Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Network | Monitoring » Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk

Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk

Posted on 05/09/202411/03/2026 Christian By Christian No Comments on Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk
BitLocker selfservice or helpdesk recovery

BitLocker recovery is the process in which access to a BitLocker-protected drive is restored in the event the drive doesn’t unlock using its default unlock mechanism. In this article, we shall discuss “Force BitLocker recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk”. Please see Perform BitLocker Recovery Password Rotation in Active Directory, what are the Reasons for BitLocker Recovery Prompt: Query the number of BitLocker recovery request, and how to Delegate control for BitLocker recovery keys in Active Directory.

Note: To perform self-service recovery, an end user must have physically logged on to the computer (not remotely) at least one time successfully to be able to recover their BitLocker key using the Self-Service Portal. Otherwise, they must use the Helpdesk Portal for key recovery. See below for helpdesk prerequisite as well.

Also, see how to “Force BitLocker Recovery mode: How to unlock BitLocker Protected Drive, and “How to Perform a Self-service Password Reset using the Windows Login Integration Client“.

BitLocker recovery process via the Self-service Portal

The self-service portal is used by organisation staffs to recover their BitLocker keys as part of self serve process without involving the help desk at all.

Note: You can keep tabs on the BitLocker Recovery Request via the MBAM Recovery Audit report. Please see how to Create a web page to visualize the output of BitLocker Script.

Below are some reasons why you may want to get your BitLocker Recovery key. Here are more Reasons for BitLocker Recovery Prompt: Query the number of BitLocker recovery request, and how to fix BitLocker always prompting for Recovery Key.

  • BIOS and TPM changed
  • OS Files Modified and
  • Lost Pins and Phrases (which is not applicable in our case)

Test on a Physical Device

Launch the Command Prompt or  PowerShell window and type the following command <manage-bde -ForceRecovery C:> depending on the drive you wish to initiate the recovery on.

Force BitLocker Recovery

Upon restart, the BitLocker Recovery screen will be prompted.

Recovery Key

Here is a guide on “Understanding Microsoft BitLocker Administration and Monitoring Roles“, and How to upgrade Veeam Backup & Replication to version 12.2.

Perform Self Service Recovery

Note: If you are experiencing errors due to invalid key ID. Please proceed to ‘What could cause Invalid Key ID when requesting BitLocker Recovery Key” section below for other possible reasons or how to “Resolve Invalid Key ID when requesting BitLocker Recovery Key.

Next. you have to open the following page to perform the self-serve recovery. Please log in using the username associated with the PC that is displaying the BitLocker recovery prompt.

URL for example "xxxxx://techdambam.com/SelfService/Recovery/Index"
Login with domain credentials

Enter the key ID as shown below (You do not need to enter the whole digits). Do not forget to specify a reason for the retrieval.

Get Recovery key - selfservice portal

The BitLocker recovery Key has been successfully retrieved from the Self-service portal as shown below.

BitLocker key Revealed

Next, proceed to the PC and enter this recovery key as shown below.

Enter BitLocker recoverz key

Your device will restart and you will once again have access to you PC.

Note: If you are testing on a VM. You may want to disable secure boot and this will prompt the recovery window upon restart as well or follow the same steps discussed above.

Please see how to “Backup existing and new BitLocker Recovery Keys to Active Directory“. Also, see how to Fix no BitLocker Recovery tab in Active Directory.

BitLocker Recovery via the Helpdesk

Note: This section is sub-divided into two groups which are as follow below.

You must be part of at least one of these user groups in AD in order to be able to perform BitLocker recovery via the helpdesk.

  • Advanced Helpdesk Users: Provides access to all areas of the Administration and Monitoring Website. Users who have this role enter only the recovery key, and not the end user’s domain and user name when helping end-users recover their drives.

    If a user is a member of both the MBAM Helpdesk Users group and the MBAM Advanced Helpdesk Users group. The MBAM Advanced Helpdesk Users group permissions override the MBAM Helpdesk Users Group permissions.
  • Help Desk Users: Provides access to the Manage TPM and Drive Recovery areas of the Administration and Monitoring Website. Users who have this role must fill in all fields, including the end-users domain and account name, when they use either area.

Note: It will be worth noting that when you perform BitLocker Key Recovery via the Helpdesk or Advanced Helpdesk. The events will be logged (who did what and why) and the BitLocker key will be rotated.

Please see How to fix Domain Join Error during Windows Deployment, how to reset Microsoft 365 User Password, and Inbound connection Error: Failed to Perform Scheduled Replication [Part 2].

Performing recovery via the Advanced HelpDesk

Note: You will be required to access the URL “xxxxx://techdambam.com/HelpDesk/” and login with the helpdesk credentials.

As you can see below, the User Domain and User ID is not required. Enter the key id and reason for the unlock and click on “Submit”.

Advanced helpdesk

Performing recovery via the HelpDesk User Role

As you can see below, the User Domain and User ID is required.

Enter the key id and reason for the unlock and click on “Submit”

Helpdesk

After submitting the request.

The recovery key will be revealed and you can now provide the user with this key

Key revealed via helpdesk

Now you can proceed and have the PC recovered as shown

Enter BitLocker recoverz key

What could cause Invalid Key ID when requesting BitLocker Recovery Key?

