Forum Discussion

ahmnoor395's avatar
ahmnoor395
Copper Contributor
Sep 08, 2022

Storing bitlocker recovery password in AD/Azure AD for Removable drives

Hello 

We have applied Bitlocker through Intune for OS, and Fixed drives for enrolled devices. Recovery passwords are saved on Azure AD/AD.

 

We have a requirement to apply the same for Removable drives, Subset of the settings are there in Intune, but it seems that we can't save the recovery password for removable drives on AD/Azure AD.

 

As shown below, those settings are not supported in MDM. can we apply the setting by custom OMA-URIs ?

 

 

5 Replies

  • trubio's avatar
    trubio
    Copper Contributor
    Im curious was there ever a solution you found? we are in the same situation. hoping for some guidance.
  • mikhailf's avatar
    mikhailf
    Iron Contributor

    Hello ahmnoor395 ,

     

    I assume that you used GPO to configure this setting and then uploaded this GPO to Intune Group Policy analytics.

    On the workstation that has this policy applied you can try to find what registry keys were changed by this GPO and then change these registry keys via Intune (for example, with PowerShell). 

    Hope it helps.

    • ahmnour's avatar
      ahmnour
      Copper Contributor

      mikhailf we looking to store the recovery key in Azure AD, storing the key in AD means the laptop or desktop should be on premises to start the encryption.

      • mikhailf's avatar
        mikhailf
        Iron Contributor
        If you are going to store the key in Azure AD, laptops and desktops should be connected to Azure AD. (Hybrid AD Joined or AD Joined).

Resources