user account
2 TopicsBitLocker recovery key not being uploaded into Intune when using BackupToAAD-BitLockerKeyProtector
Hello, We are having an issue with the BackupToAAD-BitLockerKeyProtector PowerShell cmdlet to upload the BitLocker recovery key of our devices into AAD/Intune. We currently use Sophos Device Encryption to encrypt our devices but want to migrate the recovery keys into Intune as we transition to Intune BitLocker policies. We created a script that attempts to upload the BitLocker recovery key into Intune but it appears the BackupToAAD-BitLockerKeyProtector cmdlet only works on devices where the user logs in with a domain account, and not a local Windows account. Is this standard behaviour? I would have assumed that since the device is enrolled into Intune it would use the Management Extension to communicate with Intune for this task - and have no reliance on the logged in user. Looking at the BitLocker PowerShell module itself, a method named " BackupRecoveryInformationToCloudDomain" is called when this cmdlet is executed. I haven't been able to find much online about what happens beyond here. It would be good to know a bit more about this cmdlet as documentation is limited online. CheersSolved38KViews0likes7CommentsSwitching to another user account disconnects the VPN conection
No matter whether i sign out or not before switching to a different user account, the VPN still gets disconnected anyway and causes problems for any apps and program running on that user account that rely on VPN Internet connection. please change the behavior so the VPN will stay connected when user account switch happens. If you also find this useful, please upvote for it on Feedback hub app: https://aka.ms/AA6s61b1.5KViews0likes0Comments