Enforce to save BitLocker recovery key in AD

Hi there,

Currently I am trying to manage Windows device by using GCPW. Afterwards, my main goal is to deploy BitLocker and store recovery key on to AD.

There two issues that I encountered during my implementation:

  1. Enforcing BitLocker failed >> I've tried enabling the configuration through Google Workspace admin console. Unfortunately, after restarting the device, it could only pops-up BitLocker settings and asking user whether BitLocker wanted to be enable or stay as-is. I've double checked the user that is currently logged-in to that device that is installed GCPW as well for BitLocker configuration settings to be applied to that user. Probably wanted an assurance whether activating BitLocker could be enforce for user or it could only enable via users.
  2. Storing recovery key in AD failed >> I've tried enabling the BitLocker settings for "Save BitLocker recovery information to Active Directory Domain Services" & "Don't enable BitLocker until recovery information is stored in Active Directory" > Users can't enable BitLocker unless their device is connected to your organization's domain and BitLocker recovery information is backed up to Active Directory. The current condition of the device is that I made that device to become joined-domain, and it connects to the AD. What is the output that I need to see after the configuration from the admin console that is already been configured and after making joined-domain device? From my end it didn't work.

Thank you for the time reading this and hopefully we all can get answers afterwards.

0 REPLIES 0
Top Labels in this Space
Top Solution Authors