SOLVED

bitlocker keys saved in azuread accessible by endusers

%3CLINGO-SUB%20id%3D%22lingo-sub-1484207%22%20slang%3D%22en-US%22%3Ebitlocker%20keys%20saved%20in%20azuread%20accessible%20by%20endusers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484207%22%20slang%3D%22en-US%22%3EHi%2C%3CBR%20%2F%3Ecurrently%20facing%20the%20issue%20where%20enduser%20can%20request%20their%20own%20bitlocker%20recovery%20keys.%20This%20is%20a%20process%20we%20would%20like%20to%20have%20an%20approval%20flow%20on%20as%20malicious%20use%20to%20recover%20encrypted%20drives%20could%20be%20possible.%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1484218%22%20slang%3D%22en-US%22%3ERe%3A%20bitlocker%20keys%20saved%20in%20azuread%20accessible%20by%20endusers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484218%22%20slang%3D%22en-US%22%3Efor%20example%20a%20former%20employee%20that%20cloned%20his%20disk%20etc%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1484220%22%20slang%3D%22en-US%22%3ERE%3A%20bitlocker%20keys%20saved%20in%20azuread%20accessible%20by%20endusers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484220%22%20slang%3D%22en-US%22%3EHi%2C%20thanks%20for%20your%20input.%20We%20are%20working%20on%20auditing%20recovery%20events%20so%20admins%20have%20a%20view%20into%20all%20recovery%20requests.%20Your%20suggestion%20about%20integrating%20with%20an%20approval%20workflow%20is%20well%20taken%20and%20we%20will%20route%20it%20back%20to%20the%20feature%20team.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1484225%22%20slang%3D%22en-US%22%3ERE%3A%20bitlocker%20keys%20saved%20in%20azuread%20accessible%20by%20endusers%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484225%22%20slang%3D%22en-US%22%3EYes%2C%20definitely%20a%20key%20scenario%20for%20the%20auditing%20feature%3C%2FLINGO-BODY%3E
Highlighted
New Contributor
Hi,
currently facing the issue where enduser can request their own bitlocker recovery keys. This is a process we would like to have an approval flow on as malicious use to recover encrypted drives could be possible.
3 Replies
Highlighted
for example a former employee that cloned his disk etc
Highlighted
Solution
Hi, thanks for your input. We are working on auditing recovery events so admins have a view into all recovery requests. Your suggestion about integrating with an approval workflow is well taken and we will route it back to the feature team.
Highlighted
Yes, definitely a key scenario for the auditing feature