Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Backup existing and new BitLocker Recovery Keys to Active Directory
  • BitLocker Protection off Update UEFI BIOS to fix issues
    BitLocker Protection off: Update UEFI/BIOS to fix issues Windows
  • Permit a Blocked File or App in Windows Security
    How to Permit a Blocked File or App in Windows Security Manually Windows
  • 10.0.17763.1 error
    Fix Windows 10 Setup 1809 build 10.0.17763.1 is not supported Error Windows Server
  • RDP
    Fix Windows 11 Remote Desktop Connectivity Error code 0x204 Windows
  • MSSQLlicensing
    Microsoft SQL Evaluation period has expired: How to upgrade SQL Server instance Oracle/MSSQL/MySQL
  • proxmox
    Clone a Proxmox Container: CT Restoration Guide Virtualization
  • ansible vault
    Fix AttributeError ‘ShellModule’ Object Has No Attribute ‘ECHO’ Configuration Management Tool
  • Ubuntu on Windows
    Install Ubuntu 20.04 LTS on Windows via WSL Linux

Backup existing and new BitLocker Recovery Keys to Active Directory

Posted on 11/01/202127/06/2024 Christian By Christian 2 Comments on Backup existing and new BitLocker Recovery Keys to Active Directory

In this article, you will learn how to Backup existing and new BitLocker Recovery Keys to AD (Active Directory). BitLocker Drive Encryption is a data protection feature that integrates with the operating system. It addresses the threats of data theft or exposure to lost or stolen devices. It is an encryption feature built into computers running Windows 10. Please see How to Change BitLocker Password in Windows, How to Change BitLocker Password in Windows, and How to correctly disable BitLocker on Windows Server.

BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later.

See this guide for how to enable Bitlocker Pre-Boot Authentication via the Local Group Policy Editor and the Group Policy Management Console. See this guide for information on Full Disk Encryption with PBA / without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption, and Container Encryption.

Why protect your device with BitLocker?

The goal of BitLocker FDE is to protect your Drive against offline attacks through encryption, and unauthorized access either by running a software attack tool against it or by transferring the computer’s hard disk to a different computer.

Here are some more guides: how to fix your device cannot use a Trusted Platform Module: Allow BitLocker without a compatible TPM” and how to enable FileVault disk encryption on a Mac device.

How to backup existing BitLocker Recovery Keys to Active Directory

If you have already enabled BitLocker but now want to store the recovery keys in Active Directory. With the configured GPOs above, this will allow windows to write the recovery key to AD.

We need to use the “manage-bde” utility which is a command-based utility that can be used to configure BitLocker. You can save this on a bash file and run it on devices that have already enabled BitLocker.

manage-bde -protectors -get c:
for /f "skip=4 tokens=2 delims=:" %%g in ('"manage-bde -protectors -get c:"') do set MyKey=%%g
echo %MyKey%
manage-bde -protectors -adbackup c: -id%MyKey%

Note: Once run, it will escrow the key into Active Directory. You may also want to see BitLocker Drive Encryption architecture and implementation scenarios.

Remote Server Administration Tools

There are two additional tools in the Remote Server Administration Tools worth mentioning, which you can use to manage BitLocker. You should now be able to see the keys in the Properties tab. Or via the Search function in Active Directory Users and Computers.

Ensure that the BitLocker RSAT is enabled in Server Features and Roles. If these tools are not installed, you will fac the following error “Fix no BitLocker Recovery in Active Directory“

  • BitLocker Recovery Password Viewer. The BitLocker Recovery Password Viewer enables you to locate and view BitLocker Drive Encryption recovery passwords backed up to AD DS. This tool helps recover data stored on a drive encrypted by using BitLocker.

    The BitLocker Recovery Password Viewer tool is an extension for the AD Users and Computers Microsoft Management Console (MMC) snap-in. It enables you to examine a computer object’s Properties dialog box to view the corresponding BitLocker recovery passwords.
  • BitLocker Drive Encryption Tools. BitLocker Drive Encryption Tools include the command-line tools, manage-bde and repair-bde, and the BitLocker cmdlets for Windows PowerShell. Both manage-bde and the BitLocker cmdlets can be used to perform any task that can be accomplished through the BitLocker control panel.

    And they are appropriate to use for automated deployments and other scripting scenarios. Repair-bde is provided for disaster recovery scenarios in which a BitLocker-protected drive cannot be unlocked normally or by using the recovery console. See the screenshot below on how to install BitLocker Drive Encryption Administration Utilities.

Install BitLocker Drive Encryption Administration Utilities to view BitLocker Recovery Keys to Active Directory

To install BitLocker Drive Encryption Administration Utilities on a Server (Domain Control), please follow the steps below.

Note: If you do not install these features, you will never be able to view the BitLocker Recovery information. See this guide “fix missing BitLocker Recovery Tab” for more information.

Launch the Add role and Feature next to the “Features” menu. Select BitLocker Drive Encryption Administration Utilities under Remote Server Administration. Then check both BitLocker Drive Encryption Tools and BitLocker Recovery Password Viewer.

