Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » What are the effect of renaming an MBAM-Protected Computer
  • windows admin center banner 825x400 1
    How to install or update and uninstall extensions in Windows Admin Center Windows Server
  • Screenshot 2020 07 25 at 13.09.08
    Fix the following error occurred when DNS was queried for the service location Windows Server
  • Temp Files
    Recover Temp Files using Disk Drill etc on Windows 10 and 11 Windows
  • c
    Action cannot be complete because the computer is open in Wimserv Windows Server
  • Screenshot 2020 05 13 at 23.07.56
    ENA Driver on Amazon EC2: Easy Installation Guide AWS/Azure/OpenShift
  • feature image
    How to install PostgreSQL on Ubuntu Linux
  • Razer
    Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment
  • RDP
    The connection was denied because the user is not authorized for remote Login: Enable Remote Desktop Connection on Windows 11 for non-administrators or selected users Windows

What are the effect of renaming an MBAM-Protected Computer

Posted on 14/04/202215/01/2024 Christian By Christian No Comments on What are the effect of renaming an MBAM-Protected Computer
Bitlocker management

In this article, you will learn about the effect of renaming an MBAM-protected computer. Microsoft Bitlocker Administration streamlines the management of BitLocker drive encryption. This administrator interface empowers you to effectively configure optimal BitLocker encryption policies for your enterprise and ensures seamless monitoring of policy compliance. Kindly refer to the following similar guides on BitLocker. how to fix the missing BitLocker Recovery Tab in Active Directory Users and Computers, and how to enable or disable BitLocker Drive Encryption on Windows 10 and Virtual Machines.

Microsoft BitLocker Administration and Monitoring (MBAM) is a component of the Microsoft Desktop Optimization Pack (MDOP) is a suite available to Software Assurance customers through an additional subscription. Here is a guide on how to deploy Microsoft BitLocker Administration and Monitoring Tool.

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost or stolen devices. It is an encryption feature built into computers running Windows 10 Pro. If you’re running Windows 10 Home you will not be able to use BitLocker.

BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later.

Managing Device Effects and Synchronization in Microsoft Bitlocker Administration

When delving into the realm of Microsoft Bitlocker Administration, it’s crucial to consider the effects on devices safeguarded by MBAM or BitLocker. An important aspect to bear in mind is that devices extracted from AD may not undergo automatic synchronization with MBAM. such as deletion and name change.

When dealing with Microsoft Bitlocker Administration, a crucial strategy is to prevent any single point of failure. Enhance redundancy by maintaining two separate databases: the MBAM SQL Database and the Active Directory. While configuring, opt to store BitLocker recovery keys in both databases, reinforcing data protection.

To be able to view these keys in AD in the Properties tab or via the Search function in Active Directory Users and Computers. You must have the BitLocker RSAT enabled in Server Features and Roles.

Here is an interesting guide if you wish to do this on a single device: How to backup existing and new BitLocker recovery keys to Active Directory using a simple script. You may also want to see this guide on how to enable or disable BitLocker Drive Encryption on Windows 10 and Virtual Machines.

MBAM Protected Device Scenario

A device has been renamed from TechDA001 to TechDA002. Here are some possible questions you may be faced with.

  • Would the MBAM client still be able to communicate with the MBAM Db and have the recovery key escrowed to the MBAM database again after a rename is performed?
  • Will MBAM automatically update the new AD record?

Suppose you have the keys saved to a secondary location like the AD. In that case, the Bitlocker Recovery keys can recover the drive when the BitLocker Recovery window is invoked.

What MBAM is not capable of doing?

Before we proceed with the resolution (recommendation), the following are the things MBAM cannot do.

  • Decrypt systems and re-encrypt with the right algorithms. We have already seen this multiple times.
  • Automatically update a device that is renamed to a new name.
  • Force users to change the PIN in XX number of days.
  • Force a change to the recovery key in an xx number of days etc.
  • The computer account is deleted and recreated. When this happens, you cannot use the selfservice or helpdesk to recovery the BitLocker Recovery keys. Also, the AD BitLocker recovery Tab will be empty if you have polices configured to back up keys to AD.

My recommendation

Renaming the machine prevents escrowing OwnerAuth passwords (TPM) to MBAM Db with a new name. MBAM Agent sends Recovery password after renaming. After renaming, MBAM Agent treats the machine as encrypted, sending only recovery info, not TPM password. This situation parallels MBAM taking over an already encrypted machine (requires decryption and re-encryption).

For your Information Only:

In Windows 8 and higher (Windows 1 and 11). MBAM 2.5 SP1 can now escrow the OwnerAuth passwords without owning the TPM. During service startup, MBAM queries to see if the TPM is already owned. And if so, it requests the passwords from the operating system. The passwords are then escrowed to the MBAM database. In addition, Group Policy must be set to prevent the OwnerAuth from being deleted locally

Since we are now aware of What MBAM cannot do. The goal of MBAM is to have devices report to the MBAM Db and not just to AD only. Hence, re-initialize the TPM and re-image the device to secure it under MBAM’s protection. After renaming a device, you may want to re-initialize the TPM by re-imagining the device.

MBAM stores TPM hash information only once when MBAM initialize the TPM chip on a machine. Since TPM initialization is a one-time requirement for BitLocker/MBAM, we also have to save this information as an entry in SQL for the client which actually initialised the TPM.

