BitLocker not saving key to AD: We have the solution

Madeleine Dean By: Madeleine Dean
2 minute read
BitLocker not saving key to AD

Home » Windows » BitLocker not saving key to AD: We have the solution

BitLocker is a built-in full disk encryption feature available on Windows 7, 8.1 and Windows 10. This tool allows users to protect data by encrypting the whole disk or only individual sectors.

When usig BitLocker, it’s extremely important to save the recovery information on Active Directory. To do this, you need to enable a policy called “Store BitLocker recovery information in Active Directory Domain Services”.

However, sometimes BitLocker fails to save the key to AD. This is a very annoying situation since it leaves the respective machines with the drive locked and users don’t have access to recovery passwords.

To avoid such situations, follow the instructions listed below to make sure that BitLocker saves your recovery keys to AD.

How to backup BitLocker recovery key to AD

1. Make sure the Group Policy setting to save the key to AD is enabled

  1.  Navigate to this registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE
  2. To allow backup of recovery information, make sure that the values listed below are available:
    1. OSActiveDirectoryBackup should be set to 1
    2. FDVActiveDirectoryBackup should be set to 1
    3. RDVActiveDirectoryBackup should be set to 1.

Also, make sure that the client is a member of the OU and the BitLocker group policies apply to the respective OU.

2. Get the ID for the numerical password protector

To do this, you need to open an elevated Command Prompt, enter the following command and hit Enter: manage-bde -protectors -get c:

In the example above, the C: drive is used. Of course, you need to replace the C: with the letter of the drive that you use.

Once you hit Enter, a list will appear in CMD and there you will find an ID and password for the Numerical Password protector.

3. Backup recovery information to AD

To enable backup recovery information to AD, enter this CMD command: manage-bde -protectors -adbackup c: -id {…}

Replace the dots in the brackets with the ID of Numerical Password protector that you obtained at step 1.

The recovery information for the volume in the active directory should now be visible.

We hope this helps. Also, if you found other solutions to enable BitLocker key saving to AD or fix BitLocker key backup issues, use the comments below to let us know.

RELATED STORIES TO CHECK OUT:

Discussions

Next up

Switching tabs in Firefox spikes disk usage on Windows 10 v1903

Alexandru Voiculescu By: Alexandru Voiculescu
2 minute read

Reddit users reported that the new Windows 10 v1903 is causing a spike in the disk usage when switching between Firefox tabs. I don’t know […]

Continue Reading

Users are reporting UI inconsistencies in Windows 10 v1903

Rabia Noureen avatar. By: Rabia Noureen
2 minute read

We already reported about UI and design bugs in Windows 10 May 2019 Update in a previous post. It seems like Microsoft wanted to release […]

Continue Reading

Why gamers shouldn’t upgrade to Windows 10 May Update

Rabia Noureen avatar. By: Rabia Noureen
2 minute read

Microsoft officially rolled out Windows 10 v1903 (May 2019 Update) a few days ago. This feature update came with many new features, improvements as well […]

Continue Reading