How to Manually Store the BitLocker keys to Active Directory (AD).
If after applying a group policy to automatically store BitLocker keys in Active Directory, you find that for some computers the BitLocker recovery key and password is not stored in AD, continue reading bellow to learn how to backup BitLocker keys manually to AD.
As you may know, managing BitLocker recovery keys in a business environment can be a challenge, but fortunately, as explained in a previous guide, you can force Windows to store BitLocker recovery keys to Active Directory (AD) automatically.
However, you may find that while you have correctly followed the steps to automatically store the key in AD, some computers have not had their recovery keys and passwords stored in Active Directory.
This issue typically occurs when you have enabled BitLocker before setting the Group Policy to back up BitLocker recovery data to AD, before you joining the computer to the domain, or if the machine cannot communicate with the domain.
So, in this tutorial we show how you can manually back up the BitLocker recovery keys to Active Directory on the affected computers, without having to decrypt and encrypt them from scratch.
How to Manually Back up BitLocker Keys & Passwords to AD (Active Directory).*
* Attention: Before continuing below, please ensure that you have correctly followed the steps in this guide to configure AD to automatically back up your BitLocker keys/passwords to AD.
1. On the domain machine you want to manually backup the BitLocker recovery data on AD, login with a user with Local Admin rights.
2. Open Command Prompt as Administrator and issue the following command to view the BitLocker Recovery ID and Password.*
- manage-bde -protectors -Get C:
* Info: The above command shows the recovery data (ID & Password) on the main drive "C:"
3. From the results, highlight the Numerical Password ID* is displayed with the {} brackets, press CTRL +V and copy it in the Notepad.
* eg in this example: {71A465B0-E2BB-4091-B889-2A72DE3121C3}
4. Then, issue the below command to force Windows to backup the BitLocker recovery key (ID) and password to AD:
- manage-bde -protectors -adbackup c: -id {Numerical Password ID}
* eg in this example:
- manage-bde -protectors -adbackup c: -id {71A465B0-E2BB-4091-B889-2A72DE3121C3}
5. After the recovery information is successfully backed up to active directory, navigate to computer's properties in AD, and in the BitLocker Recovery tab you should see its Recovery ID and the Recovery Password.
That's it! Let me know if this guide has helped you by leaving your comment about your experience. Please like and share this guide to help others.
Frequently Asked Questions
Why aren't my BitLocker recovery keys being stored in Active Directory automatically?
This issue typically occurs if BitLocker was enabled before setting the Group Policy to back up data to AD, before joining the computer to the domain, or if the machine cannot communicate with the domain.
How can I manually back up BitLocker keys to Active Directory?
To manually back up BitLocker keys, log in with a user with Local Admin rights, open Command Prompt as Administrator, and use the command 'manage-bde -protectors -Get C:' to view the recovery data. Then, run 'manage-bde -protectors -adbackup c: -id {Numerical Password ID}' to back up the data to AD.
What should I do before attempting to manually back up BitLocker keys to AD?
Ensure you have correctly configured AD to automatically back up your BitLocker keys/passwords by following the steps outlined in the guide.
Where can I find the BitLocker Recovery ID and Password once they've been backed up successfully?
After successfully backing up, you can find the BitLocker Recovery ID and Password in the BitLocker Recovery tab of the computer's properties within Active Directory.


December 15, 2025 @ 8:00 pm
Thank you very much for these instructions.
But without the apostrophe in the ID, I get an error message.
https://learn.microsoft.com/de-de/windows-server/administration/windows-commands/manage-bde-protectors
manage-bde -protectors -adbackup C: -id '{00000000-0000-0000-0000-000000000000}'
That's how it worked out
Best regards