Saturday, December 27, 2025

Setting Security Basics in Microsoft Entra ID: Controlling BitLocker Recovery Keys

Continuing our “Setting the Security Basics Right” series in Microsoft Entra ID, today we’re focusing on devices and a common oversight that can compromise your BitLocker strategy.

By default, users can easily retrieve their own BitLocker recovery keys:

  • Navigate to myaccount.microsoft.com → Devices tab → Select device → View BitLocker recovery key

One click, and the key is visible—bypassing any BitLocker policies configured via Intune. In an enterprise environment, this creates unnecessary risk, as recovery keys should be strictly controlled and accessed only through IT or helpdesk channels.

How to fix this:

  1. Go to Microsoft Entra Admin Center → Devices → Device settings

  2. Scroll to the bottom

  3. Set “Restrict users from recovering the BitLocker key(s) for their owned devices” to Yes

This prevents non-admin users from accessing BitLocker keys while allowing admins with appropriate roles to retain full access.

Bonus recommendation:
While in Device settings, enable Microsoft Entra Local Administrator Password Solution (LAPS). This activates cloud-based LAPS for Entra-joined and hybrid devices, providing secure storage, automatic rotation, and controlled retrieval of local admin passwords. It’s especially useful if you plan to roll out LAPS policies via Intune.

#MicrosoftEntraID #Intune #BitLocker #Cybersecurity #EndpointSecurity #LAPS #Microsoft365 #MicrosoftSecurity




No comments:

Post a Comment

Apple Account-Driven User Enrollment Guide

Set Up Account-Driven Apple User Enrollment for Microsoft Intune. This guide explains how to configure account-driven Apple User Enrollment ...