Administrator Guide

7 Click OK.
8 Click Destination
9 Click Browse to select a destination, such as an external device, a directory location, or the Desktop.
10 Click OK.
11 Select one or more check boxes based on what you want to recover.
Options Description
Escrow
Recover oine-generated keys that could not be escrowed to the
DDP Server.
If a hard drive fails while the user is oine from the network, use
the slaved drive to recover data and non-escrowed keys from the
computer.
Decrypted Point the recovery tool to a directory that contains protected Oce
documents to decrypt them.
Optionally, if tampering has occurred, select one or both of these
options (see below for details):
Tamper check - checks for tampered les but does not decrypt
them.
Tamper check and Force decrypt even if tampered - checks for
tampered les and if the wrapper of a protected Oce document
was tampered with, Secure Lifecycle repairs the wrapper and
decrypts the Oce document.
Tamper check Detects les that have been tampered with and logs them or noties
you. Logs the author that tampered with the le. It does not decrypt
the les.
Force decrypt even if tampered To select this option, you must also select Tamper check.
If an unauthorized person tampered with the wrapper of a protected
Oce document, such as the cover page, either in the cloud or on a
device that does not have Secure Lifecycle, select this option to
repair the wrapper and to force decryption of the protected Oce
le.
Note: If someone tampered with the encrypted Oce .xen le within
the wrapper, the le cannot be recovered.
Each protected Oce document has a hidden watermark that contains a history of the original user and computer name and any
other computer name that modied the le. By default, the recovery tool checks the hidden watermarks and logs the information.
12 After selections are complete, click Scan.
46
Dell Data Protection Recovery Guide
Secure Lifecycle Recovery