Operations for MBAM

Applies To: Microsoft BitLocker Administration and Monitoring

After completing all necessary planning and then deploying MBAM, you can configure and use it to manage enterprise BitLocker encryption.

The information in this section describes post-installation configuration, management, and day-to-day operations tasks.

Note

By default, BitLocker uses the IIS logs for its websites and services. These are located under $systemdrive$\inetpub\logs\w3svc

Web service and website trace logs are created under the folder specified for installing the websites and services.

  • How to Use MBAM Reports
    Describes MBAM reporting and what information the reports contain, as well as how to generate reports on enterprise compliance, individual computers, key recovery activity, and hardware compatibility.
  • How to Recover an Encrypted Drive
    Describes how to access the BitLocker centralized key recovery data system that can provide a recovery password for data recovery on locked, corrupted, or moved drives.

See Also

Concepts

BitLocker Administration and Monitoring Home
Getting Started With MBAM
Deploying MBAM
Troubleshooting MBAM

Other Resources

Planning for MBAM