Bitlocker, Windows 7 Ultimate and Server 2008 R2

These questions seem so easy that I should have found them in the 3 Microsoft Press books or over the last 90 minutes of Googling.

(1)  Do I need to do anything to Server 2008 R2 domain to store the bitlocker recovery keys?
(2)  How do I view the keys in AD to confirm that they are being stored?
(3)  How do I recover a drive if the user loses the key?

LVL 20
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Rory de LeurConsultant End-User ComputingCommented:

Take a look at this webcast from Technet..
- TechNet Webcast: Microsoft BitLocker in the Enterprise: BitLocker Tools to Make Your Life Easier
Answers to all of these questions are in the BitLocker Drive Encryption Deployment Guide for Windows 7
and BitLocker Drive Encryption Step-by-Step Guide for Windows 7.

1) You do not need to extend the schema with WS2008 R2, as is necessary for Windows Server 2003 SP1 or SP2. However, there are several VBS configuration files that you should review/deploy in order to gain desirable AD-integration features (e.g. permissioning computer objects to back up TPM recovery information to AD, configuring group policy options, validating AD configuration against a test client workstation, etc.).

2) BitLocker Recovery Password Viewer (part of RSAT which installs extends ADUC to show a BitLocker Recovery tab on computer objects).

3) Allocate key IT personnel (help desk, etc.) as Data Recovery Agents (works similar to EFS Recovery Agents or password reset process). Use BitLocker repair tool for desktop techs or other onsite personnel.

Happy reading ... hope this helps!

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Apologies for the duplicate response ... I meant to include under #2 above:

Check the following attributes via ADSIEdit or ADSI CLI tools (dsquery, ldifde, etc.):
  •               CN=ms-FVE-KeyPackage – attributeSchema  object
  • CN=ms-FVE-RecoveryGuid – attributeSchema  object
  • CN=ms-FVE-RecoveryInformation –  classSchema object
  • CN=ms-FVE-RecoveryPassword –  attributeSchema object
  • CN=ms-FVE-VolumeGuid – attributeSchema  object
  • CN=ms-TPM-OwnerInformation –  attributeSchema object
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows 7

From novice to tech pro — start learning today.