Data Security

How to Find Your BitLocker Recovery Key: 7 Methods

norman@preyhq.com
Norman G.
Dec 12, 2024
0 minute read
How to Find Your BitLocker Recovery Key: 7 Methods

Device encryption is no longer just a luxury--it's a necessity. Whether you're protecting personal files or sensitive company data, BitLocker encryption is your first line of defense for Windows devices.

But what happens when you're locked out of your own encrypted drive? That's where the BitLocker recovery key comes in -- a 48-digit numerical password that grants access when normal authentication fails. The problem: most people don't know where it is until they desperately need it.

This guide covers all seven places your BitLocker recovery key might be stored, with step-by-step instructions for personal users, IT admins, and enterprise environments.

How to find and secure your BitLocker recovery key

  • Core idea: Your BitLocker recovery key is a 48-digit password that unlocks encrypted drives when normal authentication fails.
  • 7 locations: Microsoft Account, Azure AD/Entra ID, Active Directory, Microsoft Intune, USB/printed copy, Command Prompt (manage-bde), or Prey.
  • Personal devices: Check aka.ms/myrecoverykey first. Work devices: contact IT or check Azure AD / Intune.
  • If not found: Try rebooting or reversing BIOS changes. Last resort is a device reset -- all data will be erased.
  • For IT teams: Prey activates BitLocker, stores recovery keys (encrypted), and lets you export them as CSV for compliance.

What Is a BitLocker Recovery Key?

BitLocker is a full-volume encryption feature built into Windows. It protects data by encrypting the entire drive, so even if someone gains physical access to the device, they cannot read the files without the correct credentials.

According to Microsoft, the BitLocker recovery key is a unique 48-digit numerical password generated when BitLocker is first enabled on a device. It unlocks the encrypted drive when BitLocker cannot automatically verify that access is authorized -- for example, after hardware changes, failed PIN attempts, firmware updates, or a suspected security event.

The key is created once. Where it gets stored depends entirely on how BitLocker was set up and whether the device is personally owned or managed by an organization.

Where Is My BitLocker Recovery Key? 7 Locations

Work through these methods in order. Personal users will most likely find their key in Method 1 or 5. IT admins managing company devices should check Methods 2, 3, or 4 first.

BitLocker recovery key locations

1. Microsoft Account (Personal and Home Devices)

If BitLocker was enabled while you were signed into a Microsoft account -- the default on most Windows 10 and 11 home devices -- the recovery key was automatically uploaded online.

Steps:

  1. Open a browser on any device and go to aka.ms/myrecoverykey.
  2. Sign in with the Microsoft account linked to the encrypted device.
  3. Your BitLocker recovery keys will be listed with the device name and a key ID.
  4. Match the key ID shown on your recovery screen to the correct entry in the list.
  5. Copy the 48-digit recovery key and enter it on the locked device.

Note: This only works if you were signed into a Microsoft account when BitLocker was first activated. Devices set up with a local account will not have a key stored here.

2. Azure AD / Microsoft Entra ID (Work or School Devices)

If your device is joined to Azure Active Directory (now Microsoft Entra ID) -- common for company-issued or school-issued laptops -- the recovery key is stored in your organization's Azure AD tenant.

For end users:

  1. Go to myaccount.microsoft.com/device-list from any browser.
  2. Sign in with your work or school Microsoft account.
  3. Select your device from the list.
  4. Click View BitLocker Keys.
  5. Copy the key that matches the key ID on your recovery screen.

For IT admins:

  1. Sign in to the Microsoft Entra admin center at entra.microsoft.com.
  2. Go to Devices > All devices.
  3. Search for the affected device by name or user.
  4. Select the device and click BitLocker Keys in the left panel.
  5. Click to reveal the recovery key (keys are partially masked by default).

Admins can also retrieve keys via Microsoft Graph PowerShell: Connect-MgGraph -Scopes BitLockerKey.Read.All then Get-MgInformationProtectionBitlockerRecoveryKey -All.

3. Active Directory (On-Premises Enterprise)

If your organization uses an on-premises Active Directory environment, IT admins can retrieve recovery keys from AD -- provided Group Policy was configured to back them up when BitLocker was enabled.

Steps (IT admins only):

  1. Open Active Directory Users and Computers.
  2. Under the View menu, enable Advanced Features.
  3. Locate the computer object for the affected device.
  4. Right-click the computer object and select Properties.
  5. Navigate to the BitLocker Recovery tab to view stored keys.

Admins can also search across all domain devices via PowerShell: Get-ADObject -Filter {objectClass -eq 'msFVE-RecoveryInformation'} -Properties msFVE-RecoveryPassword

Note: Keys are only stored in AD if Group Policy required the backup before BitLocker was enabled on each device.

