Backup Bitlocker Recovery key to AD DS

(Last Updated On: 2019-11-06)

In a previous post, I wrote about How to setup Bitlocker without TPM. Now let’s just suppose you work in an environment where you have multiple IT People managing Multiple Laptops. If even one person does not save the Recovery Keys where it is supposed to be you potentially could lock yourself out of a Drive. A better way of doing this is to Backup Bitlocker Recovery Key to AD DS.

Now, this is a three-step approach:

  • Get your AD Ready to accept Recovery Key’s
  • Setup the Group Policy’s to Force Backup
  • Setup Bitlocker

Before we get the AD ready first look at any Computer Properties in the AD Users and Computer. As per below, you can not view if the Bitlocker Key’s have been backed up.

Computer AD Properties

Get your AD Ready

AD DS Schema

So First we need to verify that the server schema has been extended to support Bitlocker Recovery Keys. The Five scheme values are:

  • ms-FVE-KeyPackage
  • ms-FVE-RecoveryGuid
  • ms-FVE-RecoveryInformation
  • ms-FVE-RecoveryPassword
  • ms-FVE-VolumeGuid

To see if the schema has been extended you can use the below two techniques.

Powershell

In Powershell simply paste the below command:

Get-ADObject -SearchBase ((GET-ADRootDSE).SchemaNamingContext) -Filter {Name -like "ms-FVE-*"} | Format-Table -Property Name

ADSI

Alternatively, click on the Start button type in ADSI and open ADSI Edit. Right Click ADSI Edit and choose to connect. In the Known naming Context make sure to choose Schema.

AD Schema Management
ADSI

Simply browse down until you find the keys.

ADSI
Schema Management

Schema Missing

As per Microsoft, all the schema should be there is you are running Server 2003 SP 1 or newer. If the schema is missing you can use the below command to extend the schema. For more information on this Click Here

ldifde -i -v -f BitLockerTPMSchemaExtension.ldf -c "DC=X" "DC=YourDomain,dc=com" -k -j .

You need to fill your domain details at: DC=YourDomain,dc=com

If you are not sure what should be filled in. go to Active Directory Users and Computer. Right-click the Domain Name and choose Properties. Then go to the Attribute Editor and Copy the distinguishedName value.

Just in case your Attribute editor does not show, click on View and choose Advanced Features in the AD Users and Computer Panel.

Add Roles and Features

Next open your Server Manager, go to Manage and Add Roles and Features.

Add Roles and Features

Click next until you get to the Server Selection and make sure you choose the which has Domain Services installed.

Server Selection

At the Feature Selection choose Bitlocker Drive Encryption and add the features.

Bitlocker Drive Encryption
Add Features
Recovery Password Viewer

Continue on until you can install the required Features. Note the server does require a reboot on completion.

Bitlocker Installation

Once the server rebooted, go back to the Computer properties in AD Users and Computers. You should have and Extra tab now for Bitlocker Recovery.

AD Computer Properties
Bitlocker Recovery

Delegate AD Permissions

The last step to get your server ready is to Delegate permission to allow writeback from the device. To do this go to the location on the AD User and Computers where the devices that you will be enabling Bitlocker on are kept. Right-click the OU and choose Delegate Control.

OU Delegation

At the Users or Groups Click Add… and add the Self. It should look similar to below.

Delegation Users and Groups

On the following screen choose Custom Task and Next.

Task Delegation

Choose Only the following objects in the folder and tick both the options for: Create selected objects in this folder and Delete Selected objects in the folder

Ad Object Type

For the Permission page Tick only, Property-specific and then in the permissions scroll down to Write msTPM-OwnerInformation

Delegation Permissions

Click Next and Finish to complete the Delegation.

Delegation Completed

This is it if you did not receive any errors you AD is ready to receive Recovery Keys. Next, we need to set Group Policy’s that tells the machine where to store the Recovery Keys.

If you liked what you read Please Share.

I’d love it if you followed me on Twitter and Facebook.

Also, feel free to subscribe to my posts by email. Thanks for reading.

Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *