BitLocker not saving key to AD: We have the solution

Madeleine Dean By: Madeleine Dean
2 minute read

Home » BitLocker not saving key to AD: We have the solution

BitLocker not saving key to AD

BitLocker is a built-in full disk encryption feature available on Windows 7, 8.1 and Windows 10. This tool allows users to protect data by encrypting the whole disk or only individual sectors.

When usig BitLocker, it’s extremely important to save the recovery information on Active Directory. To do this, you need to enable a policy called “Store BitLocker recovery information in Active Directory Domain Services”.

However, sometimes BitLocker fails to save the key to AD. This is a very annoying situation since it leaves the respective machines with the drive locked and users don’t have access to recovery passwords.

To avoid such situations, follow the instructions listed below to make sure that BitLocker saves your recovery keys to AD.

How to backup BitLocker recovery key to AD

1. Make sure the Group Policy setting to save the key to AD is enabled

  1.  Navigate to this registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\FVE
  2. To allow backup of recovery information, make sure that the values listed below are available:
    1. OSActiveDirectoryBackup should be set to 1
    2. FDVActiveDirectoryBackup should be set to 1
    3. RDVActiveDirectoryBackup should be set to 1.

Also, make sure that the client is a member of the OU and the BitLocker group policies apply to the respective OU.

2. Get the ID for the numerical password protector

To do this, you need to open an elevated Command Prompt, enter the following command and hit Enter: manage-bde -protectors -get c:

In the example above, the C: drive is used. Of course, you need to replace the C: with the letter of the drive that you use.

Once you hit Enter, a list will appear in CMD and there you will find an ID and password for the Numerical Password protector.

3. Backup recovery information to AD

To enable backup recovery information to AD, enter this CMD command: manage-bde -protectors -adbackup c: -id {…}

Replace the dots in the brackets with the ID of Numerical Password protector that you obtained at step 1.

The recovery information for the volume in the active directory should now be visible.

We hope this helps. Also, if you found other solutions to enable BitLocker key saving to AD or fix BitLocker key backup issues, use the comments below to let us know.

RELATED STORIES TO CHECK OUT:

Discussions

Next up

How to fix Unhandled Exception error in Windows 10

Sovan Mandal avatar. By: Sovan Mandal
5 minute read

6 solutions to fix  Unhandled Exception Errors Perform clean boot Perform SFC scan Run the Hardware Troubleshooter Perform virus scan Un-install and re-installing .NET Framework […]

Continue Reading

10 Christmas gift ideas for your doting mom and dearest dad

Sovan Mandal avatar. By: Sovan Mandal
4 minute read

The yuletide season is here and shopping has already reached frenzied proportions. Also, your mom and dad are easily among the most important persons you […]

Continue Reading

What to do if you cannot load the management console

Sovan Mandal avatar. By: Sovan Mandal
2 minute read

Trying to run the Trusted Platform Module (TPM) Management console in Windows 10 can often lead to the Cannot load management console error. This again […]

Continue Reading