Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Delegate control for BitLocker recovery keys in Active Directory
  • Featured image 2
    5 Steps to Fix Outlook continually prompts for passwords Windows
  • cisco asa 5510
    Copying TFTP Image to Flash Network | Monitoring
  • Featured image new
    How to find out who restarted Windows Server Windows
  • OxscsIP
    Enable Virtualization in Windows: Fixing VirtualBox’s 32-bit Option Virtualization
  • ghm
    MDT Driver injection: How to import drivers in .exe format into Microsoft Deployment Toolkit Windows Server
  • MECM Deployment copy
    How to install Endpoint Configuration Manager on HyperV VM Windows Server
  • ios microsoft remote desktop app
    Remote Desktop can not find the computer FQDN and this might mean that FQDN does not belong to the specified network Windows
  • sd 1
    How to link your Android or iPhone to your Windows 10 PC Windows

Delegate control for BitLocker recovery keys in Active Directory

Posted on 15/10/202117/07/2024 Christian By Christian No Comments on Delegate control for BitLocker recovery keys in Active Directory
Delegating control

Active Directory (AD) delegation is a critical part of security and compliance. By delegating control overactive directory, you can grant users or groups the permissions they need without adding users to privileged groups like Domain Admins, etc. Please see how to clear the TPM via the management console or Windows Defender Center App, how to deploy Microsoft BitLocker Administration and Monitoring Tool, and how to uninstall your current version of MBAM and run setup again.

You can use organizational units (OUs) to delegate the administration of objects, such as users or computers, within the OU to a designated individual or group.

To delegate administration by using an OU, place the individual or group to which you are delegating administrative rights into a group, place the set of objects to be controlled into an OU, and then delegate administrative tasks for the OU to that group.

Here are some interesting guides: How to enable or disable BitLocker Drive Encryption on Windows 10 and Virtual Machines, and how to clear, enable or disable TPM in Windows via the BIOS or UEFI.

Active Directory Domain Services (AD DS)

Active Directory Domain Services (AD DS) enables you to control the administrative tasks that can be delegated at a very detailed level. For example, you can assign one group to have full control of all objects in an OU; assign another group the rights only to create, delete, and manage user accounts in the OU; and then assign the third group the right only to reset user account passwords.

You can make these permissions inheritable so that they apply to any OUs that are placed in subtrees of the original OU.

Kindly visit this guide to learn more on how to fix the missing BitLocker Recovery Tab in Active Directory Users and Computers. Also, see how to backup existing and new BitLocker recovery keys to Active Directory.

When BitLocker keys are configured to be stored in AD. This requires that BitLocker Drive Encryption Administration Utilities be installed on your device and you MUST be a domain Admin to be able to view these keys or have these rights delegated. In this guide, I will be showing you how to delegate control for the BitLocker recovery keys.

Kindly visit these guides s”how to backup existing and new BitLocker recovery keys to Active Directory. Also, see how to backup existing and new BitLocker recovery keys to Active Directory“.

Efficient Delegation Using the Control Wizard for Bitlocker Recovery Keys

Nevertheless, Use the Delegation of Control Wizard to empower support staff without granting unnecessary privileges for Bitlocker recovery keys. Before proceeding, ensure you have a security group or OU that you wish to delegate these rights are present.

Therefore, Open Server Manager, click AD DS on the Dashboard, right-click the Server, and choose Active Directory Users and Computers.

Bitlocker recovery

In ADUC (dsa.msc), right-click on the OU that contains your computer objects and select Delegate Control.

Key management

Similarly, Click “Next”.

Active Directory

This will open the Delegation of Control wizard. Consequently, Click on Add.

Security permissions

Nonetheless, Add the group you wish to delegate the right to view the BitLocker Recovery Keys. You may want to see this guide for more information “How to backup existing and new BitLocker recovery keys to Active Directory using a simple script“.

Screenshot-2021-10-15-at-20.38.09

In addition, Click “Next” to continue with the configuration

Screenshot-2021-10-15-at-20.40.59

Create a custom task to delegate. Click “Next”.

Screenshot-2021-10-15-at-20.42.05

Only the following objects in the folder: msFVE-REcoveryInformation objects
However, Click “Next”.

Screenshot-2021-10-15-at-20.43.28

Click on “Full Control”. Click “Next” to proceed

Screenshot-2021-10-15-at-20.44.32

Furthermore, Click on Finish to complete the configuration. From henceforth, the members of the group we have added will be able to access the Bitlocker recovery keys stored inside the organizational unit named Support Admin.

