220.127.116.11.7 Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Configure storage of BitLocker recovery information to AD DS:' is set to 'Enabled: Store recovery passwords and key packages'
Warning! Audit Deprecated
This audit has been deprecated and will be removed in a future update.
This policy setting allows you to control how BitLocker-protected operating system drives are recovered in the absence of the required startup key information. This policy setting is applied when you turn on BitLocker. In 'Save BitLocker recovery information to Active Directory Domain Services', choose which BitLocker recovery information to store in AD DS for operating system drives. If you select 'Backup recovery password and key package', both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you select 'Backup recovery password only', only the recovery password is stored in AD DS. The recommended state for this setting is: Enabled: Store recovery passwords and key packages. Rationale: Should a user lose their primary means for accessing an encrypted OS volume, or should the system not pass its boot time integrity checks, the system will go into recovery mode. If the recovery key has not been backed up to Active Directory, the user would need to have saved the recovery key to another location such as a USB flash drive, or have printed the recovery password, and now have access to one of those in order to recovery the system. If the user is unable to produce the recovery key, then the user will be denied access to the encrypted volume and subsequently any data that is stored there. Impact: Both the recovery password and the key package for the operating system drive will be saved to AD DS. Users will need to be domain connected to turn on BitLocker. This policy is not FIPS complaint.
To establish the recommended configuration, set the following Device Configuration Policy to Enabled: Store recovery passwords and key packages: To access the Device Configuration Policy from the Intune Home page: Click Devices Click Configuration profiles Click Create profile Select the platform (Windows 10 and later) Select the profile (Administrative Templates) Click Create Enter a Name Click Next Configure the following Setting Path: Computer Configuration/Windows Components/BitLocker Drive Encryption/Operating System Drives Setting Name: Choose how BitLocker-protected operating system drives can be recovered Configuration: Store recovery passwords and key packages Select OK Continue through the Wizard to complete the creation of the profile (profile assignments, applicability etc.) Note: More than one configuration setting from each of the Configuration profiles (ex: Administrative Templates, Custom etc.) can be added to each Device Configuration Policy. Note #2: This recommendation can also be set using the Endpoint protection profile using Windows Encryption settings. Default Value: BitLocker recovery information for the operating system drive is not backed up to AD DS.