"Wait! Hang On! Recovery Key? BitLocker?"
BitLocker is a security feature that locks the data on a device so that only someone with the right sign-in details can access it. For example, if a laptop is lost/stolen, the information on it stays protected because the drive is encrypted and unreadable to anyone else. The drive can't just be transplanted into another machine without 'unlocking' it using a unique recovery key.
"That's Okay. I Don't Use Bitlocker."
Ah... If your PC or laptop was purchased over the last decade from one of the large manufacturers (Dell, HP or Lenovo) and you've signed into a Microsoft cloud account, chances are it has enabled BitLocker in the background. And not informed you. Smaller businesses without internal IT support staff or an outsourced IT management resource are more likely to be 'surprised' by this security feature, as they don't tend to have an automated deployment of BitLocker, or a method of collecting and storing the recovery keys.
I'll follow this up with a separate post going into more detail on BitLocker.
"So What Do I Do?"
To see if BitLocker is enabled:
manage-bde -status
To confirm the new certificate is active:
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
If you need more information, or assistance auditing devices, get in touch.