Screenshot-2021-10-15-at-20.52.50

Note: These rights above will also grant the delegated Support Agents Full control. This means they can read and delete these keys using the ADSI edit commands. If desired, use the LDP.exe tool to delegate control for Bitlocker recovery keys with proper read rights.

You may want to read “how to restore deleted user accounts in Active Directory with Microsoft LDP and PowerShell“.

Viewing the BitLocker Recovery Keys

You can use the BitLocker Drive Encryption Administration Utilities. Kindly visit these guides “how to backup existing and new BitLocker recovery keys to Active Directory. Also, see how to backup existing and new BitLocker recovery keys to Active Directory“. This can also be done via PowerShell with the command below.

Get-ADComputer computername | Get-ADObject -pr * | Select-Object distinguishedname, msFVE-REcoveryPassword, whencreated

FAQs

How does BitLocker protect your device?

BitLocker protects and prevents a unauthorized users from booting another operating system or run a software hacking tool from breaking Windows file and system protections or performing offline viewing of the files stored on the protected drive. This protection is achieved by encrypting the entire Windows volume. With BitLocker all user and system files are encrypted including the swap and hibernation files.

How does BitLocker ensure data integrity?

BitLocker enhances data protection by bringing together two major sub-functions. Full drive encryption and the integrity checking of early boot components. Integrity checking the early boot components helps to ensure that data decryption is performed only if those components appear unmolested and that the encrypted drive is located in the original computer

How does BitLocker perform Integrity check?

BitLocker implement integrity checking starting with the boot manager and then continuing to check each subsequent component. The boot manager performs a cryptographic verification of its own integrity before checking the integrity of the next component in the boot process (winload.exe or winresume.exe, if coming from hibernation). Once control is passed to the OS loader, it will check CI.dll, and
once the computer boots, Code Integrity (CI.dll) will perform integrity checks on all other modules.

I trust you discovered valuable insights in this blog post. If you have any queries, please ask in the comment section. Additionally, Your understanding of delegate control for Bitlocker recovery keys matters.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:Bitlocker, BitLocker Recovery Keys, BitLocker Status, Microsoft BitLocker Administration and Monitoring, Microsoft Windows, Windows 10, Windows 11

Post navigation

Previous Post: Hide Default BitLocker Drive Encryption item in Windows
Next Post: How to delegate permissions for backing up TPM password

Related Posts

  • image 9
    Fix Error 853: The remote access connection completed, but authentication failed because the certificate that authenticates the client to the server is not valid Network | Monitoring
  • Internet Explorer
    How to uninstall Internet Explorer from your Windows Device Windows
  • Remote Desktop 2 1
    How to install RDS via Quick Start Deployment: Install, Publish, Update, and Uninstall Remote Desktop Web Client Web Server
  • kerberosdelegation
    Kerberos Delegation: A Comprehensive Guide Web Server
  • Create Password Policies via GPO
    How to Create a Password Policy with Group Policy Object Windows
  • BANNER
    How to Install and Set Lively Wallpaper on Windows 11 Windows

More Related Articles

image 9 Fix Error 853: The remote access connection completed, but authentication failed because the certificate that authenticates the client to the server is not valid Network | Monitoring
Internet Explorer How to uninstall Internet Explorer from your Windows Device Windows
Remote Desktop 2 1 How to install RDS via Quick Start Deployment: Install, Publish, Update, and Uninstall Remote Desktop Web Client Web Server
kerberosdelegation Kerberos Delegation: A Comprehensive Guide Web Server
Create Password Policies via GPO How to Create a Password Policy with Group Policy Object Windows
BANNER How to Install and Set Lively Wallpaper on Windows 11 Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Featured image 2
    5 Steps to Fix Outlook continually prompts for passwords Windows
  • cisco asa 5510
    Copying TFTP Image to Flash Network | Monitoring
  • Featured image new
    How to find out who restarted Windows Server Windows
  • OxscsIP
    Enable Virtualization in Windows: Fixing VirtualBox’s 32-bit Option Virtualization
  • ghm
    MDT Driver injection: How to import drivers in .exe format into Microsoft Deployment Toolkit Windows Server
  • MECM Deployment copy
    How to install Endpoint Configuration Manager on HyperV VM Windows Server
  • ios microsoft remote desktop app
    Remote Desktop can not find the computer FQDN and this might mean that FQDN does not belong to the specified network Windows
  • sd 1
    How to link your Android or iPhone to your Windows 10 PC Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.