Backing Up BitLocker Recovery Keys to On-Prem Active Directory in a Hybrid Intune Environment
Many organizations use both Microsoft Intune and on-premises Active Directory (AD) in a hybrid setup. Intune can manage BitLocker encryption on Windows devices, but by default it stores recovery keys in Azure AD. If your help-desk relies on the AD “BitLocker Recovery” tab and you don’t want to grant them Intune rights, you need a way to back up those keys directly to on-prem AD. Unfortunately, there’s no built-in Intune feature to do this—here’s what you can and can’t do today, plus recommended workarounds.
Why On-Prem AD Matters for BitLocker
- Help-Desk Access: Techs use the AD Users and Computers “BitLocker Recovery” tab to retrieve keys.
- Security Boundaries: You may not want to grant broad Intune read rights to on-prem teams.
- Audit & Compliance: Some policies mandate recovery keys reside in your own AD forest.
What Intune Does Out of the Box
- Automatic Key Backup to Azure AD: When you enable BitLocker via an Intune device configuration policy, Windows 10/11 stores the recovery key in Azure AD.
- Hybrid Azure AD Joined Devices: Keys backup automatically to Azure AD; they do not go to on-prem AD unless you configure additional tooling.
The PowerShell Script Myth
A frequently shared script for hybrid devices uses the BackupToAAD-BitLockerKeyProtector cmdlet to push keys into Azure AD. It does not back up to on-prem AD. Running it on managed devices simply ensures the key appears in Azure AD’s device record, which Intune admins can view. It doesn’t touch your on-prem AD.
Why MBAM Isn’t a Simple Answer
Microsoft BitLocker Administration and Monitoring (MBAM) once provided on-prem key backup. However:
- MBAM is deprecated and not supported in Windows 11.
- Integrating MBAM with Intune requires complex co-management and still doesn’t back up Intune-provisioned keys without extra scripting.
Workarounds to Get Keys into On-Prem AD
- Group Policy for On-Prem AD Backup
- For hybrid-joined devices, you can still enable the legacy Group Policy “Store recovery information in Active Directory Domain Services.”
- This policy runs at OS startup and writes the key to on-prem AD.
- Drawback: It doesn’t capture keys for devices encrypted by Intune after provisioning—you must re-encrypt or manually trigger a backup.
- Custom PowerShell + Scheduled Task
- Deploy a script via Intune that:
- Retrieves the BitLocker recovery key using
Get-BitLockerVolume. - Uses the Active Directory PowerShell module to call
Add-ADObjectorSet-ADReplicationAttributeMetadataagainst the corresponding computer object’smsFVE-RecoveryInformationattribute.
- Retrieves the BitLocker recovery key using
- Schedule the script to run once after encryption and on OS boot.
- Drawback: You must ensure each device has network access to on-prem AD and proper rights to write attributes.
- Deploy a script via Intune that:
- Azure Automation + On-Prem Integration
- Use Azure Automation Runbooks to pull keys from Azure AD (via Microsoft Graph) and then call into your on-prem environment over a hybrid runbook worker.
- The runbook writes keys into on-prem AD using LDAP or RSAT cmdlets.
- Drawback: Requires Azure Automation licensing and configuring a hybrid worker, plus securing credentials.
Recommended Best Practice
For most hybrid customers, the Group Policy approach remains the simplest for new devices:
- Enable both:
- Intune BitLocker policy (for Azure AD backup and encryption settings)
- On-prem Group Policy (“Store recovery information in Active Directory Domain Services”)
- Ensure devices join both Azure AD and your on-prem domain at first boot.
- Test encryption of a pilot device. Verify recovery keys appear in both Azure AD and on-prem AD.
For existing devices already encrypted by Intune, consider a one-time PowerShell script deployed via Intune:
- The script calls
Add-BitLockerKeyProtector -MountPoint C: -RecoveryPasswordProtectorto ensure a protector exists. - It then uses
Backup-ToAAD-BitLockerKeyProtectorto retrieve the protector ID and password. - Finally, it uses the AD PowerShell module to write the key to on-prem AD under the computer object.
Wrap this logic into an Intune PowerShell profile. Once run, you’ll have keys in both Azure AD and on-prem AD without manual steps.
Conclusion
Intune alone does not back up BitLocker keys to on-prem AD. To satisfy help-desk and compliance needs, you must layer on one of these workarounds—Group Policy for new devices, or a custom PowerShell-based solution for existing devices. While a fully automated, Microsoft-supported path doesn’t exist today, these methods will ensure your recovery keys live where your team expects them.

