Monitor Bitlocker Status using SCCM Bitlocker Report

Benoit LecoursSCCM17 Comments

If you’ve been using BitLocker in your organization, you probably receive some requests from your security department to monitor the status of a device if it gets stolen. There’s a couple of ways to achieve this.

Sccm Bitlocker report

#1 – MBAM

The first and recommended one would be to use Microsoft BitLocker Administration and Monitoring (MBAM). However, this tool is not free, you need to have Microsoft Desktop Optimization Pack (MDOP). Microsoft has also announced that the actual MBAM 2.5 version is getting deprecated soon (Extended support on July 2019). So we’ll skip this one for now.

#2 – Configuration baseline

The second solution would be to use a configuration baseline in SCCM to monitor BitLocker and report the configuration baseline status using a report. This is a good solution but you’ll need to create a baseline based on a script and deploy it to all your computers. If you’re not familiar with configuration baseline and want a quicker, simplier solution, keep reading.

#3 – SCCM Bitlocker Report

The last solution would be to use a built-in SCCM Bitlocker report… but there’s none. The good news is that we’ve created one for you and giving it for free just because we think you’re awesome!

There’s 2 small thing to do before you can use the free report. You need to enable Bitlocker inventory classes in your Hardware inventory. If your inventory is already configured for Bitlocker, jump to the download section.

HOW TO ENABLE Bitlocker INVENTORY

Select the Client Settings that apply to your bitlocker collection. In our example, we’ll use the Default Client Setting but we reccomend that you use a custom one.

  • Open the SCCM Console
  • Go to Administration / Client Settings
  • Right-Click your Default Client Setting, select Properties
SCCM Office 365 inventory report
  • Click on Hardware Inventory
  • Click on Set Classes
Sccm Bitlocker report
  • Ensure that Bitlocker (Win32_EncryptableVolume) is enable
Sccm Bitlocker report

  • Ensure that both TPM (Win32_Tpm) and TPM Status (SMS_TPM) classes are also enabled
Sccm Bitlocker report
  • Close the Hardware inventory class window by clicking ok.

Bitlocker Inventory Verification

Now that our classes are enabled, trigger a Machine Policy Retrieval & Evaluation Cycle (to have the latest Client Settings) followed by an Hardware inventory Cycle on a computer that has Bitlocker enabled. Once the inventory is completed, check the inventory using Resource Explorer :

  • In the SCCM Console
  • Right-Click your device, select Start / Resource Explorer
  • Confirm that you have Bitlocker listed
Sccm Bitlocker report

Free SCCM Bitlocker Report

Now that you’ve confirmed that the inventory is working, the last thing you need to do is :

Sccm Bitlocker report

You can download this free report by visiting our product page. The Asset – Bitlocker Status report is available in the Report / Asset Section.

1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

Share this Post

17 Comments on “Monitor Bitlocker Status using SCCM Bitlocker Report”

  1. Love this report! One issue I am having is the version number of windows 10. It’s not reporting any version higher than 10.0.16299 even though we have many machines with 10.0.17134 that have bitlocker enabled. Any idea why?

  2. I would also like to have this option added. I have tried to edit the report but I have no knowledge of SQL reports so it didn’t work. I am also having the same issue others have mentioned that the report only shows a small number of systems at the top of the report in comparison to what we have.

  3. Hi!

    Thanks for this useful report!

    It can be even more useful if it can be modified to run against Computer Collection to get it’s status, not against PC name only or * expression. Any suggestions on how can this be implemented?

  4. Thanks for a very useful report. Just want to share some information that helped me.

    I was also experiencing duplicate entries when I ran the report. I tracked the issue down to being caused by the use of the v_GS_System_Enclosure view in the SQL syntax.
    This view can contain multiple entries for the same asset. If the asset is a laptop sitting in a docking station, the SCCM agent will report back that the chassis type is both 9 and 12. The number 9 represents a laptop and 12 a docking station. Each chassis type gets its own entry in the system_enclosure view, hence when you use the ResourceID from this table, you now have multiple entries in the report for the same computer. So to fix it, I just removed the line “INNER JOIN v_GS_SYSTEM_ENCLOSURE SE ON EV.ResourceID = SE.ResourceID”, and instead of using the SE.ResourceID, I just reused the SYS.ResourceID.

    I am no SCCM or SQL expert, but I don’t understand why you query the v_GS_SYSTEM_ENCLOSURE view? None of the information from this view is being used in the final report? Maybe I am missing something?

  5. Love the SCCM bundle and Bitlocker reports. It has help with audit documentation.

    Could I get the Bitlocker report customized to report by collection group? What would charge be for the customization?

  6. Thanks for the report. My “Total Devices” is only a small fraction of my actual total devices. Does it only show devices with the BitLocker inventory class enabled?

    Also, do you know why some devices are listed twice (exact duplicates)?

    1. I am having the same issue. Has anyone figured out why? Is it only pulling information on those systems that are BitLocker capable?

  7. I don’t see the TPM Status (SMS_TPM) in my HW inventory list, was this something you added manually or do newer versions of SCCM has this class in there? I am on SCCM 1610.

  8. Hello Guys!

    Beautiful report!! One very helpful addition would be a filter by collection if possible. Would you be able to guide me on setting that up?

    Thank you for your consideration!
    Mike

  9. Thanks a lot, very useful!

    By the way, your “SCD Purchase Receipt”-Email got quarantined by O365 (EOP); Quarantine Reason: Spam

  10. Hi Stian, thanks for your input.

    Hi Benoit, Yes that’s what I expected to see if HDD is encrypted with AES_128_WITH_DIFFUSER, AES_256_WITH_DIFFUSER and other formats..Please let me know if this is possible to get this added into this report.

Leave a Reply

Your email address will not be published. Required fields are marked *