Skip to content

Commit 599f1d7

Browse files
Update encrypt-devices.md
Added note about key protector removal when deleting an AAD object.
1 parent cda2ada commit 599f1d7

1 file changed

Lines changed: 3 additions & 0 deletions

File tree

memdocs/intune/protect/encrypt-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,9 @@ IT admins need to have a specific permission within Azure Active Directory to be
177177

178178
All BitLocker recovery key accesses are audited. For more information on Audit Log entries, see [Azure portal audit logs](/azure/active-directory/devices/device-management-azure-portal#audit-logs).
179179

180+
> [!NOTE]
181+
> If you delete the Azure AD object for an Azure AD joined device protected by BitLocker, the next time that device syncs with Azure AD it will remove the key protectors for the operating system volume. Removing the key protector leaves BitLocker in a suspended state on that volume. This is necessary because BitLocker recovery information for Azure AD joined devices is attached to the Azure AD computer object and deleting it may leave you unable to recover from a BitLocker recovery event.
182+
180183
### View recovery keys for tenant-attached devices
181184

182185
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.

0 commit comments

Comments
 (0)