Modern Workplace Consultant and Microsoft Certified Trainer

Today a quick blog post about the problem with HAADJ devices and how to turn on BitLocker. Last month I was giving Intune training to 2 different end customers.

During the first training, I was asked if I knew a solution to enable BitLocker on HAADJ devices by means of Intune. Because they ran into problems with the message that the recovery key cannot be backed up to (Azure) Active Directory. Unfortunately, I don't have a screenshot of that anymore.

With this solution in mind, I was able to give this solution to the second end customer immediately and they could test it immediately. And it worked and was immediately satisfied.

But at least here is the solution to enable BitLocker on HAADJ devices by means of an Endpoint Security Encryption policy and, yes, also, a GPO with some basic settings.

I assume you already have a fully configured Intune BitLocker policy. Below you will find the necessary BitLocker settings for a GPO.

  1. Go to Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption

And configure the following settings:

  1. Fixed Data Drives -> Choose how BitLocker-protected fixed drives can be recovered -> Allow 48-digit recovery password and Allow 256-bit recovery key

  2. Tick Omit recovery options from the BitLocker setup wizard

  3. Tick Save BitLocker recovery information to AD DS for fixed data drives

  4. Select Backup recovery passwords and key packages

  5. Tick Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives

  6. Operating System Drives -> Choose how BitLocker-protected operating system drives can be recovered -> Allow 48-digit recovery password and Allow 256-bit recovery key

  7. Tick Omit recovery options from the BitLocker setup wizard

  8. Tick Save BitLocker recovery information to AD DS for operating system drives

  9. Select Backup recovery passwords and key packages

  10. Tick Do not enable BitLocker until recovery information is stored to AD DS for operating data drives

  11. Removable Data Drives -> Choose how BitLocker-protected removable drives can be recovered -> Allow 48-digit recovery password and Allow 256-bit recovery key

  12. Tick Omit recovery options from the BitLocker setup wizard

  13. Tick Save BitLocker recovery information to AD DS for removable data drives

  14. Select Backup recovery passwords and key packages

  15. Tick Do not enable BitLocker until recovery information is stored to AD DS for removalble data drives

I hope this is of valuable information to anyone who is fiddling with this.

Until next time.

You’ve successfully subscribed to Jeroen Burgerhout
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.