The below PowerShell can be used to extract LAPS Passwords and BitLocker Keys from Active Directory. This was written on Friday, July 19, 2024, due to the CrowdStrike Outage: https://www.nytimes.com/2024/07/19/business/microsoft-outage-cause-azure-crowdstrike.html. If you choose to test this PowerShell, ensure that you update the argument for the SearchBase parameter to reflect your Active Directory domain.
1 2 3 4 5 6 7 8 9 10 | function Get-LapsAndBitLocker { # Version 1.0.1 Get-ADObject -Filter {objectclass -eq 'msFVE-RecoveryInformation' } -SearchBase 'DC=domain,DC=com' -Properties msFVE-RecoveryPassword | Select-Object -Property ` @{N= 'ComputerName' ;E={ $_ .DistinguishedName.Split( ',' )[1].Split( '=' )[1]}}, @{N= 'LapsPassword' ;E={( Get-ADComputer -Identity ( $_ .DistinguishedName.Split( ',' )[1].Split( '=' )[1]) -Properties ms-Mcs-AdmPwd). 'ms-Mcs-AdmPwd' }}, @{N= 'DateTime' ;E={ Get-Date -Date ( $_ .DistinguishedName.Split( ',' )[0].Split( '{' )[0].Split( '=' )[-1])}}, @{N= 'BitLocker' ;E={ $_ . 'msFVE-RecoveryPassword' }} | Sort-Object -Property ComputerName } # end function: Get-LapsAndBitLocker. |