<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Bitlocker on Ru Campbell MVP</title>
    <link>https://campbell.scot/categories/bitlocker/</link>
    <description>Recent content in Bitlocker on Ru Campbell MVP</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Mon, 22 Mar 2021 18:01:18 +0000</lastBuildDate>
    <atom:link href="https://campbell.scot/categories/bitlocker/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Update BitLocker Unique Identifiers with Intune</title>
      <link>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</link>
      <pubDate>Mon, 22 Mar 2021 18:01:18 +0000</pubDate>
      <guid>https://campbell.scot/update-bitlocker-unique-identifiers-with-intune/</guid>
      <description>&lt;p&gt;BitLocker unique identifiers are values used to identify the ownership of an encrypted volume.  The device that performs the encryption holds the unique identifier and as encryption begins, it also records this against the metadata of that encrypted volume.&lt;/p&gt;
&lt;p&gt;The identifiers are typically used in tandem with the BitLocker removable data-drive setting &lt;strong&gt;write access to devices configured in another organisation&lt;/strong&gt; which, if set to &lt;strong&gt;block&lt;/strong&gt;, will prevent write operations on devices where the unique identifier of the removable drive doesn&amp;rsquo;t match a list of unique identifiers managed on the device.  The idea here is you want to enforce BitLocker on removable drives to improve data loss (encrypted drives, if found, are unreadable without the means to decrypt them), &lt;em&gt;but&lt;/em&gt; you only want them to be encrypted within your organisation: someone can&amp;rsquo;t encrypt their device elsewhere and then copy data to it.  You may want to do this because it means you, as an administrator, would not be able to decrypt it if required.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store BitLocker Recovery Keys in Azure AD for Devices Already Encrypted</title>
      <link>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</link>
      <pubDate>Fri, 15 Jan 2021 18:18:36 +0000</pubDate>
      <guid>https://campbell.scot/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted/</guid>
      <description>&lt;p&gt;As you move from on-premises or third-party infrastructure to Microsoft 365 and Azure AD, you will want to keep those BitLocker recovery keys safe.  You can store those keys either in on-premises Active Directory or in the cloud with Azure AD.&lt;/p&gt;
&lt;p&gt;The behavior of the BitLocker / Azure AD relationship is that the recovery keys will only be stored against the device object in Azure AD if the encryption happens when the device is already Azure AD or Hybrid Azure AD Joined.  You can then retrieve the recovery keys from the Azure AD portal or Microsoft Endpoint Manager (which really just takes you back to Azure AD&amp;rsquo;s properties for the device).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
