• @[email protected]
    link
    fedilink
    English
    1
    edit-2
    5 months ago

    Which kind of makes it useless in many corporate environments where it’s most needed, since the users won’t be able to set their own password.

    • @d3Xt3r
      link
      English
      45 months ago

      I mean, if it’s a corporate device then it’s really a policy IT should be setting - this can be easily be done via a GPO or Intune policy, where an elevated script can prompt the end-user for a password.

      • @[email protected]
        link
        fedilink
        English
        2
        edit-2
        5 months ago

        Yarp. And when they forget it we use the 48 numerical recovery key found using the recovery ID that shows on the screen when you hit escape (from the bitlocker screen)

        • @[email protected]
          link
          fedilink
          English
          15 months ago

          I’m talking about letting the user change their own password. I’m honestly not sure how that would be technically accomplished in this situation without having to contact IT each time. It seems like something Microsoft should provide a no-frills GUI for that doesn’t require elevation.

          • @[email protected]
            link
            fedilink
            English
            1
            edit-2
            5 months ago

            Yeah, that could be neat as long as they still add a recovery key to the AD or somewhere else. A problem with that is that the users will likely choose shit passwords. That could be mitigated with password rules but still

            I suspect Microsoft wants you to use TMP or physical keys instead of passwords.