Administrator Guide

Hardware Crypto Accelerator Recovery
With Dell Data Protection Hardware Crypto Accelerator (HCA) Recovery, you can recover access to the following:
Files on an HCA encrypted drive - This method decrypts the drive using the keys provided. You can select the specic drive that you
need to decrypt during the recovery process.
An HCA encrypted drive after a hardware replacement - This method is used after you must replace the Hardware Crypto Accelerator
card or a motherboard/TPM. You can run a recovery to regain access to the encrypted data without decrypting the drive.
Recovery Requirements
For HCA recovery, you need the following:
Access to the recovery environment ISO
Bootable CD\DVD or USB media
Overview of the Recovery Process
To recover a failed system:
1 Burn the recovery environment onto a CD/DVD or create a bootable USB. See Appendix A - Burning the Recovery Environment.
2 Obtain the Recovery le.
3 Perform the recovery.
Perform HCA Recovery
Follow these steps to perform an HCA recovery.
Obtain the Recovery File - Remotely Managed Computer
To download the <machinename_domain.com>.exe le that was generated when you installed Dell Data Protection:
1 Open the Remote Management Console and, from the left pane, select Management > Recover Endpoint.
3
12 Dell Data Protection Recovery Guide
Hardware Crypto Accelerator Recovery