Administrator Guide
Chapter 1: Getting Started with Recovery..................................................................................... 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Policy-Based or File/Folder Encryption Recovery.........................................................6
Perform System Data Encryption or FFE Recovery................................................................................................... 6
Overview of the Recovery Process...........................................................................................................................6
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client............................................. 6
Obtain the Recovery File - Locally Managed Computer.......................................................................................7
Perform a Recovery...................................................................................................................................................... 8
Encrypted Drive Data Recovery......................................................................................................................................11
Recover Encrypted Drive Data................................................................................................................................. 12
Chapter 3: Hardware Crypto Accelerator Recovery...................................................................... 16
Recovery Requirements................................................................................................................................................... 16
Overview of the Recovery Process...............................................................................................................................16
Perform HCA Recovery.................................................................................................................................................... 16
Obtain the Recovery File - Remotely Managed Computer................................................................................ 16
Obtain the Recovery File - Locally Managed Computer..................................................................................... 17
Perform a Recovery.....................................................................................................................................................18
Chapter 4: Self-Encrypting Drive (SED) Recovery....................................................................... 24
Recovery Requirements...................................................................................................................................................24
Overview of the Recovery Process.............................................................................................................................. 24
Perform SED Recovery....................................................................................................................................................24
Obtain the Recovery File - Remotely Managed SED Client..............................................................................24
Obtain the Recovery File - Locally Managed SED Client...................................................................................25
Perform a Recovery....................................................................................................................................................25
Challenge Recovery with SED..................................................................................................................................28
Chapter 5: Full Disk Encryption Recovery.................................................................................... 31
Recovery Requirements................................................................................................................................................... 31
Overview of the Recovery Process...............................................................................................................................31
Perform Full Disk Encryption Recovery........................................................................................................................31
Obtain the Recovery File - Full Disk Encryption Client....................................................................................... 31
Perform a Recovery....................................................................................................................................................32
Challenge Recovery with Full Disk Encryption..................................................................................................... 34
Chapter 6: Full Disk Encryption and Dell Encryption Recovery..................................................... 38
Recovery Requirements...................................................................................................................................................38
Overview of the Recovery Process.............................................................................................................................. 38
Perform Recovery of a Full Disk Encrypted and Dell Encrypted Disk.................................................................. 38
Obtain the Recovery File - Full Disk Encryption Client...................................................................................... 38
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client...........................................39
Perform a Recovery....................................................................................................................................................40
Contents
Contents 3