BitLocker Administration and Monitoring: Part 3
This is the third and final post in a series about MBAM. This post will detail the required GPO’s and will actually recover a key from MBAM.
Group Policy
First, we need to import the Group Policy templates for MBAM. You can download the templates for the entire MDOP pack here: https://microsoft.com/en-us/download/details.aspx?id=41183. Extract the cab file, and copy the BitLockerManagement.admx and BitLockerUserManagement.admx files and the ADML files that corresponds to your language to a domain controller. Insert them into your administrative templates. You will find them at Computer Configuration > Administrative Templates > Windows Components > MDOP MBAM (BitLocker Management). You should set the following policy. It tells the MBAM client where to report.
MDOP MBAM (BitLocker Management) > Client Management
Configure MBAM Services
All other Group Policy options are up to your organization.
You can use the other Group Policies to encrypt the drive. You can also manually encrypt drives using the BitLocker Control Panel applet. You will also notice that there is a new BitLocker Encryption Options Control Panel applet.
Recovering a Key
Now that I have a client properly installed, I can recover a key if necessary. I made a BIOS change to my test machine and booted it. You are now presented with a screen that presents a recovery key ID.
I can the first 8 characters of the key over to my MBAM self-service page and type it in:
After that, I can press Get Key and it will show the recovery key.
The process from the Help Desk portal is the same – input the key and submit. If you want to enter a user domain and ID, you can.