Hi Tommy Freddle,
This is a classic Intune silent encryption trap. The drive encrypts perfectly, but the key escrow fails because of either a device join state mismatch or a policy configuration sequence.
Here is exactly how to diagnose and fix the "Failed to backup" error:
1. Check the Device Join State (The #1 Culprit) BitLocker will never back up keys to Entra ID if the device is only "Entra ID Registered" (BYOD/Personal state). It MUST be Entra ID Joined or Hybrid Entra ID Joined.
- Run
dsregcmd /statusin Command Prompt on the affected machine. EnsureAzureAdJoinedis YES.
2. The Policy Sequence Trap In your Intune Endpoint Security > Disk Encryption profile, check this specific setting under OS Drive Settings:
Store recovery information in Azure Active Directory before enabling BitLocker: This MUST be set to Require. If it is not required, Windows encrypts the drive first, and if there is even a slight network hiccup, the backup fails and it rarely retries successfully on its own.
3. Force the Backup Manually (The Fix) For the devices that are already encrypted but missing the key in the portal, do not decrypt them. You can forcefully push the key to Entra ID using PowerShell (Run as Administrator):
First, get the Key Protector ID: Get-BitLockerVolume -MountPoint "C:" | Select-Object -ExpandProperty KeyProtector
Copy the ID that has the type RecoveryPassword, then force the sync: BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "<Insert_ID_Here>"
Run that command, and the key will appear in the Entra ID portal within seconds. If this solves your issue, please click "Accept Answer".
Tracy Le.