1. Microsoft Account (Most Common for Personal Devices)
If BitLocker was enabled using a Microsoft account:
- Go to: https://account.microsoft.com/devices/recoverykey
- Sign in with the same Microsoft account used on the device.
- You’ll see a list of devices and their corresponding BitLocker recovery keys.
2. Azure Active Directory (for Work/School Devices)
If the device is joined to Azure AD:
- Go to: https://portal.azure.com
- Navigate to Azure Active Directory > Devices > All devices.
- Select the device > click BitLocker keys (you need the right permissions like Global Admin or Intune Admin).
3. Active Directory (On-Prem AD with GPO Storage)
If using legacy on-prem AD:
- Open Active Directory Users and Computers.
- Enable Advanced Features under the “View” menu.
- Right-click the computer object > Properties > BitLocker Recovery tab.
4. On the Device Itself (If Backed Up Locally)
- Check
C:\Users\<YourName>\Documents
for a.txt
file named something like: php-templateBitLocker Recovery Key <Computer-Name>.txt
- Check USB drives used during initial setup.
5. Using PowerShell (If You Still Have Access to the Encrypted System)
Run this in an elevated PowerShell prompt:
Get-BitLockerVolume | Select-Object -ExpandProperty KeyProtector