Jackie Ramsey March 9, 2026 0

When an assessor asks, “Show me your proof,” they’re not asking if you meant to encrypt laptops. They want evidence that encryption is on, it stays on, and it covers the devices that touch CUI.

In this guide, I’ll show how I package CMMC BitLocker evidence using Microsoft Intune reports in a way that holds up in a CMMC Level 2 assessment. I’ll also share file naming, folder structure, and the exact export fields I like to highlight so the story is easy to follow.

I’m writing this for MSPs and IT admins who wear five hats at once, especially in Small Business IT. Let’s make the evidence clean, repeatable, and low-drama.

What “good” CMMC BitLocker evidence looks like to an assessor

A professional flat-style flowchart diagram on a white background depicting the process for collecting BitLocker encryption evidence from Intune for CMMC Level 2 compliance, featuring five connected boxes with icons, bullet points, and a footer note.
Flow of the artifacts I collect for BitLocker evidence from Intune, created with AI.

For CMMC Level 2, I treat BitLocker evidence like a short court case. Each artifact should answer one question, and together they should tell a complete story: scope, configuration, status, and key management.

Most assessors will anchor on the CMMC Level 2 assessment guidance, then trace your artifacts back to the practices mapped to NIST SP 800-171. I keep the official guide bookmarked so I can match what I export to what they expect to see in an interview. The current reference I use is the CMMC Assessment Guide Level 2 (PDF).

Here’s what I aim to prove with my evidence package:

  • Encryption is required for in-scope endpoints (devices that store or process CUI).
  • BitLocker is configured intentionally (not “whatever Windows decided”).
  • Encryption status is measurable (per-device reporting, not a policy statement).
  • Recovery keys are escrowed and retrievable (with access controlled).
  • Exceptions are documented (test rigs, kiosks, or legacy gear with compensating controls).

To stay grounded in Microsoft’s own wording, I also cross-check the policy side against Encrypt Windows devices with BitLocker using Intune. That helps when an assessor asks why a setting exists, or how it’s deployed.

Gotcha I see often: teams export an encryption report but forget to show how recovery keys are protected and who can read them. Evidence needs both status and control.

This isn’t legal advice, and I don’t try to “interpret” CMMC on the fly. If there’s any doubt, I confirm expectations with a C3PAO or a qualified consultant before the assessment window.

Using Intune reports as your primary evidence source (what I export and why)

Clean, professional screenshot mockup of Microsoft Intune admin center dashboard displaying Device encryption report with two devices in a table showing encryption status, OS drive encryption, and recovery key status. Modern flat style on a white background, screen at slight angle on desk with keyboard nearby.
Example view of an Intune-style device encryption report table, created with AI.

Intune is my “source of truth” because it ties together policy, device state, and identity (via Microsoft Entra ID). That makes it ideal for Endpoint Security evidence, and it scales well for Managed IT for Small Business.

Where I pull the BitLocker status report

In most tenants, I start at the encryption monitoring report documented in View report details for encryption status in Intune. If Microsoft moves the menus (they do), I use the Intune admin center search and look for “encryption report,” “disk encryption,” or “recovery keys.”

As of March 2026, I still plan for UI drift. So I capture evidence in a way that survives minor navigation changes:

  • CSV export for the raw list (sortable, filterable, and easy to sample).
  • PDF export or screenshot for the “what I saw” view.
  • Timestamps in filenames and in the exported file metadata.

Columns I highlight in the export

I don’t highlight everything. I call attention to the fields that let an assessor validate scope and status quickly. In practice, that means I bold or annotate these columns in my working copy (not in the system of record):

Device name, Serial number (if present), Entra device ID (or Azure AD device ID), Primary user, Last check-in, Encryption status, OS drive encrypted, Encryption method/strength (when available), and Recovery key escrowed/available.

If I’m using compliance policies to enforce encryption, I also export the compliance report view and keep a screenshot that shows assignments and counts. Microsoft has been evolving these screens, so I keep an eye on the updated experience for Intune device compliance reports to avoid surprises before an assessment.

A simple capture routine (repeatable every month)

  1. Filter Intune reports to the CUI scope (group, tag, or device filter).
  2. Export CSV, then export PDF (or capture a screenshot).
  3. Save one Entra device record screenshot for a sampled device (shows identity and last activity).
  4. Record who captured it, when, and from which tenant.

