Solved

Determine which computers have Bitlocker installed?

Posted on 2012-04-02
6
2,957 Views
Last Modified: 2014-03-29
I've gotten a request to determine which computers on our network have Bitlocker enabled on their hard disks. What can I run to find this out?
0
Comment
Question by:vitalsign0
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 9

Accepted Solution

by:
Ashok Dewan earned 168 total points
ID: 37796584
You can check with the help of this command
manage-bde -status

FOr more info check this link > http://www.forensicswiki.org/wiki/BitLocker_Disk_Encryption
0
 
LVL 1

Author Comment

by:vitalsign0
ID: 37796671
Ok, that's a start. How could I put that in a script file to query against a list of PC names?
0
 
LVL 2

Assisted Solution

by:adamnl
adamnl earned 166 total points
ID: 37797601
To check BitLocker Status on a remote pc

    manage-bde -status -cn COMPUTERNAME


To change a BitLocker TPM pin on a remote pc connected to a Domain:

    manage-bde -changepin -cn COMPUTERNAME

To add a Bitlocker recovery key to Active Directory for a remote PC:

    manage-bde -protectors -add C: -cn COMPUTERNAME


Please note that your AD has to have the necessary schema extensions before the above command will work.
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 166 total points
ID: 37798646
I would use a domain startup script.
manage-bde -status |findstr /C:"Fully Encrypted" && manage-bde -status > \\server\share\bitlockerstatus\%computername%.txt

Open in new window

Whenever BL is used and at least one partition is fully encrypted, this script will produce a textfile named like the encrypted computer.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question