JacobH wrote:
For Bitlocker - Storing Keys in AD is antiquated - it's moved to MDOP/MBAM SQL database to the best of my limited knowledge.
Reference:
https://blogs.technet.microsoft.com/askcore/2011/08/04/how-to-verify-bitlocker-recovery-keys-in-sql-db-using-mbam/
You can query the machines table, inner join the keys table, to get you computername and recovery key.
Where you go after that, is up to you. If you're MSSQL-minded, you know where I'm going with this...
Mainstream support for Microsoft BitLocker Administration and Monitoring (MBAM) is ending July 2019.
https://support.microsoft.com/lifecycle/search?alpha=Microsoft%20BitLocker%20Administration%20and%20Monitoring%202.5%20Service%20Pack%201
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises#managing-domain-joined-computers-and-moving-to-cloud
Supported method for storing keys is with Active Directory, either on premises or in Azure.