View BitLocker reports
Applies to: Configuration Manager (current branch)
After you install the reports on the reporting services point, you can view the reports. The reports show BitLocker compliance for the enterprise and for individual devices. They provide tabular information and charts, and have filters that let you view data from different perspectives.
In the Configuration Manager console, go to the Monitoring workspace, expand Reporting, and select the Reports node. The following reports are in the BitLocker Management category:
You can access all of these reports directly from the reporting services point website.
Note
For these reports to display complete data:
- Create and deploy a BitLocker management policy to a device collection
- Clients in the target collection need to send hardware inventory
BitLocker computer compliance
Use this report to collect information that's specific to a computer. It provides detailed encryption information about the OS drive and any fixed data drives. To view the details of each drive, expand the Computer Name entry. It also indicates the policy that's applied to each drive type on the computer.
You can also use this report to determine the last known BitLocker encryption status of lost or stolen computers. Configuration Manager determines compliance of the device based on the BitLocker policies that you deploy. Before you try to determine the BitLocker encryption state of a device, verify the policies that you've deployed to it.
Note
This report doesn't show the Removable Data Volume encryption status.
Computer details
Column name | Description |
---|---|
Computer name | User-specified DNS computer name. |
Domain name | Fully qualified domain name for the computer. |
Computer Type | Type of computer, valid types are Non-Portable and Portable. |
Operating system | OS type of the computer. |
Overall compliance | Overall BitLocker compliance status of the computer. Valid states are Compliant and Non-compliant. The compliance status per drive may indicate different compliance states. However, this field represents that compliance state from the specified policy. |
Operating system compliance | Compliance status of the OS on the computer. Valid states are Compliant and Non-compliant. |
Fixed data drive compliance | Compliance status of a fixed data drive on the computer. Valid states are Compliant and Non-compliant. |
Last update date | Date and time that the computer last contacted the server to report compliance status. |
Exemption | Indicates whether the user is exempt or non-exempt from the BitLocker policy. |
Exempted user | The user who's exempt from the BitLocker policy. |
Exemption date | Date on which the exemption was granted. |
Compliance status details | Error and status messages about the compliance state of the computer from the specified policy. |
Policy cipher strength | Cipher strength that you selected in the BitLocker management policy. |
Policy: Operating system drive | Indicates if encryption is required for the OS drive and the appropriate protector type. |
Policy: Fixed data drive | Indicates if encryption is required for the fixed data drive. |
Manufacturer | Computer manufacturer name as it appears in the computer BIOS. |
Model | Computer manufacturer model name as it appears in the computer BIOS. |
Device users | Known users on the computer. |
Computer volume
Column name | Description |
---|---|
Drive letter | The drive letter on the computer. |
Drive type | Type of drive. Valid values are Operating System Drive and Fixed Data Drive. These entries are physical drives rather than logical volumes. |
Cipher strength | Cipher strength that you selected during in the BitLocker management policy. |
Protector types | Type of protector that you selected in the policy to encrypt the drive. The valid protector types for an OS drive are TPM or TPM+PIN. The valid protector type for a fixed data drive is Password. |
Protector state | Indicates that the computer enabled the protector type specified in the policy. The valid states are ON or OFF. |
Encryption state | Encryption state of the drive. Valid states are Encrypted, Not Encrypted, or Encrypting. |
BitLocker enterprise compliance dashboard
This report provides the following graphs, which show BitLocker compliance status across your organization:
Compliance status distribution
Non-compliant - Errors distribution
Compliance status distribution by drive type
Compliance status distribution
This pie chart shows compliance status for computers in the organization. It also shows the percentage of computers with that compliance status, compared to the total number of computers in the selected collection. The actual number of computers with each status is also shown.
The pie chart shows the following compliance statuses:
Compliant
Non-compliant
User exempt
Temporary user exempt
Policy not enforced
Note
This state may be caused by a device that's encrypted and previously escrowed its key, but can't currently escrow its key. Because it can't escrow its key it doesn't enforce policy anymore.
Unknown. These computers reported a status error, or they're part of the collection but have never reported their compliance status. The lack of a compliance status could occur if the computer is disconnected from the organization.
Non-compliant - Errors distribution
This pie chart shows the categories of computers in your organization that aren't compliant with the BitLocker Drive Encryption policy. It also shows the number of computers in each category. The report calculates each percentage from the total number of non-compliant computers in the collection.
