Bitlocker - Volume - Add Recovery Password Autofix
This document describes a script designed to add a recovery password to a BitLocker-enabled drive that lacks a key protector. The script disables the current BitLocker protection, initializes the TPM if necessary, and re-enables the protection with a Recovery Password protector. It is intended for execution as an Autofix script and not for manual use.
BitLocker Disabled
Group of machines where BitLocker is disabled.
BitLocker Enabled
Group of machines where BitLocker is enabled.
Bitlocker Enabled - System Drive
This document outlines the process to determine if the C: drive on an endpoint has BitLocker enabled. It includes information on accessing the data through BitLocker dataviews or the roles tab in ConnectWise Automate, along with the necessary detection string and settings.
Bitlocker Initialize Failure Audit Script
This document provides a dataview containing records of computers where BitLocker initialization failed twice due to issues encountered by the Autofix script. It outlines the relevant dependencies and details about each computer, including client name, location, operating system, and the number of failed attempts.
BitLocker Key Backup
The solution outlines the process of backing up BitLocker recovery keys to Active Directory or Azure Active Directory using CW RMM.
BitLocker Key Backup Enabled
Group of machines where "BitLocker Key Backup" is enabled.
BitLocker Key Backup Failed
Group of machines where BitLocker Key Backup Failed.
BitLocker Key Backup Status
This custom field display the most recent result after pushing the BitLocker recovery keys into AD/AzureAD.
BitLocker Key Backup Successful
Group of machines where BitLocker Key Backup Successful.
BitLocker Key Missing
Group of machines where BitLocker Key was not found.
BitLocker Recovery Key Backup
This script verifies whether the device is joined to a domain or Azure AD. For eligible devices, it attempts to back up BitLocker recovery keys to Azure AD or Local AD, depending on the join type. For each drive, it checks for RecoveryPassword protectors and tries to back up the key using the appropriate cmdlet. The output summarizes any failures, including drive letter, key substring, and platform. If all keys are backed up successfully, it reports success. If the device is not domain or Azure AD joined, or the BitLocker module is unavailable, it returns a relevant message. The output is formatted for saving into the CW RMM custom field "BitLocker Key Backup Status".
BitLocker Status and Key
Stores BitLocker status and key information for all volumes on the device.
BitLocker Status and Key Audit
The solution outlines the process of auditing BitLocker encryption status and recovery keys using CW RMM with daily scheduled tasks.
BitLocker Status and Recovery Key Audit
This script collects BitLocker encryption details for each drive on the system using the Get-BitLockerVolume cmdlet. It summarizes the protection status, key protector types, encryption percentage, and recovery password (if available). The output is formatted as a single string suitable for saving into the Endpoint-Level custom field "BitLocker Status and Key".
BitLocker Status Audit Enabled
Group of machines where the "BitLocker Status Audit" is enabled.
BitLocker Suspended
Group of machines where BitLocker is suspended.
Disable BitLocker Key Backup
Flag this custom field to exclude the endpoint from "BitLocker Key Backup" solution.
Disable BitLocker Key Backup
Flag this custom field to exclude the site from "BitLocker Key Backup" solution.
Disable BitLocker Status Audit
Flag this custom field to exclude the endpoint from the BitLocker Status Audit solution.
Disable BitLocker Status Audit
Flag this custom field to exclude the site from the BitLocker Status Audit solution.
Enable BitLocker Key Backup
Select Operating System to Enable BitLocker Key Backup. The output of the Key Backup will be saved into the endpoint-level custom field "BitLocker Key Backup Status".
Enable BitLocker Status Audit
Select the Operating System to Enable BitLocker Status Audit. BitLocker status and recovery key will be stored in the device-level custom field "BitLocker Status and Key".
Tpm Detailed Audit [Script]
This dataview shows the complete detail of the TPM of the Windows machines