4. Microsoft Intune (MDM-Managed Devices)

Organizations managing devices through Microsoft Intune can retrieve BitLocker recovery keys directly from the Intune admin center.

Steps (IT admins only):

  1. Sign in to the Microsoft Intune admin center at intune.microsoft.com.
  2. Navigate to Devices > All devices.
  3. Search for the affected device by name or user.
  4. Select the device and scroll to the Monitor section in the left panel.
  5. Click Recovery keys to view the BitLocker key.

Intune only stores the key if the BitLocker policy was applied before encryption was enabled. Devices encrypted manually before Intune enrollment may not have their keys there.

5. USB Drive or Printed Copy

During BitLocker setup, Windows offers the option to save the recovery key to a USB drive or print it. If you or your IT team selected one of these options, check these physical locations.

  • Search USB drives stored in your desk, IT supply cabinet, or device bag.
  • Check printed pages stored with device documentation or in a filing system.
  • If found on USB, plug the drive into any Windows device, open the file, and enter the key on the locked device.

This is the only option if the device was set up offline with a local account and no cloud or domain backup was configured.

6. Command Prompt -- manage-bde

If you have access to a working Windows session, you can retrieve the recovery key using the built-in manage-bde command-line tool.

Steps:

  1. Open Command Prompt as Administrator.
  2. Run: manage-bde -protectors -get C: (replace C: with your encrypted drive letter).
  3. Look for the Numerical Password section in the output.
  4. Copy the 48-digit recovery key listed there.

IT admins can query remote machines using: manage-bde -cn [ComputerName] -protectors -get C:. This requires an active, unlocked Windows session -- it will not work if you are already locked out of the target device.

7. Prey -- Centralized Recovery Key Management (IT Teams)

If your organization uses Prey for endpoint management, BitLocker recovery keys are stored and accessible directly from the Prey dashboard -- no need to switch between Intune, Azure AD, and Active Directory consoles.

  • When Prey activates BitLocker on a device, it automatically generates and stores the recovery key (encrypted) in your Prey account.
  • IT admins can view recovery keys for individual devices from the fleet dashboard at any time.
  • Keys can be exported as a CSV file for bulk management, helpdesk use, and compliance audits.
  • Ideal for organizations that need a single location for recovery keys across a distributed Windows fleet.
Prey BitLocker recovery key CSV export
These seven methods cover every scenario -- personal Microsoft accounts, cloud-joined work devices, on-premises AD, Intune MDM, physical backups, and direct CLI access. Work through them in order based on how the device was set up.

What If I Can't Find My BitLocker Recovery Key?

If you have checked all seven locations and still cannot find the key, you have a few last-resort options before accepting that the data may be unrecoverable.

  • Try rebooting first. Some BitLocker recovery prompts are false positives triggered by a firmware update or a minor startup anomaly. Rebooting gives Windows another chance to verify the startup environment, and you may be able to log in normally.
  • Reverse recent BIOS or hardware changes. If you recently modified BIOS settings, changed boot order, or swapped hardware, reversing those changes may allow BitLocker to resume without the recovery prompt.
  • Contact your IT department. For organization-managed devices, IT may have a backup that is not in the locations you checked -- particularly if keys were exported before a system migration or stored in a third-party ITSM tool.
  • Check OEM or purchase documentation. Some enterprise device purchases include recovery key documentation. Check the original purchase records or contact the device manufacturer.
  • Last resort: Reset the device. If no key is available, you can reset Windows using recovery media. This erases all data on the encrypted drive permanently. There is no technical workaround -- a BitLocker-encrypted drive without the correct recovery key is unrecoverable by design.

This is exactly why storing recovery keys at setup time matters so much. Once they are gone, the data is gone with them.

How to Verify a BitLocker Recovery Key

BitLocker recovery keys should be verified before you need them in an emergency. An invalid key will not unlock your drive when it counts.

Steps to verify in Windows 10 and 11:

  1. Open the verification tool: Type recovery key into the Windows search box, then select Verify BitLocker Recovery Key.
  2. Enter your recovery key: Type the 48-digit key and click Verify.
  3. Wait for verification: This may take a few minutes depending on your system.
  4. Check the result: The tool will confirm whether the key is valid for the encrypted drive.
How to verify a BitLocker recovery key
How to verify a BitLocker recovery key

How to Store Your BitLocker Recovery Key

The best time to back up your recovery key is right now -- before you need it. Here are the most reliable options:

1. Print it and file it physically

  • Print the recovery key and store it in a secure filing cabinet.
  • Keep it separate from the device it protects.

2. Save it to a USB flash drive

  • Create a file with the recovery key or export it as a PDF.
  • Store the USB drive in a safe or secure location separate from the device.

3. Store it on a separate device

  • Save the key as a PDF on a second computer or in an encrypted cloud storage service.
  • Never store it on the same device it protects.