That’s enough to demonstrate Device Hardening intent plus ongoing monitoring, without burying the assessor in noise.

My evidence package template (folder structure, file names, and a printable checklist)

Modern flat style printable checklist for CMMC Level 2 BitLocker evidence on white background with subtle blue/gray palette, featuring 8 checkable boxes with icons.
Printable checklist format I use for packaging BitLocker evidence, created with AI.

When I act as a Business Technology Partner, I don’t just hand over exports. I hand over a package that’s easy to defend in an interview.

Folder structure I use (simple and assessor-friendly)

I keep it predictable, month to month:

  • Evidence/CMMC_L2/03_SystemSecurityPlan_References/
  • Evidence/CMMC_L2/09_MediaProtection/BitLocker/2026-03/
  • Evidence/CMMC_L2/09_MediaProtection/BitLocker/2026-03/Samples/
  • Evidence/CMMC_L2/ChangeLog/

Inside the monthly folder, I name files so they sort correctly and show capture time. Examples:

  • 2026-03-05_Intune_EncryptionReport_CUI-Scope.csv
  • 2026-03-05_Intune_EncryptionReport_CUI-Scope.pdf
  • 2026-03-05_Intune_DiskEncryptionPolicy_Assignments.png
  • 2026-03-05_Entra_DeviceRecord_SAMPLE-LT-014.png
  • 2026-03-05_EvidenceNotes_BitLocker.md (short notes, no secrets)

What I consider an “acceptable” BitLocker evidence set

This table shows the minimum set I like to include for a clean narrative.

ArtifactSourceWhat it provesSuggested filename
Device encryption status exportIntune encryption reportEncryption state across in-scope endpointsYYYY-MM-DD_Intune_EncryptionReport_CUI-Scope.csv
Human-readable snapshotIntune export or screenshotWhat the admin saw at capture timeYYYY-MM-DD_Intune_EncryptionReport_CUI-Scope.pdf
Disk encryption policy settingsIntune Endpoint security policyIntended configuration for BitLockerYYYY-MM-DD_Intune_DiskEncryptionPolicy_Settings.pdf
Policy assignment evidenceIntune policy assignment viewWhich groups/devices are targetedYYYY-MM-DD_Intune_DiskEncryptionPolicy_Assignments.png
Sample device identity proofMicrosoft Entra ID device recordDevice identity, owner, last activityYYYY-MM-DD_Entra_DeviceRecord_SAMPLE-<device>.png
Key access control proofEntra role assignment screenshotOnly authorized roles can access keysYYYY-MM-DD_Entra_Roles_RecoveryKeyAccess.png
Evidence notes and scope statementYour internal docWhat “in scope” means and sampling methodYYYY-MM-DD_EvidenceNotes_BitLocker.md

The takeaway: I try to show status + policy + scope + access controls. Any one item alone feels thin.

Printable checklist (I use this before I declare “ready”)

  • Intune encryption report exported (CSV) for the CUI scope.
  • Intune encryption report exported (PDF) or screenshot captured.
  • Disk encryption policy settings exported or screenshotted.
  • Policy assignment view captured (groups, filters, counts).
  • Recovery key escrow evidence captured (keys available for sampled devices).
  • Recovery key access controls captured (roles, least privilege).
  • Sampling method documented (for example, 10 devices or 10% of in-scope).
  • Timestamp and analyst initials included in filenames or evidence notes.
  • Exceptions list updated (with ticket numbers and compensating controls).
  • Retention plan confirmed (I usually keep 12 to 24 months for trend and continuity).

This is also where I tie BitLocker work into broader IT outcomes: stable Cloud Infrastructure, Secure Cloud Architecture, and Cloud Management that supports Business Continuity & Security. When I’m doing an Office 365 Migration or planning Infrastructure Optimization, I keep encryption evidence in the same discipline as identity, patching, and conditional access. Even clients with Restaurant POS Support and Kitchen Technology Solutions benefit, because endpoints move around and staff turns over.

Closing thoughts

BitLocker is the easy part. CMMC BitLocker evidence is the part that fails when it’s scattered, outdated, or missing context. When I build a tight Intune-driven package, I spend less time defending screenshots and more time proving control.

If you want a second set of eyes before a CMMC Level 2 assessment, I recommend validating your approach with a C3PAO or an experienced advisor. Then, run this evidence capture monthly so assessment week feels boring, in the best way.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply