Administrator Guide
7 Click OK.
8 Click Destination
9 Click Browse to select a destination, such as an external device, a directory location, or the Desktop.
10 Click OK.
11 Select one or more check boxes based on what you want to recover.
Options Description
Escrow
• Recover oine-generated keys that could not be escrowed to the
DDP Server.
• If a hard drive fails while the user is oine from the network, use
the slaved drive to recover data and non-escrowed keys from the
computer.
Decrypted Point the recovery tool to a directory that contains protected Oce
documents to decrypt them.
Optionally, if tampering has occurred, select one or both of these
options (see below for details):
• Tamper check - checks for tampered les but does not decrypt
them.
• Tamper check and Force decrypt even if tampered - checks for
tampered les and if the wrapper of a protected Oce document
was tampered with, Secure Lifecycle repairs the wrapper and
decrypts the Oce document.
Tamper check Detects les that have been tampered with and logs them or noties
you. Logs the author that tampered with the le. It does not decrypt
the les.
Force decrypt even if tampered To select this option, you must also select Tamper check.
If an unauthorized person tampered with the wrapper of a protected
Oce document, such as the cover page, either in the cloud or on a
device that does not have Secure Lifecycle, select this option to
repair the wrapper and to force decryption of the protected Oce
le.
Note: If someone tampered with the encrypted Oce .xen le within
the wrapper, the le cannot be recovered.
Each protected Oce document has a hidden watermark that contains a history of the original user and computer name and any
other computer name that modied the le. By default, the recovery tool checks the hidden watermarks and logs the information.
12 After selections are complete, click Scan.
46
Dell Data Protection Recovery Guide
Secure Lifecycle Recovery