Managing and enforcing security policies for devices and apps to protect organizational data through Intune
Yep - you can remove one BitLocker policy without losing the encryption keys, as long as you do not decrypt the drive or explicitly clear the key protectors. BitLocker encryption keys are stored on the device (and often backed up to Entra ID, AD DS, or another key escrow) independently of the policy object that enforced encryption. Removing a policy only stops enforcement going forward; it does not automatically decrypt the drive or delete existing key protectors.
The main risk comes from how the policies differ. If the policy you remove contains requirements for specific key protectors (like TPM+PIN or recovery password) and the remaining policy does not enforce or allow those, some management platforms may try to remediate by changing protectors. That could result in regeneration or removal of certain protectors, but not loss of access to the encrypted data itself as long as at least one valid protector remains.
Before removing the policy, verify the current protectors on the device and ensure a recovery key is backed up. You can check with:
manage-bde -protectors -get C:
If you are using Intune or Group Policy, confirm that the remaining policy supports the existing configuration so no automatic remediation alters it unexpectedly. As long as encryption stays enabled and at least one valid key protector persists, your encrypted data and access to it remain intact.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin