Skip to content

Instantly share code, notes, and snippets.

@morisy
Created June 22, 2016 20:13
Show Gist options
  • Star 14 You must be signed in to star a gist
  • Fork 7 You must be signed in to fork a gist
  • Save morisy/5b99e763d6b72f9b3e7c1747b6d0a1ee to your computer and use it in GitHub Desktop.
Save morisy/5b99e763d6b72f9b3e7c1747b6d0a1ee to your computer and use it in GitHub Desktop.
# Get-BitLockerRecovery.ps1
# Written by Bill Stewart (bstewart@iname.com)
<#
.SYNOPSIS
Gets BitLocker recovery information for one or more Active Directory computer objects.
.DESCRIPTION
Gets BitLocker recovery information for one or more Active Directory computer objects.
.PARAMETER Name
Specifies one or more computer names. Wildcards are not supported.
.PARAMETER PasswordID
Gets the BitLocker recovery password for this password ID (first 8 characters). This parameter must be exactly 8 characters long and must contain only the characters 0 through 9 and A through F. If you get no output when using this parameter with a correct password ID, the current user does not have sufficient permission to read BitLocker recovery information. If you do not have sufficient permission to read BitLocker recovery information, you can either 1) use the -Credential parameter to specify an account with sufficient permissions, or 2) start your PowerShell session using an account with sufficient permissions.
.PARAMETER Domain
Gets BitLocker recovery information from computer objects in the specified domain.
.PARAMETER Server
Specifies a domain server.
.PARAMETER Credential
Specifies credentials that have sufficient permission to read BitLocker recovery information.
.OUTPUTS
PSobjects with the following properties:
distinguishedName - The distinguished name of the computer
name - The computer name
TPMRecoveryInformation - $true if TPM recovery information stored in AD
Date - The Date/time the BitLocker recovery information was stored
PasswordID - The ID for the recovery password
RecoveryPassword - The recovery password
The TPMRecoveryInformation, Date, PasswordID, and RecoveryPassword properties will be "N/A" if BitLocker recovery information exists but the current user does not have sufficient permission to read it. If you do not have sufficient permission to read BitLocker recovery information, you can either 1) use the -Credential parameter to specify an account with sufficient permissions, or 2) start your PowerShell session using an account with sufficient permissions.
.LINK
http://technet.microsoft.com/en-us/library/dd875529.aspx
#>
#requires -version 2
[CmdletBinding(DefaultParameterSetName="Name")]
param(
[parameter(ParameterSetName="Name",Position=0,Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[alias("ComputerName")]
[String[]] $Name,
[parameter(ParameterSetName="PasswordID",Mandatory=$true)]
[String] $PasswordID,
[String] $Domain,
[String] $Server,
[Management.Automation.PSCredential] $Credential
)
begin {
# Validate -PasswordID parameter; we use this rather than the ValidatePattern
# attribute of the parameter to give a better error message
if ( $PSCmdlet.ParameterSetName -eq "PasswordID" ) {
if ( $PasswordID -notmatch '^[0-9A-F]{8}$' ) {
throw "Cannot validate argument on parameter 'PasswordID'. This argument must be exactly 8 characters long and must contain only the characters 0 through 9 and A through F."
}
}
# Pathname object contstants
$ADS_SETTYPE_DN = 4
$ADS_FORMAT_X500_PARENT = 8
$ADS_DISPLAY_VALUE_ONLY = 2
# Pathname object used by Get-ParentPath function
$Pathname = New-Object -ComObject "Pathname"
# Returns the parent path of a distinguished name
function Get-ParentPath {
param(
[String] $distinguishedName
)
[Void] $Pathname.GetType().InvokeMember("Set", "InvokeMethod", $null, $Pathname, ($distinguishedName, $ADS_SETTYPE_DN))
$Pathname.GetType().InvokeMember("Retrieve", "InvokeMethod", $null, $Pathname, $ADS_FORMAT_X500_PARENT)
}
# Returns only the name of the first element of a distinguished name
function Get-NameElement {
param(
[String] $distinguishedName
)
[Void] $Pathname.GetType().InvokeMember("Set", "InvokeMethod", $null, $Pathname, ($distinguishedName, $ADS_SETTYPE_DN))
[Void] $Pathname.GetType().InvokeMember("SetDisplayType", "InvokeMethod", $null, $Pathname, $ADS_DISPLAY_VALUE_ONLY)
$Pathname.GetType().InvokeMember("GetElement", "InvokeMethod", $null, $Pathname, 0)
}
# Outputs a custom object based on a list of hash tables
function Out-Object {
param(
[System.Collections.Hashtable[]] $hashData
)
$order = @()
$result = @{}
$hashData | ForEach-Object {
$order += ($_.Keys -as [Array])[0]
$result += $_
}
New-Object PSObject -Property $result | Select-Object $order
}
# Create and initialize DirectorySearcher object that finds computers
$ComputerSearcher = [ADSISearcher] ""
