Administrator Guide

Contents
1 Getting Started with Recovery.......................................................................................................................5
Contact Dell ProSupport...................................................................................................................................................5
2 Policy-Based or File/Folder Encryption Recovery..........................................................................................6
Overview of the Recovery Process................................................................................................................................. 6
Perform Policy-Based Encryption or FFE Recovery......................................................................................................6
Obtain the Recovery File - Remotely Managed Computer.....................................................................................6
Obtain the Recovery File - Locally Managed Computer..........................................................................................7
Perform a Recovery.....................................................................................................................................................7
3 Hardware Crypto Accelerator Recovery....................................................................................................... 12
Recovery Requirements...................................................................................................................................................12
Overview of the Recovery Process................................................................................................................................12
Perform HCA Recovery................................................................................................................................................... 12
Obtain the Recovery File - Remotely Managed Computer................................................................................... 12
Obtain the Recovery File - Locally Managed Computer........................................................................................13
Perform a Recovery................................................................................................................................................... 14
4 Self-Encrypting Drive (SED) Recovery........................................................................................................ 20
Recovery Requirements.................................................................................................................................................. 20
Overview of the Recovery Process...............................................................................................................................20
Perform SED Recovery...................................................................................................................................................20
Obtain the Recovery File - Remotely Managed SED Client................................................................................. 20
Obtain the Recovery File - Locally Managed SED Client.......................................................................................21
Perform a Recovery................................................................................................................................................... 21
5 General Purpose Key Recovery....................................................................................................................25
Recover the GPK............................................................................................................................................................. 25
Obtain the Recovery File...........................................................................................................................................25
Perform a Recovery...................................................................................................................................................26
6 Encrypted Drive Data Recovery................................................................................................................... 28
Recover Encrypted Drive Data.......................................................................................................................................28
7 BitLocker Manager Recovery.......................................................................................................................32
Recover Data....................................................................................................................................................................32
8 Password Recovery..................................................................................................................................... 34
Recovery Questions.........................................................................................................................................................34
Challenge/Response Codes........................................................................................................................................... 36
9 External Media Shield Password Recovery.................................................................................................. 40
Recover Access to Data..................................................................................................................................................40
Self-Recovery...................................................................................................................................................................42
Dell Data Protection Recovery Guide
Contents
3