Paolo Matarazzo 979a140976 updates
2023-10-11 12:03:32 -04:00

4.7 KiB

title, description, ms.collection, ms.topic, ms.date
title description ms.collection ms.topic ms.date
Manage BitLocker recovery password Learn how to recover BitLocker keys from Microsoft Entra ID and Active Directory Domain Services (AD DS).
highpri
tier1
how-to 09/29/2023

Recovery password

Retrieve the BitLocker recovery password protector for the OS volume

:::image type="icon" source="images/powershell.svg"::: PowerShell

(Get-BitLockerVolume -mountpoint $env:SystemDrive).KeyProtector | where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | ft KeyProtectorId,RecoveryPassword

:::image type="icon" source="images/cmd.svg"::: Command Prompt


Add a BitLocker recovery password protector for the OS volume

:::image type="icon" source="images/powershell.svg"::: PowerShell

Add-BitLockerKeyProtector -MountPoint -mountpoint $env:SystemDrive -RecoveryPasswordProtector

:::image type="icon" source="images/cmd.svg"::: Command Prompt


Remove a BitLocker key protector

:::image type="icon" source="images/powershell.svg"::: PowerShell

Remove-BitLockerKeyProtector -MountPoint C: -KeyProtectorId "{GUID}"

:::image type="icon" source="images/cmd.svg"::: Command Prompt


Backup a recovery password

:::image type="icon" source="images/powershell.svg"::: PowerShell

(Get-BitLockerVolume -mountpoint $env:SystemDrive).KeyProtector | where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | ft KeyProtectorId,RecoveryPassword
BackuptoAAD-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId "{GUID}"

:::image type="icon" source="images/cmd.svg"::: Command Prompt


Reset recovery password

It's recommended to invalidate a recovery password after it has been provided and used. The recovery password can be invalidated when it has been provided and used or for any other valid reason.

:::image type="icon" source="images/powershell.svg"::: PowerShell

:::image type="icon" source="images/cmd.svg"::: Command Prompt

manage-bde.exe can be used to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method.

  1. Remove the previous recovery password.

    `manage-bde.exe` -protectors -delete C: -type RecoveryPassword
    
  2. Add the new recovery password.

    `manage-bde.exe` -protectors -add C: -RecoveryPassword
    
  3. Get the ID of the new recovery password. From the screen, copy the ID of the recovery password.

    `manage-bde.exe` -protectors -get C: -Type RecoveryPassword
    
  4. Back up the new recovery password to AD DS.

    `manage-bde.exe` -protectors -adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692}
    

    Warning

    The braces {} must be included in the ID string.


Example: retrieve Bitlocker recovery keys for a Microsoft Entra joined device

function Get-EntraBitLockerKeys{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true, HelpMessage = "Device name to retrieve the BitLocker keys from Microsoft Entra ID")]
        [string]$DeviceName
    )
    $DeviceID = (Get-MGDevice -filter "displayName eq '$DeviceName'").DeviceId
    if ($DeviceID){
      $KeyIds = (Get-MgInformationProtectionBitlockerRecoveryKey -Filter "deviceId eq '$DeviceId'").Id
      if ($keyIds) {
        Write-Host -ForegroundColor Yellow "Device name: $devicename"
        foreach ($keyId in $keyIds) {
          $recoveryKey = (Get-MgInformationProtectionBitlockerRecoveryKey -BitlockerRecoveryKeyId $keyId -Select "key").key
          Write-Host -ForegroundColor White " Key id: $keyid"
          Write-Host -ForegroundColor Cyan " BitLocker recovery key: $recoveryKey" 
        }
        } else {
        Write-Host -ForegroundColor Red "No BitLocker recovery keys found for device $DeviceName"
      }
    } else {
        Write-Host -ForegroundColor Red "Device $DeviceName not found"
    }
}

Install-Module Microsoft.Graph.Identity.SignIns -Scope CurrentUser -Force
Import-Module Microsoft.Graph.Identity.SignIns
Connect-MgGraph -Scopes 'BitlockerKey.Read.All' -NoWelcome

Output example

PS C:\> Get-EntraBitLockerKeys -DeviceName DESKTOP-53O32QI
Device name: DESKTOP-53O32QI
 Key id: 4290b6c0-b17a-497a-8552-272cc30e80d4
 BitLocker recovery key: 496298-461032-321464-595518-463221-173943-033616-139579
 Key id: 045219ec-a53b-41ae-b310-08ec883aaedd
 BitLocker recovery key: 158422-038236-492536-574783-256300-205084-114356-069773