function Initialize-ComputerSearcher {
if ( $Domain ) {
if ( $Server ) {
$path = "LDAP://$Server/$Domain"
}
else {
$path = "LDAP://$Domain"
}
}
else {
if ( $Server ) {
$path = "LDAP://$Server"
}
else {
$path = ""
}
}
if ( $Credential ) {
$networkCredential = $Credential.GetNetworkCredential()
$dirEntry = New-Object DirectoryServices.DirectoryEntry(
$path,
$networkCredential.UserName,
$networkCredential.Password
)
}
else {
$dirEntry = [ADSI] $path
}
$ComputerSearcher.SearchRoot = $dirEntry
$ComputerSearcher.Filter = "(objectClass=domain)"
try {
[Void] $ComputerSearcher.FindOne()
}
catch [Management.Automation.MethodInvocationException] {
throw $_.Exception.InnerException
}
}
Initialize-ComputerSearcher
# Create and initialize DirectorySearcher for finding
# msFVE-RecoveryInformation objects
$RecoverySearcher = [ADSISearcher] ""
$RecoverySearcher.PageSize = 100
$RecoverySearcher.PropertiesToLoad.AddRange(@("distinguishedName","msFVE-RecoveryGuid","msFVE-RecoveryPassword","name"))
# Gets the DirectoryEntry object for a specified computer
function Get-ComputerDirectoryEntry {
param(
[String] $name
)
$ComputerSearcher.Filter = "(&(objectClass=computer)(name=$name))"
try {
$searchResult = $ComputerSearcher.FindOne()
if ( $searchResult ) {
$searchResult.GetDirectoryEntry()
}
}
catch [Management.Automation.MethodInvocationException] {
Write-Error -Exception $_.Exception.InnerException
}
}
# Outputs $true if the piped DirectoryEntry has the specified property set,
# or $false otherwise
function Test-DirectoryEntryProperty {
param(
[String] $property
)
process {
try {
$_.Get($property) -ne $null
}
catch [Management.Automation.MethodInvocationException] {
$false
}
}
}
# Gets a property from a ResultPropertyCollection; specify $propertyName
# in lowercase to remain compatible with PowerShell v2
function Get-SearchResultProperty {
param(
[DirectoryServices.ResultPropertyCollection] $properties,
[String] $propertyName
)
if ( $properties[$propertyName] ) {
$properties[$propertyName][0]
}
}
# Gets BitLocker recovery information for the specified computer
function GetBitLockerRecovery {
param(
$name
)
$domainName = $ComputerSearcher.SearchRoot.dc
$computerDirEntry = Get-ComputerDirectoryEntry $name
if ( -not $computerDirEntry ) {
Write-Error "Unable to find computer '$name' in domain '$domainName'" -Category ObjectNotFound
return
}
# If the msTPM-OwnerInformation (Vista/Server 2008/7/Server 2008 R2) or
# msTPM-TpmInformationForComputer (Windows 8/Server 2012 or later)
# attribute is set, then TPM recovery information is stored in AD
$tpmRecoveryInformation = $computerDirEntry | Test-DirectoryEntryProperty "msTPM-OwnerInformation"
if ( -not $tpmRecoveryInformation ) {
$tpmRecoveryInformation = $computerDirEntry | Test-DirectoryEntryProperty "msTPM-TpmInformationForComputer"
}
$RecoverySearcher.SearchRoot = $computerDirEntry
$searchResults = $RecoverySearcher.FindAll()
foreach ( $searchResult in $searchResults ) {
$properties = $searchResult.Properties
$recoveryPassword = Get-SearchResultProperty $properties "msfve-recoverypassword"
if ( $recoveryPassword ) {
$recoveryDate = ([DateTimeOffset] ((Get-SearchResultProperty $properties "name") -split '{')[0]).DateTime
$passwordID = ([Guid] [Byte[]] (Get-SearchResultProperty $properties "msfve-recoveryguid")).Guid
}
else {
$tpmRecoveryInformation = $recoveryDate = $passwordID = $recoveryPassword = "N/A"
}
Out-Object `
@{"distinguishedName" = $computerDirEntry.Properties["distinguishedname"][0]},
@{"name" = $computerDirEntry.Properties["name"][0]},
@{"TPMRecoveryInformation" = $tpmRecoveryInformation},
@{"Date" = $recoveryDate},
@{"PasswordID" = $passwordID.ToUpper()},
@{"RecoveryPassword" = $recoveryPassword.ToUpper()}
}
$searchResults.Dispose()
}
# Searches for BitLocker recovery information for the specified password ID
function SearchBitLockerRecoveryByPasswordID {
param(
[String] $passwordID
)
$RecoverySearcher.Filter = "(&(objectClass=msFVE-RecoveryInformation)(name=*{$passwordID-*}))"
$searchResults = $RecoverySearcher.FindAll()
foreach ( $searchResult in $searchResults ) {
$properties = $searchResult.Properties
$computerName = Get-NameElement (Get-ParentPath (Get-SearchResultProperty $properties "distinguishedname"))
$RecoverySearcher.Filter = "(objectClass=msFVE-RecoveryInformation)"
GetBitLockerRecovery $computerName | Where-Object { $_.PasswordID -match "^$passwordID-" }
}
$searchResults.Dispose()
}
}
process {
if ( $PSCmdlet.ParameterSetName -eq "Name" ) {
$RecoverySearcher.Filter = "(objectClass=msFVE-RecoveryInformation)"
foreach ( $nameItem in $Name ) {
GetBitLockerRecovery $nameItem
}
}
elseif ( $PSCmdlet.ParameterSetName -eq "PasswordID" ) {
SearchBitLockerRecoveryByPasswordID $PasswordID
}
}
@tomgorgis
Copy link

