

Inner Join On tsysIPLocations.LocationID = Inner Join On tsysAssetTypes.AssetType = '1') SubQuer圓 On SubQuer圓.AssetID = tblAssets.AssetID TblRegistry.Valuename = 'UEFISecureBootEnabled' And tblRegistry.Value = '%SYSTEM\CurrentControlSet\Control\SecureBoot\State' And TblRegistry.Valuename = 'OSActiveDirectoryBackup') SubQuery1 On Where tblRegistry.Regkey Like '%SOFTWARE\Policies\Microsoft\FVE' And Left Join (Select Top 1000000 tblRegistry.AssetID,

Inner Join TsysWaittime On TsysWaittime.CFGCode = TsysLastscan.CFGcode Inner Join TsysLastscan On tblAssets.AssetID = TsysLastscan.AssetID

'Last registry scan more than 24 hours ago! Scanned registry information may not be up-to-date. When TsysLastscan.Lasttime < GetDate() - 1 Then TsysLastscan.Lasttime As LastRegistryScan, TsysIPLocations.IPLocation As IPLocation, TblAssets.OScode + '.' + tblAssets.BuildNumber As Build, When tblPortableBattery.AssetID Is Null Then 'Desktop' When SubQuer圓.Valuename Is Not Null And SubQuer圓.Value '' Then 'Yes' When SubQuery1.Valuename Is Not Null And SubQuery1.Valuename '' When tblEncryptableVolume.ProtectionStatus = 1 Then 'Yes' When SubQuery2.IsEnabled_InitialValue = 1 Then 'Yes' It shows if the TPM is enabled in bios, if bitlocker is enabled, if the key is in AD (it can take 24 hours for that to update), if the GPO is applied and if secure boot is enabled. Here's one i created by pulling bits and pieces from here and there. Left Join tsysIPLocations On tblAssets.LocationID = tsysIPLocations.LocationIDĮnd Like 'ON' And tsysOS.OSname Like 'Win 10' Inner Join tsysOS On tsysOS.OScode = tblAssets.OScode Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID Inner Join tsysAssetTypes On tblAssets.Assettype = tsysAssetTypes.AssetType Inner Join tblAssets On tblEncryptableVolume.AssetId = tblAssets.AssetID When tblEncryptableVolume.ProtectionStatus = 1 Then 'ON' When tblEncryptableVolume.ProtectionStatus = 0 Then 'OFF' Select Top 1000000 tsysAssetTypes.AssetTypeIcon16 As icon, I want to make sure that we saved all the recovery keys in AD by forcing to back up the recovery key. We already have a GPO for that but some computers in the Active Directory don't have the recovery key. I already got a script by Powershell to save the recovery key in AD that I want to deploy for this computers. I need a report that shows my computers with Windos 10 where the Bitlocker Status is enable and also if recovery keys are not found. I try to do my own report but not really working I don't know SQL but still trying to learn when I got time. Now I'm lil bit stuck and ask for your help. First, thanks for all the help I found before in the forum for what I needed.
