Do not store your Bitlocker encryption keys on Microsoft's servers if your threat model includes governments or law enforcement. As this article points out, this is the result of a design choice Microsoft made. It didn't have to be this way.

https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw

The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible.

Forbes
@evacide
If you (everyone who's reading this) have already uploaded the recovery key, use manage-bde -protectors -get D: to find the ID of "Numerical Password" (recovery key) and delete it with manage-bde -protectors -delete -id ID D: .

Bitlocker would work with no recovery key set, but if you do want to generate a new recovery key, see Microsoft documentation below:
https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde
manage-bde

Reference article for the manage-bde command, which turns on or turns off BitLocker, specifies unlock mechanisms, updates recovery methods, and unlocks BitLocker-protected data drives.