Administrator Guide
Table Of Contents
- Encryption Recovery v11.1
- Contents
- Getting Started with Recovery
- Policy-Based or File/Folder Encryption Recovery
- Hardware Crypto Accelerator Recovery
- Self-Encrypting Drive (SED) Recovery
- Full Disk Encryption Recovery
- Full Disk Encryption and Dell Encryption Recovery
- PBA Device Control
- General Purpose Key Recovery
- BitLocker Manager Recovery
- Password Recovery
- Encryption External Media Password Recovery
- Appendix A - Download the Recovery Environment
- Appendix B - Creating Bootable Media
Chapter 1: Getting Started with Recovery..................................................................................... 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Policy-Based or File/Folder Encryption Recovery.........................................................6
Perform System Data Encryption or FFE Recovery................................................................................................... 6
Overview of the Recovery Process.......................................................................................................................... 6
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client............................................. 6
Obtain the Recovery File - Locally Managed Computer.......................................................................................7
Perform a Recovery...................................................................................................................................................... 8
Encrypted Drive Data Recovery......................................................................................................................................11
Recover Encrypted Drive Data................................................................................................................................. 12
Chapter 3: Hardware Crypto Accelerator Recovery...................................................................... 16
Recovery Requirements................................................................................................................................................... 16
Overview of the Recovery Process...............................................................................................................................16
Perform HCA Recovery.................................................................................................................................................... 16
Obtain the Recovery File - Remotely Managed Computer................................................................................ 16
Obtain the Recovery File - Locally Managed Computer..................................................................................... 17
Perform a Recovery.....................................................................................................................................................18
Chapter 4: Self-Encrypting Drive (SED) Recovery....................................................................... 24
Recovery Requirements...................................................................................................................................................24
Overview of the Recovery Process.............................................................................................................................. 24
Perform SED Recovery....................................................................................................................................................24
Obtain the Recovery File - Remotely Managed SED Client..............................................................................24
Obtain the Recovery File - Locally Managed SED Client...................................................................................25
Perform a Recovery....................................................................................................................................................25
Challenge Recovery with SED..................................................................................................................................28
Chapter 5: Full Disk Encryption Recovery.................................................................................... 31
Recovery Requirements................................................................................................................................................... 31
Overview of the Recovery Process...............................................................................................................................31
Perform Full Disk Encryption Recovery........................................................................................................................31
Obtain the Recovery File - Full Disk Encryption Client....................................................................................... 31
Perform a Recovery....................................................................................................................................................32
Challenge Recovery with Full Disk Encryption..................................................................................................... 34
Chapter 6: Full Disk Encryption and Dell Encryption Recovery..................................................... 38
Recovery Requirements...................................................................................................................................................38
Overview of the Recovery Process.............................................................................................................................. 38
Perform Recovery of a Full Disk Encrypted and Dell Encrypted Disk.................................................................. 38
Obtain the Recovery File - Full Disk Encryption Client...................................................................................... 38
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client...........................................39
Perform a Recovery....................................................................................................................................................40
Contents
Contents 3