14140\" \/>\n<\/li>\n<li>Set it to <strong>Enabled<\/strong>. Check the options &#8220;Save BitLocker recovery information to AD DS for fixed drives&#8221; and then click OK.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/save-bitlocker-recovery-info-to-ad-for-fixed-drives.png\" alt=\"\" width=\"598\" height=\"592\" class=\"alignnone size-full wp-image-14141\" \/>\n<\/li>\n<li>Go to the &#8220;Operating System Drives&#8221; node and turn on the similar policy &#8220;<strong>Choose how BitLocker-protected operating system drives can be recovered<\/strong>&#8220;. Afterwards, go to the &#8220;Removable Data Drives&#8221; node and enable the policy &#8220;<strong>Choose how BitLocker-protected removable drives can be recovered<\/strong>&#8220;.<\/li>\n<li>When any client PC retrieves the policy changes, BitLocker recovery information will be automatically and silently backed up to AD DS when BitLocker is turned on for fixed drives, OS drives or removable drives.<\/li>\n<\/ol>\n<p><strong>Manually Backup BitLocker Password to AD with PowerShell<\/strong><\/p>\n<p>If you have enabled BitLocker prior to configuring the above GPO policy, you can use PowerShell cmdlets to manually upload the BitLocker recovery key to Active Directory. Follow these steps:<\/p>\n<ol>\n<li>When your BitLocker-protected drive is unlocked, <a href=\"https:\/\/www.top-password.com\/blog\/5-ways-to-run-powershell-as-administrator-in-windows-10\/\" rel=\"noopener noreferrer\" target=\"_blank\">open PowerShell as administrator<\/a> and type this command:<br \/>\n<code>manage-bde -protectors -get D:<\/code><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/find-bitlocker-id-for-drive.png\" alt=\"\" width=\"597\" height=\"360\" class=\"alignnone size-full wp-image-14142\" \/><\/p>\n<p> \tWhat you need to take note of is the Numerical Password ID.<\/li>\n<li>Next, type the following command to backup your BitLocker recovery password to Active Directory. Remember you have to use the Numerical Password ID obtained on the previous step.<br \/>\n<code>manage-bde -protectors -adbackup D: -id {CAF6FEF0-7C98-4D6A-B80F-7BE63C033047}<\/code><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2019\/04\/backup-bitlocker-recovery-key-to-ad-with-powershell.png\" alt=\"\" width=\"571\" height=\"180\" class=\"alignnone size-full wp-image-14143\" \/>\n<\/li>\n<li>When that completes, you will receive the message &#8220;<em>Recovery information was successfully backed up to Active Directory.<\/em>&#8220;<\/li>\n<\/ol>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>As a system administrator, you may find it&#8217;s difficult to keep track of BitLocker recovery keys for all computers in company network, especially when number of machines is more than 100. In this tutorial we&#8217;ll show you how to set the group policy to automatically backup BitLocker recovery information to Active Directory, so you can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92,1,10],"tags":[4181,4182,4180],"class_list":["post-14126","post","type-post","status-publish","format-standard","hentry","category-active-directory-password","category-others","category-tips-tricks","tag-backup-bitlocker-key-to-ad","tag-bitlocker-recovery-key-active-directory","tag-manually-backup-bitlocker-recovery-key-to-ad"],"_links":{"self":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/14126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/comments?post=14126"}],"version-history":[{"count":10,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/14126\/revisions"}],"predecessor-version":[{"id":14146,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/14126\/revisions\/14146"}],"wp:attachment":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/media?parent=14126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/categories?post=14126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/tags?post=14126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}