On the confirmation page, click on install to have the BitLocker utilities installed.

To Install BitLocker Drive Encryption Administration Utilities on a Client, please follow the steps below.

Note: RSAT (Remote Server Administration Tools) in Windows 10 v1809, v1903 and v1909 are no longer a downloadable add-on to Windows. Instead, it’s included as a set of  “Features on Demand” directly in Windows.

But since BitLocker Drive Encryption Administration Utilities are not included, we will have to download them. Launch Windows settings,

Navigate to Apps and Select Apps & Features as shown below. Follow along with the rest steps.

Now, scroll through the list and install BitLocker Drive Encryption Administration Utilities.

For more information on Group Policy, please see the how-to analyze group policies applied to a user and computer account,

Note: BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive.

Once everything is correctly setup, you should be able view the BitLocker Recovery Tab as shown below.

FAQs

Why can’t I Perform BitLocker (MBAM) Self Service Recovery?

An end user must have physically logged on to the computer (not remotely) at least one time successfully to be able to recover their key using the Self-Service Portal. Otherwise, they must use the Helpdesk Portal for key recovery

Why is this error prompted “System Partition not available or large enough”?

BitLocker requires a SYSTEM partition to enable encryption. If this partition is missing, kindly use this command line to create the required Bitlocker partition.
BdeHdCfg -target default

How should the boot order of a BitLocker PC be organized?

Configure the computer’s startup options to place the hard disk drive first in the boot order, as this affects system measurement and prompts for the BitLocker recovery key. If using a docking station, ensure the hard disk drive is first in the boot order both when docked and undocked. You can read more here.

I hope you found this blog post helpful on how to backup existing and new BitLocker Recovery Keys to AD (Active Directory). Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Bitlocker, BitLocker Backup, BitLocker Drive Encryption Administration Utilities, BitLocker Drive Encryption Tools, BitLocker Recovery Keys, BitLocker Status, Enable BitLocker, Windows 10, Windows Server 2016

Post navigation

Previous Post: Veles Software: How to install and configure MPA Tools
Next Post: BitLocker Drive Encryption architecture and implementation types on Windows

Related Posts

  • 05kvj2jzbpj1ugp4etb4gdf 19.fit scale.size 2698x1517 e1690630247655
    Various methods to launch the Event Viewer Windows Server
  • MBAM Replacement
    MBAM extended support ends April 2026: Find alternative solution Security | Vulnerability Scans and Assessment
  • Certificates
    The application /Certsrv does not exist: How to configure Certificate Enrollment Web Services and Certificate Authority Web Enrolment Windows Server
  • mountedimagenotaccessible
    Unable to access the image: Make sure that the image path exist Windows
  • Fixed Sysprep Generalize 1
    How to Fix The Virtual Desktop is Not Sysprep Generalized Virtualization
  • FileZilla
    Access FTP Server from your browser: How to create a shortcut and access Filezilla from Windows Explorer Windows Server

More Related Articles

05kvj2jzbpj1ugp4etb4gdf 19.fit scale.size 2698x1517 e1690630247655 Various methods to launch the Event Viewer Windows Server
MBAM Replacement MBAM extended support ends April 2026: Find alternative solution Security | Vulnerability Scans and Assessment
Certificates The application /Certsrv does not exist: How to configure Certificate Enrollment Web Services and Certificate Authority Web Enrolment Windows Server
mountedimagenotaccessible Unable to access the image: Make sure that the image path exist Windows
Fixed Sysprep Generalize 1 How to Fix The Virtual Desktop is Not Sysprep Generalized Virtualization
FileZilla Access FTP Server from your browser: How to create a shortcut and access Filezilla from Windows Explorer Windows Server

Comments (2) on “Backup existing and new BitLocker Recovery Keys to Active Directory”

  1. Avatar photo Alan says:
    12/10/2021 at 12:59 AM

    The script to backup existing bitlocker encryptions is great. Really helped me do this at scale. I created a GPO scheduled task and applied it to all my PCs to back up Bitlocker to all PCs. Thank you.

    Log in to Reply
    1. chris Christian says:
      14/04/2022 at 1:18 PM

      You are welcome Alan!

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • BitLocker Protection off Update UEFI BIOS to fix issues
    BitLocker Protection off: Update UEFI/BIOS to fix issues Windows
  • Permit a Blocked File or App in Windows Security
    How to Permit a Blocked File or App in Windows Security Manually Windows
  • 10.0.17763.1 error
    Fix Windows 10 Setup 1809 build 10.0.17763.1 is not supported Error Windows Server
  • RDP
    Fix Windows 11 Remote Desktop Connectivity Error code 0x204 Windows
  • MSSQLlicensing
    Microsoft SQL Evaluation period has expired: How to upgrade SQL Server instance Oracle/MSSQL/MySQL
  • proxmox
    Clone a Proxmox Container: CT Restoration Guide Virtualization
  • ansible vault
    Fix AttributeError ‘ShellModule’ Object Has No Attribute ‘ECHO’ Configuration Management Tool
  • Ubuntu on Windows
    Install Ubuntu 20.04 LTS on Windows via WSL Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,834 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.