The end goal with our deployments is that the machine is encrypted, and
that IT has access to the machine with or without the user present. From
my understanding this means that the end user needs to have a FV2
enabled account, and the IT account als...