4. For IT teams: Use Prey for centralized key management

  • When Prey activates BitLocker, it automatically generates and stores the recovery key (encrypted) in your Prey account.
  • Export all recovery keys as a CSV anytime for compliance, audits, or helpdesk use.
Printing or saving your key to a USB drive is the only option if the device was set up with a local account and no cloud or MDM backup was configured. Do not wait until you need it to find out your backup method failed.

Troubleshooting BitLocker Recovery Issues

The BitLocker recovery screen appears when Windows cannot automatically unlock an encrypted drive. Common causes include hardware changes, firmware updates, BIOS modifications, or failed authentication attempts.

If you are experiencing repeated recovery prompts:

  1. Check your Microsoft account first: Go to aka.ms/myrecoverykey from another device.
  2. Verify the key ID: Match the key ID on the recovery screen with the ID in your storage location to ensure you are entering the right key.
  3. Check your USB drive: If the key was saved to USB, plug it into the locked device and let Windows read it automatically.
  4. Contact your IT department: For organization-managed devices, IT may have a backup in Azure AD, Active Directory, Intune, or Prey.
  5. Reset the device as a last resort: If no key is available, Windows recovery options can reset the device -- but all data on the encrypted drive will be permanently lost.

Next Steps

Data security is not just about protecting devices -- it is about protecting the trust your organization places in its technology every day. BitLocker provides a solid first layer of defense, keeping sensitive information safe from unauthorized access. But to get the most out of it, you need smart key management and tools that make encryption effortless at scale.

Prey's Disk Encryption solution works alongside BitLocker, adding centralized control and automation for IT teams managing distributed device fleets:

  • Activate and manage: Enable BitLocker across your Windows fleet from the Prey dashboard -- no manual configuration needed on each device.
  • Store and retrieve: Recovery keys are automatically captured and stored encrypted in Prey, accessible anytime from the admin console.
  • Export for compliance: Generate a CSV of all recovery keys for HIPAA, GDPR, SOC 2, or internal audit requirements.
  • Automate protection: Set policies to lock or wipe devices when they leave designated safe zones -- an extra layer beyond BitLocker alone.
  • Stay compliant: Meet data protection standards like ISO, HIPAA, and GDPR without added complexity.

Securing your data should not feel like a chore. With Prey's Disk Encryption, your team can focus on what matters most -- knowing that recovery keys are stored, compliant, and retrievable whenever they are needed.

Frequently Asked Questions

How do I enter a BitLocker recovery key?

When prompted, type the 48-digit key exactly as it appears. You must enter it on the same device where the drive was encrypted -- it will not work on a different machine. If you have the key saved as a file or printed copy, type it in manually when the recovery screen appears.

How do I get out of BitLocker recovery mode?

Enter the correct 48-digit recovery key when prompted. Once validated, the device resumes normal operation. If you are stuck in a loop where the recovery screen appears every startup, check for recent BIOS changes or added/removed hardware -- these are common triggers.

Is there a BitLocker recovery key generator?

No. A BitLocker recovery key is a unique 48-digit password generated by Windows when BitLocker is first enabled on a specific device. It cannot be regenerated or retrieved through any third-party tool. Back up the key from the moment BitLocker is activated -- there is no way to recreate it later.

How do I unlock my drive using the BitLocker recovery key?

At the BitLocker recovery screen, enter the 48-digit key exactly as stored. Windows validates the key and unlocks the drive, allowing normal login. You do not unlock the recovery key itself -- you use it to unlock the encrypted drive.

What happens if I lose my BitLocker recovery key?

If the key is lost and not stored anywhere -- Microsoft account, Azure AD, Active Directory, Intune, or Prey -- the data on the encrypted drive is effectively unrecoverable. Microsoft does not store personal recovery keys. As a last resort, resetting the device with Windows recovery media erases all data permanently.

Can IT admins retrieve BitLocker keys remotely?

Yes. IT admins can retrieve keys from Azure AD/Entra ID, Microsoft Intune, Active Directory, or Prey. Admins can also use the Microsoft Graph PowerShell API or run manage-bde -cn [ComputerName] -protectors -get C: against remote machines with an active Windows session.

Where does BitLocker store the recovery key on the device itself?

It does not. By design, BitLocker does not store the recovery key on the encrypted drive -- that would defeat the purpose of encryption. The key is always stored externally: in a Microsoft account, Azure AD, Active Directory, Intune, Prey, on a USB drive, or as a printed copy.

How often does BitLocker ask for the recovery key?

Normally, almost never. BitLocker only prompts for the recovery key when it detects something unexpected during startup -- hardware changes, firmware updates, BIOS modifications, or failed authentication. If you are seeing the recovery screen frequently, investigate recent system changes or contact your IT team.

Discover

Prey's Powerful Features

Protect your devices with Prey's comprehensive security suite.