User postponed encryption
Unable to find compatible TPM
System partition not available or large enough
TPM visible but not initialized
Policy conflict
Waiting for TPM auto provisioning
An unknown error has occurred
No information. These computers don't have the BitLocker management agent installed, or it's installed but not activated. For example, the service isn't working.
Compliance status distribution by drive type
This bar chart shows the current BitLocker compliance status by drive type. The statuses are Compliant and Non-compliant. Bars are shown for fixed data drives and OS drives. The report includes computers without a fixed data drive, and only shows a value in the Operating System Drive bar. The chart doesn't include users who have been granted an exemption from the BitLocker Drive Encryption policy or the No Policy category.
BitLocker enterprise compliance details
This report shows information about the overall BitLocker compliance across your organization for the collection of computers to which you deployed the BitLocker management policy.
Column name | Description |
---|---|
Managed computers | Number of computers to which you deployed a BitLocker management policy. |
% Compliant | Percentage of compliant computers in the organization. |
% Non-compliant | Percentage of non-compliant computers in the organization. |
% Unknown compliance | Percentage of computers with a compliance state that's not known. |
% Exempt | Percentage of computers exempt from the BitLocker encryption requirement. |
% Non-exempt | Percentage of computers not exempt from the BitLocker encryption requirement. |
Compliant | Count of compliant computers in the organization. |
Non-Compliant | Count of non-compliant computers in the organization. |
Unknown Compliance | Count of computers with a compliance state that's not known. |
Exempt | Count of computers that are exempt from the BitLocker encryption requirement. |
Non-exempt | Count of computers that aren't exempt from the BitLocker encryption requirement. |
Computer details
Column name | Description |
---|---|
Computer name | DNS computer name of the managed device. |
Domain name | Fully qualified domain name for the computer. |
Compliance status | Overall compliance status of the computer. Valid states are Compliant and Non-compliant. |
Exemption | Indicates whether the user is exempt or non-exempt from the BitLocker policy. |
Device users | Users of the device. |
Compliance status details | Error and status messages about the compliance state of the computer from the specified policy. |
Last contact | Date and time that the computer last contacted the server to report compliance status. |
BitLocker enterprise compliance summary
Use this report to show the overall BitLocker compliance across your organization. It also shows the compliance for individual computers to which you deployed the BitLocker management policy.
Column name | Description |
---|---|
Managed computers | Number of computers that you manage with BitLocker policy. |
% Compliant | Percentage of compliant computers in your organization. |
% Non-compliant | Percentage of non-compliant computers in your organization. |
% Unknown compliance | Percentage of computers with a compliance state that's not known. |
% Exempt | Percentage of computers exempt from the BitLocker encryption requirement. |
% Non-exempt | Percentage of computers not exempt from the BitLocker encryption requirement. |
Compliant | Count of compliant computers in your organization. |
Non-compliant | Count of non-compliant computers in your organization. |
Unknown compliance | Count of computers with a compliance state that's not known. |
Exempt | Count of computers that are exempt from the BitLocker encryption requirement. |
Non-exempt | Count of computers that aren't exempt from the BitLocker encryption requirement. |
Recovery audit report
Note
This report is only available from the BitLocker administration and monitoring website.
Use this report to audit users who have requested access to BitLocker recovery keys. You can filter on the following criteria:
- A specific type of user, for example, a help desk user or an end user
- If the request failed or was successful
- The specific type of key requested: Recovery Key Password, Recovery Key ID, or TPM Password Hash
- A date range during which the retrieval occurred
Column name | Description |
---|---|
Request date and time | Date and time that an end user or help desk user requested a key. |
Audit request source | The site from where the request came. Valid values are Self-Service Portal or Helpdesk. |
Request result | Status of the request. Valid values are Successful or Failed. |
Helpdesk user | The administrative user who requested the key. If a helpdesk admin recovers the key without specifying the user name, the End User field is blank. A standard helpdesk user must specify the user name, which appears in this field. For recovery via the self-service portal, this field and the End User field display the name of the user making the request. |
End user | Name of the user who requested key retrieval. |
Computer | Name of the computer that was recovered. |
Key type | Type of key that the user requested. The three types of keys are: - Recovery key password: used to recover a computer in recovery mode - Recovery key ID: used to recover a computer in recovery mode for another user - TPM password hash: used to recover a computer with a locked TPM |
Reason description | Why the user requested the specified key type, based upon the option they selected in the form. |