osewisconsin.blogg.se

Bitlocker recovery password viewer
Bitlocker recovery password viewer













Double click on "Require additional authentication at startup" and configure your settings as follows:

bitlocker recovery password viewer

In this example, I'm configuring bitlocker to encrypt the OS drive.Ĩ. Under Computer Configuration->Policies->Administrative Templates->Windows Components->Bitlocker Drive Encryption, click on the appropriate folder for your configuration. Double Click on "Store Bitlocker Recovery information in Active Directory Domain Services" and configure it as follows:ħ. Navigate to Computer Configuration->Policies->Administrative Templates->Windows Components->Bitlocker Drive Encryption.ĥ. Right click on the GPO and select "Edit"Ĥ. Navigate the the GPO that's linked to the OU that you want to contain your settings for Bitlocker.ģ. After that's done, you'll need to set the proper group policy settings to configure the computers to back up the recovery information.Ģ. All that you'll need to do is to email and let us know which organizational unit (OU) contains the computers that you'll be encrypting and which group of users you'd like to have access to the stored bitlocker keys so that we can delegate the authority to non-domain administrators to view the recovery keys of the computer objects in that OU.

bitlocker recovery password viewer bitlocker recovery password viewer

The first step, adding the BitLocker Recovery Password Viewer to the domain controllers, has already been completed for you. Recovery information includes the recovery password for each BitLocker-protected drive, the TPM owner password, and the information required to identify which computers and drives the recovery information applies to. You can configure BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives and the Trusted Platform Module (TPM) to Active Directory Domain Services (AD DS).















Bitlocker recovery password viewer