If you want TPM hash information to be in SQL again, you will have to follow the steps below.

  • Clear TPM from BIOS. Th Please see this guide “how to clear, enable or disable TPM in Windows via the BIOS or UEFI” for more information.
  • re-image the machine with the new computer name.
  • Install the MBAM agent on client and let MBAM reinitialize TPM and store the information in MBAM SQL DB. Below is an image of how to clear off TPM from the BIOS.
encryption administration
Note: This will result in data loss if you do not have the BitLocker recovery key.

Clearing TPM Ownership: Windows 10 Version 1607 and BitLocker Encryption Integration

Note: If you clear the TPM from the Management Console (tpm.msc), this will be discarded by Windows”. See “Starting with Windows 10, version 1607, Windows will not retain the TPM owner password when provisioning the TPM. The password will be set to a random high entropy value and then discarded”.

This is because clearing or resetting the TPM resets it to an unowned state. Once the TPM clears, the Windows 10 OS will automatically re-initialize and regain ownership. In this way, the BitLocker encryptions work without any issues. You may want to read this guide: How to clear the TPM via the management console or Windows Defender Center App.

You can use the Windows Defender Security Center app to clear the TPM as a troubleshooting step, or as a final preparation before a clean installation of a new operating system.

Preparing for a clean installation in this way helps ensure that the new operating system can fully deploy any TPM-based functionality that it includes, such as attestation. However, not clearing the TPM before installing a new operating system could still result in most TPM functionality working correctly.

If you clear the TPM using the tpm.msc console or Windows Defender Security Center app in any case, Windows may succeed in taking ownership as usual, but you will also need to use a script to populate the new hostname with the TPM password from the older one. Isn’t this cumbersome?!

BitLocker-Protected Computer

If you need to rename a computer that is being protected by BitLocker Drive Encryption, be careful how you do it. If you remove the computer from the domain, rename the computer, and then rejoin it to the domain, the recovery key will be invalidated and will not work anymore.

You can use the manage-bde –protectors –adbackup command or the methods described here “How to backup existing and new BitLocker recovery keys to Active Directory using a simple script” to store the recovery key in Active Directory. Rename the computer while it is still joined to the domain for the recovery key to remain valid.

If this is just the situation without adding the complexity of MBAM to it. I would say you are fine :-)

How to rename an MBAM-protected Computer correctly

Ensure you change the device name correctly. Note: Do not put in workgroup and then add in a domain instead directly change the hostname. All you have to do is change the hostname and reboot. It will change the hostname successfully and u retain the recovery key as well in AD.

I hope you found this blog post on the effect of renaming an MBAM-protected Computer helpful. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Bitlocker, BitLocker Recovery Keys, BitLocker Status, MBAM, Microsoft BitLocker Administration and Monitoring, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: Check Weather Conditions via Command Line on Windows, macOS, Linux and Web
Next Post: Error unregistering Runner from GitLab: Forbidden with Docker Executor

Related Posts

  • Uninstall MicrosoftDefenderUpdate
    Remove Microsoft Defender Update on Windows 10 & Server Windows
  • onedrived43
    How to share Files and Restore Previous versions of Files in Microsoft OneDrive Backup
  • Screenshot 2020 12 06 at 17.01.38
    Start Print Spooler Service: How to fix Print Spooler Service not running Windows
  • ddwwdw
    How to query a list of installed programs in Windows Windows Server
  • Featured post.
    How to fix The Group Policy settings for BitLocker startup options are in conflict and cannot be applied Security | Vulnerability Scans and Assessment
  • images 8
    Microsoft Direct Access: Now Always On VPN Windows Server

More Related Articles

Uninstall MicrosoftDefenderUpdate Remove Microsoft Defender Update on Windows 10 & Server Windows
onedrived43 How to share Files and Restore Previous versions of Files in Microsoft OneDrive Backup
Screenshot 2020 12 06 at 17.01.38 Start Print Spooler Service: How to fix Print Spooler Service not running Windows
ddwwdw How to query a list of installed programs in Windows Windows Server
Featured post. How to fix The Group Policy settings for BitLocker startup options are in conflict and cannot be applied Security | Vulnerability Scans and Assessment
images 8 Microsoft Direct Access: Now Always On VPN Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • windows admin center banner 825x400 1
    How to install or update and uninstall extensions in Windows Admin Center Windows Server
  • Screenshot 2020 07 25 at 13.09.08
    Fix the following error occurred when DNS was queried for the service location Windows Server
  • Temp Files
    Recover Temp Files using Disk Drill etc on Windows 10 and 11 Windows
  • c
    Action cannot be complete because the computer is open in Wimserv Windows Server
  • Screenshot 2020 05 13 at 23.07.56
    ENA Driver on Amazon EC2: Easy Installation Guide AWS/Azure/OpenShift
  • feature image
    How to install PostgreSQL on Ubuntu Linux
  • Razer
    Administrative rights gained through Razer devices on Windows 10 Security | Vulnerability Scans and Assessment
  • RDP
    The connection was denied because the user is not authorized for remote Login: Enable Remote Desktop Connection on Windows 11 for non-administrators or selected users Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.