Use this procedure with the Administration and Monitoring Website to determine the following:
The last known BitLocker encryption status of lost or stolen computers
Whether the volumes on a lost or stolen computer were encrypted
To complete this task, you need access to the Reports area of the Administration and Monitoring Website. To get access to this area, you must be assigned the MBAM Report Users role. You may have given these roles different names when you created them. For more information, see Planning for MBAM 2.5 Groups and Accounts.
Device compliance is determined by the BitLocker policies that your enterprise has deployed. You may want to verify your deployed policies before you try to determine the BitLocker encryption state of a device.
To determine the last known BitLocker encryption state of lost computers
Open a web browser and navigate to the Administration and Monitoring Website.
In the left pane, select Reports to open the Reports page.
Select the Computer Compliance Report.
Use the filter fields in the right pane to narrow the search results, and then click Search. Results are shown under your search query.
Take the appropriate action, as determined by your policy for lost devices.