At minimum, we recommend storing all BitLocker Recovery keys in AD/Entra before encrypting OS Drives. These settings can be applied through Intune without turning encryption on or off on the device, but will take effect if/when drive encryption is turned on.
- Log in to the Intune console at https://intune.microsoft.com.
- Click on the Endpoint security tab on the left-hand side.
- Click on Disk encryption.
- Click + Create Policy. Alternatively, you can edit a current policy.
- For Platform, select Windows, and for Profile, select BitLocker.
- Click Create.
- Give your new policy a Name and Description.
- Click Next.
- On the next page, there are many configuration options. If you do not change a setting, that setting will remain at the default, and the end user will be able to change it. We are only focusing on three settings in particular for this guide.
- Expand Operating System Drives.
- Change the Choose how BitLocker-protected operating system drives can be recovered setting to Enabled. This will open up additional options.
- Change the Do not enable BitLocker until recovery information is stored toggle to AD DS for operating system drives to True.
- Change the Save BitLocker recovery information to AD DS for operating system drives toggle to True.
- Feel free to configure any additional settings as needed and click Next.
- Assign scope tags on this page if you use this feature. Scope Tags are mainly organizational and purely optional in Intune. Click Next.
- This is the assignments page. You can assign this policy to groups of Computers and/or Users or even All devices, which is recommended to ensure all devices are storing their keys in AD/Entra before encryption.
- Click Next.
- On the Review/Create page, verify what you have configured.
- Click Save to deploy.Â
Comments
Article is closed for comments.