Storing Keys in AD (make sure you've extended the schema - https://technet.microsoft.com/en-us/library/dd875533(v=WS.10).aspx) - Windows Components/BitLocker Drive Encryption - Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista) - Require Bitlocker backup to AD DS - Enabled, Choose appropriate we use Select BitLocker recovery information to store: Recovery passwords and key packages
For hard drives, you have settings specific to the OS and other Fixed hard drives. Set both up as needed. Choose how BitLocker-protected operating system drives can be recovered - Configure user storage of BitLocker recovery information:
Require 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizard: Enabled
Save BitLocker recovery information to AD DS for operating system drives: Enabled
Configure storage of BitLocker recovery information to AD DS: Store recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drives: Enabled
Removable Drives (USB) - Windows Components/BitLocker Drive Encryption/Removable Data Drives
Control use of Bitlocker on removable drives: Enabled
Deny write access to removable drives not protected by Bitlocker: Enabled
Allow users to suspend and decrypt BitLocker protection on removable data drives: Disabled
Choose how BitLocker-protected removable drives can be recovered -
Save BitLocker recovery information to AD DS for removable data drives: Enabled
Configure storage of BitLocker recovery information to AD DS: Backup recovery passwords and key packages
Configure use of passwords for removable data drives (no PIN, but you can make the password 4 characters with complexity disabled, we don't): Enabled
Configure password complexity for removable data drives: Allow password complexity
Minimum password length for removable data drive: 8