• @[email protected]
      link
      fedilink
      English
      2
      edit-2
      11 months ago

      Which kind of makes it useless in many corporate environments where it’s most needed, since the users won’t be able to set their own password.

      • @[email protected]
        link
        fedilink
        English
        511 months ago

        I mean, if it’s a corporate device then it’s really a policy IT should be setting - this can be easily be done via a GPO or Intune policy, where an elevated script can prompt the end-user for a password.

        • @[email protected]
          link
          fedilink
          English
          2
          edit-2
          11 months ago

          Yarp. And when they forget it we use the 48 numerical recovery key found using the recovery ID that shows on the screen when you hit escape (from the bitlocker screen)

          • @[email protected]
            link
            fedilink
            English
            111 months ago

            I’m talking about letting the user change their own password. I’m honestly not sure how that would be technically accomplished in this situation without having to contact IT each time. It seems like something Microsoft should provide a no-frills GUI for that doesn’t require elevation.

            • @[email protected]
              link
              fedilink
              English
              1
              edit-2
              11 months ago

              Yeah, that could be neat as long as they still add a recovery key to the AD or somewhere else. A problem with that is that the users will likely choose shit passwords. That could be mitigated with password rules but still

              I suspect Microsoft wants you to use TMP or physical keys instead of passwords.