BitLocker Recovery Information not backing up to AD DS

ejscn used Ask the Experts™
I am not able to get BitLocker recovery information to back up to Active Directory.  My understanding is that the BitLocker and TPM recovery information should show up in the BitLocker Recovery tab of the computer object in AD, but it isn't.  Here is what I've done:

- Set up a GPO with the following:
      Computer/Policies/Administrative Templates/System/Trusted Platform Module Services: Turn on TPM backup to Active Directory Domain Services - enabled
      Computer/Policies/Administrative Templates/Windows Components/BitLocker Drive Encryption: Store BitLocker recovery information in Active Directory Domain Services (Server 2008 and Vista)
      Computer/Policies/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drives: Choose how BitLocker-protected system Drives can be recovered
            Allow Data recovery agent: Enabled
            Configure user storage of BitLocker recovery information:  Allow 48-digit recovery password, Allow 256-bit recovery key
            Omit recovery options from the BitLocker setup wizard: Disabled
            Save Bitlocker recovery information to AD DS for operating system drives: Enabled
            Configure Storage of BitLocker recovery information to AD DS: Store recovery passwords and key packages
            Do not enable BitLocker until recovery information is stored to AD DS for operating system drives: Disabled
      Computer/Policies/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drives: Require Additional authentication at Startup: Enabled
            Allow Bitlocker without a compatible TPM: enabled
            Settings for computers with a TPM:
                  Configure TPM startup: allow TPM
                  Configure TPM startup pin: Allow startup PIN with TPM
                  COnfigure TPM startup key: allow startup key with TPM
                  Configure TPM startup key and PIN: Allow startup key and PIN with TPM

- Set AD permissions to give SELF Write msTPM-OwnerInformation and Write msTPM-TpmInformationForComputer per

We are running 2012 R2 DCs running  at 2012 R2 domain and forest functional levels, so my understanding is there aren't any required schema extensions.  The computer is running Windows 8.1 Pro.  I have verified that the computer is applying the GPO and I have double-checked that these permissions are applying to my test machine, but still no recovery information in AD.  I have decrypted and encrypted the machine multiple times.  What am I doing wrong?
Watch Question

Do more with

Expert Office
EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE®
Distinguished Expert 2018
You should check that the GPO applied. Start rsop.msc at the client, and navigate to that sections you quoted. Or is it simply that you don't know where to find the recovery information?
The info will only be backed up if the GPO applies before you encrypt, not afterwards.
Afterwards, you can use the command line to save it:
manage-bde -protectors c: -id...
as shown here:


Thanks, McKnife.  That was right.  I was using gpresult to check to see if the policy applied, and it did, but with errors.  rsop.msc showed that there were errors modifying the registry.  Since this was just a test PC, I formatted it, which resolved the issue.  Thank you for your help!

Do more with

Expert Office
Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals.

Start 7-Day Free Trial