Hello @EnterpriseArchitect,
Thank you for posting your query on Microsoft Q&A.
As you mentioned, I see you are unable to see the Bitlocker Recovery keys under Entra ID, Intune and My account blade. Looking for steps to achieve that with PowerShell script in Intune.
To set this up in Intune, follow the steps below.
- Sign-in to the Microsoft Intune admin center portal.
- Browse to Devices – Windows – Scripts and Remediations - Platform Scripts
- Click on Add
- Give a Name
- Select the script
- Set Run this script using the logged on credentials as No
- Set Enforce script signature check to No
- Set Run script in 64 bit PowerShell Host as Yes
- Deploy to the user\device based group.
Once the script executes, the devices should escrow the recovery key to AAD almost immediately. You can check under Devices->Windows->Recovery Keys Or AAD->Devices.
Please find the PowerShell script below to upload in Intune Portal.
try{
$BitlockerVol = Get-BitLockerVolume -MountPoint $env:SystemDrive
$KPID=""
foreach($KP in $BitlockerVol.KeyProtector){
if($KP.KeyProtectorType -eq "RecoveryPassword"){
$KPID=$KP.KeyProtectorId
break;
}
}
$output = BackupToAAD-BitLockerKeyProtector -MountPoint "$($env:SystemDrive)" -KeyProtectorId $KPID
return $true
}
catch{
return $false
}
Reference:
https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension
https://rahuljindalmyit.blogspot.com/2021/06/how-to-force-escrowing-of-bitlocker.html
I hope this information is helpful. Please feel free to reach out if you have any further questions.
If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.
Thanks,
Raja Pothuraju.