mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 03:43:39 +00:00
Alt text & descriptions
This commit is contained in:
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Enforcing BitLocker policies by using Intune known issues
|
||||
description:
|
||||
description: provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices.
|
||||
ms.reviewer: kaushika
|
||||
ms.prod: w10
|
||||
ms.sitesec: library
|
||||
@ -11,12 +11,12 @@ manager: kaushika
|
||||
audience: ITPro
|
||||
ms.collection: Windows Security Technologies\BitLocker
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 10/2/2019
|
||||
ms.date: 10/7/2019
|
||||
---
|
||||
|
||||
# Enforcing BitLocker policies by using Intune: known issues
|
||||
|
||||
This article provides assistance for issues you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices. The Intune portal indicates if BitLocker has failed to encrypt on or more managed devices.
|
||||
This article provides assistance for issues that you may see if you use Microsoft Intune policy to manage silent BitLocker encryption on devices. The Intune portal indicates whether BitLocker has failed to encrypt on or more managed devices.
|
||||
|
||||

|
||||
|
||||
@ -314,13 +314,13 @@ The OMA-URI references for these settings are the following:
|
||||
|
||||
During regular operations, BitLocker Drive Encryption generates events such as event ID 796 and event ID 845.
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
You can also verify if the BitLocker Recovery Key has been uploaded to Azure by checking the device details in the Azure AD Devices section.
|
||||
|
||||

|
||||

|
||||
|
||||
On the device, check the Registry Editor to verify the policy settings on the device. Verify the entries under the following subkeys:
|
||||
|
||||
|
Reference in New Issue
Block a user