Unable to grt Bitlocker recvery key via the selfservice portal 2

One of the reasons could be that the User profile has been deleted from the device and you are trying to use this user to perform BitLocker self-service recovery.

Another could be that, the PC is not available in AD /DNS as shown below and therefore not be available in MBAM Reporting Services.

No Output

Note: If the device is also non-complaint in MBAM, the user will not be able to perform self-service recovery.

Another reason could be due to last contact date my the device. You can take a look on the Computer or Enterprise Reporting services for more information about the device.

Last contact

To fix this issue and ensure the MABAM agent is able to communicate with the MBAM server correctly. I will run the command “gpupdate /force” in order to have the policies reapplied. With this, the device will be recognized with the Recovery key ID and was you should be able to perform the self-service recovery.

Note: Even with this issue, you could retrieve the BitLocker recovery key with the helpdesk and from AD when configured to save to AD.

device recognised
Self-service recovery is now possible

FAQs

How to troubleshoot “Error: A device with BitLocker enabled prompts “BitLocker must be turned on to force a recovery volume C:”.

First, determine the BitLocker status via the command line using “manage-bde -status” or over the Reporting Services dashboard. As you can see, a reboot is required. Please use the command shutdown -r to reboot your PC.
BitLocker Warning

Does a deletion of the user profile impact BitLocker self-service recovery via MBAM?

Yes, the local deletion of a user profile can impact the authorisation of MBAM (Microsoft BitLocker Administration and Monitoring) self-service recovery. User profiles on a machine can store important information such as encryption keys, and user-specific settings.

If a user profile is deleted locally associated with that user might also be deleted. This could potentially disrupt access to BitLocker-encrypted drives and the ability to use MBAM self-service recovery. Please see What Is the NTUSER.DAT File in Windows?

If the local profile is deleted and recreated, the new profile may not have the necessary associations with the MBAM service that the old profile had. This could mean that the self-service recovery tool does not recognize the user as authorized to perform the recovery

I hope you found this article on “Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk” very useful. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Network | Monitoring Tags:Bitlocker, BitLocker recovery process via the Self-service Portal, BitLocker Recovery via the Advanced Helpdesk, BitLocker Recovery via the Helpdesk, Force BitLocker Recovery: Perform BitLocker Recovery via the Self-Service Portal and Helpdesk, Invalid Key ID when requesting BitLocker Recovery Key, MBAM, MBAM for Bitlocker Administration, Microsoft Windows, Performing recovery via the Advanced HelpDesk, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: Upgrade Veeam Backup and Replication to version 12.2
Next Post: Harden your Veeam Backup Server with Microsoft AppLocker

Related Posts

  • cisco asa 5505 adaptive security appliance desktop firewall 10 100 47 18790 04 56708 pekm1000x469ekm
    Administer Cisco ASA: Mastering CLI Management Network | Monitoring
  • Featured image 10
    Add a Printer Using an IP Address in Windows 11 Network | Monitoring
  • Cannot save to the location Windows
    How to Fix Cannot Save to Windows System32 Default.rdp Error Network | Monitoring
  • CloudFrontAWS
    Serve Private S3 Bucket Contents Via CloudFront AWS/Azure/OpenShift
  • Data Migration Assistant Compatibility mode
    DMA Compatibility Mode: Prepare and Migrate Safely Network | Monitoring
  • UpdateOfficeOnlineServer 1
    Perform Office Online Server Update via the Microsoft Update Catalog Network | Monitoring

More Related Articles

cisco asa 5505 adaptive security appliance desktop firewall 10 100 47 18790 04 56708 pekm1000x469ekm Administer Cisco ASA: Mastering CLI Management Network | Monitoring
Featured image 10 Add a Printer Using an IP Address in Windows 11 Network | Monitoring
Cannot save to the location Windows How to Fix Cannot Save to Windows System32 Default.rdp Error Network | Monitoring
CloudFrontAWS Serve Private S3 Bucket Contents Via CloudFront AWS/Azure/OpenShift
Data Migration Assistant Compatibility mode DMA Compatibility Mode: Prepare and Migrate Safely Network | Monitoring
UpdateOfficeOnlineServer 1 Perform Office Online Server Update via the Microsoft Update Catalog Network | Monitoring

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • BitLocked suspended and resumed
    Query MBAM-protected Client for non-compliance [Part 2] Windows
  • Could not load file or assembly
    Unable to edit MDT XML unattended file: Could not load file Windows Server
  • Computer policy could not be updated
    How to fix Computer Policy could not be updated successfully Windows
  • tuning tomcat
    How to upgrade Apache Tomcat from One Version to another Web Server
  • banner
    How to Create a Child and Tree Domain Windows Server
  • Data drive is locked by BitLocker and not OS drive Fastboot Option
    Fast Boot Options: Fix specific Drive issue with BitLocker [MBAM] Windows
  • HiveNightmare
    Workaround for “SeriousSAM or HiveNightmare” registry vulnerability for Windows 10 and 11 Security | Vulnerability Scans and Assessment
  • Restrict Access to USB Drives
    Deny Execute Access: Restrict Access to USB Drives on Windows [Part 1] Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,821 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.