Hi,
This script works like a charm the only issue is im not the best with powershell and i was hoping the script could pull out machine in a specific OU that have a key and that dont have a key is there a way you could please update the script for me.

@psxc2k3
Copy link

psxc2k3 commented Oct 5, 2018

Not sure what I do wrong, but I can only get the information if I search for computername and not recovery key if I use an account with only the msFVE-Recovery rights (using -credentials). I would've assumed the result would be nothing in both instances, not in just one of them. Also, the result is no output, not N/A after each attribute.
Is there anything I've missed? Some rights the user needs?

@romantra
Copy link

romantra commented Mar 8, 2019

Hi @morisy how can I use a list of hostnames instead to input one by one ?

@mycomet723
Copy link

mycomet723 commented Mar 19, 2019

@romantra, Not sure if this helps your situation but you can dump your computer objects into an array and then. using a "foreach" loop, pull the recovery key info. See the below array I used to list out all of my computers.

$list=get-adcomputer -filter * -searchbase "<Enter your domain details here, dc= ou= etc..>" -server "" | select -expand name

foreach ($i in $list) {

}`

@devchristianschroeder
Copy link

This version should get the bitlocker information for all computer objects in a domain. Please run it with the needed 'DomainController' argument and permission.

https://gist.github.com/devchristianschroeder/ad3b26d774aa094e2b6f8e5abd1eb46d

@bstove5
Copy link

bstove5 commented Apr 29, 2021

When I run this it prompts me to enter Name[0] I can enter a computer name here, or any other characters, and it will prompt for Name[1]. this seems to go on indefinitely 9I went up to Name[30]. If I leave a name blank and just hit enter, it ends with no output. same behavior if run by itself, or invoked from a powershell window. I have copied and pasted the text to a ps1 file, and downloaded the one here, same behavior.

Am I missing something?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment