From c46d43744ea0cd31c3308b175fc456e52294e424 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 4 Jun 2018 17:23:46 -0700 Subject: [PATCH] added link to delegation blog post --- ...e-your-organization-for-bitlocker-planning-and-policies.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index f3e5d15248..eed67e922b 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -161,9 +161,9 @@ BitLocker integrates with Active Directory Domain Services (AD DS) to provide ce Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Turn on BitLocker backup to Active Directory Domain Services -By default, only Domain Admins have access to BitLocker recovery information. When you plan your support process, define what parts of your organization need access to BitLocker recovery information. Use this information to define how the appropriate rights will be delegated in your AD DS environment. +By default, only Domain Admins have access to BitLocker recovery information, but [access can be delegated to others](https://blogs.technet.microsoft.com/craigf/2011/01/26/delegating-access-in-ad-to-bitlocker-recovery-information/). -The following recovery data will be saved for each computer object: +The following recovery data is saved for each computer object: - **Recovery password**