Administrator Guide

Contents
1 Getting Started with Recovery.......................................................................................................................5
Contact Dell ProSupport...................................................................................................................................................5
2 Policy-Based or File/Folder Encryption Recovery..........................................................................................6
Overview of the Recovery Process................................................................................................................................. 6
Perform Policy-Based Encryption or FFE Recovery......................................................................................................6
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client................................................... 6
Obtain the Recovery File - Locally Managed Computer..........................................................................................7
Perform a Recovery.....................................................................................................................................................8
Encrypted Drive Data Recovery...................................................................................................................................... 11
Recover Encrypted Drive Data................................................................................................................................. 12
3 Hardware Crypto Accelerator Recovery....................................................................................................... 16
Recovery Requirements...................................................................................................................................................16
Overview of the Recovery Process................................................................................................................................16
Perform HCA Recovery................................................................................................................................................... 16
Obtain the Recovery File - Remotely Managed Computer................................................................................... 16
Obtain the Recovery File - Locally Managed Computer........................................................................................ 17
Perform a Recovery................................................................................................................................................... 18
4 Self-Encrypting Drive (SED) Recovery........................................................................................................ 24
Recovery Requirements.................................................................................................................................................. 24
Overview of the Recovery Process............................................................................................................................... 24
Perform SED Recovery................................................................................................................................................... 24
Obtain the Recovery File - Remotely Managed SED Client................................................................................. 24
Obtain the Recovery File - Locally Managed SED Client......................................................................................25
Perform a Recovery...................................................................................................................................................25
Challenge Recovery with SED..................................................................................................................................28
5 Full Disk Encryption Recovery..................................................................................................................... 32
Recovery Requirements.................................................................................................................................................. 32
Overview of the Recovery Process...............................................................................................................................32
Perform Full Disk Encryption Recovery.........................................................................................................................32
Obtain the Recovery File - Full Disk Encryption Client..........................................................................................32
Perform a Recovery...................................................................................................................................................33
Challenge Recovery with Full Disk Encryption....................................................................................................... 35
6 Full Disk Encryption and Dell Encryption Recovery...................................................................................... 39
Recovery Requirements.................................................................................................................................................. 39
Overview of the Recovery Process...............................................................................................................................39
Perform Recovery of a Full Disk Encrypted and Dell Encrypted Disk....................................................................... 39
Obtain the Recovery File - Full Disk Encryption Client..........................................................................................39
Obtain the Recovery File - Policy-Based Encryption or FFE Encryption Client.................................................40
Encryption Recovery
Contents
3