Score:0

Bitlocker Recovery Keys not showing in active directory suite

za flag

I recently asked this same question here about a month ago -> BitLocker Recovery Keys Not Showing in Active Directory

But things have changed now and I am still getting the same results. I am going to go as into detail as I can for this post so I don't have to make any more posts (hopefully).

Ok, so we need to store these keys on AD to meet DoD requirements and I wrote a little bit of Java to find out how many we have. After running my Java we have 97 out of 230 computers that have a stored key in AD.

I created a group policy for bitlocker and named it "GP - Bitlocker"

The first settings I changed are in this directory: Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Bitlocker Drive encryption

"Store bitlocker recovery information in active directory domain service"

"Choose Drive Encryption Method and Cipher Strength (Windows 8 / Server 2012)"

"Choose Drive Encryption Method and Cipher Strength (Windows 10)"

"Choose Drive Encryption Method and Cipher Strength (Windows Server 2008, Windows 7)"

Additionally I have changed settings in ../Operating System Drives (the .. being the previous directory)

"Require additional authentication at startup"

"Enforce drive encryption type on operating system drives"

"Choose how BitLocker-protected operating system drives can be recovered"

As for where the group policy is linked, it is stored in a directory with all of my other group policies that we have on our domain named "Group Policy Objects." It was linked to all OUs that we wanted to have the GP enabled but we took it off because it wasn't working and we wanted to only run tests on limited computers.

At the moment, "GP - Bitlocker" is linked to 2 OUs, "Test_Environment" and "Not known." Not known is an OU with real people's computers on our domain with an unspecified department and test_environment is just temporary computers that we use to test GPs.

"Not Known" had 4/16 computers with a stored key and test_enivronment has 1/4 computers with a stored key.

Our scope for the GP

Right now what we are thinking is that since many of our employees don't consistently connect to the VPN or even log onto their computers, they aren't able to get the GP update. We are a construction company and as such, we have many people who work out in the field for months at a time and don't use their computers. However, I think 97 should be more around 180 or so to be accurate to those who have computers in the field. If I am missing any information please let me know and I will be happy to fill in the gaps.

cn flag
Most organizations use recovery passwords. Storing plain text recovery agent passwords are prohibited in FIPS, so that is where a recovery key is needed. Typically you would use a key or a password, but not both and definitely not password if FIPS mode is enabled. BitLocker is hard coded to not use a recovery password/fail if FIPS mode is enabled.
cn flag
You mentioned DOD. Are any of the systems configured for FIPS? If so, some of those settings are inconsistent with FIPS and will not work. Also, you need to enable Group Policy environment debug logging on the systems that aren't working to confirm it is processing the policy, and if BitLocker is already enabled. Since the box is unchecked to require recovery information to be saved to AD, if it is enabled and something doesn't work with saving the recovery information to AD, it would need to be saved by running a manage-bde or PowerShell command.
za flag
@GregAskew Where do you see the unchecked box for recovery information to be saved in AD?
cn flag
https://i.stack.imgur.com/BiVfs.png Do not enable BitLocker until...
za flag
@GregAskew Ok I read about that in the group policy description, sounds like I wanted to have that on. I will have to get back to you on the FIPS and whether our systems are configured for it or not
joeqwerty avatar
cv flag
Go back to the basics; `1.` Should the GPO be applied to the computers in question? To answer that, run Group Policy Modeling in the GPMC. `2.` If the GPO should be applied, is it being applied? To answer that, run Group Policy Results in the GPMC. `3.` If the GPO should be applied, and it is being applied, are the conditions for the policy settings to be applied being met?
Score:0
au flag

Nick, when you asked your first question, your setting for recovery passwords (the 48 digit key that appears in the AD computer ovbject on the bitlocker recovery tab) were: "Do not allow 48-digit recovery password"

Now you changed that to require the recovery passwords. However, as these systems are encrypted already, these passwords will never make it to AD (as they are saved only at the moment of encryption and NOT afterwards), unless you manually make them. That should be done using a script that you deploy as immediate schedule task, for example batch code for c: drives:

for /f "tokens=1,2" %%a in ('manage-bde -protectors -get C: -Type recoverypassword ^| findstr ID') do manage-bde -protectors -adbackup c: -id %%b
Bernd Schwanenmeister avatar
au flag
...alas, since they didn't get created in the first place (as you forbid that), you will have to create them, first: manage-bde -protectors -add c: -rp
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.