bitlocker key active directory
bitlocker key active directory
Siemens
ÑÐÅÄÑÒÂÀ ÏÐÎÌÛØËÅÍÍÎÉ ÀÂÒÎÌÀÒÈÇÀÖÈÈ
îôèöèàëüíûé ïàðòíåð Ñèìåíñ
Êàòàëîã ÑÀ01 2012
àðõèâíûé
(4872) 700-366
skenergo@mail.ru

Bitlocker Key Active — Directory

1. Executive Summary BitLocker Drive Encryption (Windows) can automatically escrow its recovery passwords and key packages to Active Directory (AD) . This provides a centralized, auditable, and secure backup mechanism, preventing data loss if a user forgets their PIN/password or if TPM hardware changes. This report covers how it works, requirements, verification steps, and security considerations. 2. How BitLocker Key Escrow to AD Works When BitLocker is enabled on a domain-joined computer, the BitLocker Drive Encryption Administration Utility ( manage-bde ) or Group Policy can force the computer to back up recovery information to AD.

manage-bde -protectors -get C: manage-bde -protectors -adbackup C: -id GUID Or backup all protectors: bitlocker key active directory