Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note



Similar documents
Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Mobile Management for Configuration Manager

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

PGP CAPS Activation Package

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec Mobile Management 7.2 MR1Quick-start Guide

Veritas Cluster Server Getting Started Guide

Symantec NetBackup Vault Operator's Guide

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Endpoint Protection Shared Insight Cache User Guide

Encryption. Administrator Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Enterprise Vault Technical Note

Symantec Client Firewall Policy Migration Guide

Symantec Protection Engine for Cloud Services 7.0 Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Security Information Manager 4.8 Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Critical System Protection Agent Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup for Lotus Notes Administrator's Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec Drive Encryption for Windows

Symantec Secure Proxy Administration Guide

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Virtual Machine Management 7.1 User Guide

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Critical System Protection Agent Event Viewer Guide

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec Enterprise Vault

PGP Portable Quick Start Guide Version 10.2

Symantec System Recovery 2011 Management Solution Administrator's Guide

Configuring Symantec AntiVirus for NetApp Storage system

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5

Symantec NetBackup for DB2 Administrator's Guide

Symantec Enterprise Vault. Upgrading to Enterprise Vault

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec Enterprise Vault

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Backup Exec 15. Quick Installation Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Symantec NetBackup PureDisk Deduplication Option Guide

Altiris Asset Management Suite 7.1 from Symantec User Guide

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Symantec Enterprise Vault

Symantec Protection for SharePoint Servers Implementation Guide

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes

Symantec Response Assessment module Installation Guide. Version 9.0

PGP Command Line Version 10.3 Release Notes

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec NetBackup Deduplication Guide

Symantec Enterprise Vault

Symantec Backup Exec 2010 R2. Quick Installation Guide

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec ApplicationHA 6.1 Generic Agent Configuration Guide - AIX on IBM PowerVM

Symantec High Availability Console Installation and Upgrade Guide

Symantec NetBackup for Microsoft Exchange Server Administrator s Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Symantec NetBackup for Microsoft SQL Server Administrator's Guide

PGP Command Line Version 10.2 Release Notes

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Management Platform Installation Guide. Version 7.0

Symantec Disaster Recovery Orchestrator Administration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault

Veritas Dynamic Multi-Pathing for Windows Release Notes

Transcription:

Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note

Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, PGP, and Pretty Good Privacy are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ("Third Party Programs"). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those open source or free software licenses. For more information on the Third Party Programs, please see the Third Party Notice document for this Symantec product that may be available at http://www.symantec.com/about/profile/policies/eulas/, the Third Party Legal Notice Appendix that may be included with this Documentation and/or Third Party Legal Notice ReadMe File that may accompany this Symantec product. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information

Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/ Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals

Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America customercare_apac@symantec.com semea@symantec.com supportsolutions@symantec.com

Contents Technical Support... 4 Chapter 1 Introduction to Windows Preinstallation Environment... 9 Overview... 9 Supported Versions of Windows PE... 9 How to Obtain Windows PE... 10 Chapter 2 Creating a Windows PE CD or UFD... 11 Creating a Windows PE Image... 11 Customizing Windows PE 4.0 and 5.0 for 32-bit Windows Environment... 12 Installing the SEE Drive Encryption tools for 32-bit Windows Environment... 12 Creating the bootable ISO file and CD or UFD... 14 Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment... 14 Installing the SEE Drive Encryption tools for 64-bit Windows Environment... 15 Creating the bootable ISO file and CD or UFD... 16 Chapter 3 Using a customized Windows PE CD or UFD for recovery... 18 Accessing an encrypted disk... 18 Accessing an encrypted disk using the administrator command line... 18 Recovering the preboot screen... 19 Restoring the old MBR... 19 Decrypting an encrypted disk using the client administrator credentials... 19 Decrypting an encrypted disk using the Help Desk Recovery commands... 20 Accessing an encrypted disk using the Symantec Disk Recovery Utility... 21

Contents 8 Decrypting an encrypted disk using the client administrator authentication... 22 Decrypting an encrypted disk using Help Desk Recovery... 23

Chapter 1 Introduction to Windows Preinstallation Environment This chapter includes the following topics: Overview Supported Versions of Windows PE How to Obtain Windows PE Overview The Microsoft Windows Preinstallation Environment (PE) is widely used by IT professionals in Windows environments for installation tasks, deployment, maintenance, troubleshooting, diagnosis, recovery, and so on. When an encrypted disk fails to start the Windows operating system, recovery of data becomes the primary goal. Creating a customized Windows PE CD or UFD (USB Flash Drive) provides a bootable recovery tool that can be used for rescue purposes. To create a bootable Windows PE CD or UFD, you must do the following: Pre-install the SEE Drive Encryption driver for decrypting the hard disk. Pre-install the SEE Drive Encryption tools for authentication. This document provides instructions for creating and using both 32-bit and 64-bit Windows Preinstallation Environment. Supported Versions of Windows PE Currently, the following versions of Windows PE are supported:

Introduction to Windows Preinstallation Environment How to Obtain Windows PE 10 Windows Server 2008 R2 (Standard and Enterprise SP1 Editions x64 bit): Windows PE version 4.0 and 5.0 Windows 7 (BIOS) (Pro, Enterprise, and Ultimate Editions): Windows PE version 4.0 and 5.0 Windows 8 (BIOS and UEFI) (Pro and Enterprise Editions): Windows PE version 4.0 and 5.0 Windows 8.1 (BIOS and UEFI) (Pro and Enterprise Editions): Windows PE version 5.0 Windows Server 2012 R2 (Standard and Datacenter Editions x64 bit): Windows PE version 5.0 How to Obtain Windows PE To use Windows PE, you must obtain and install the Windows Assessment and Development Kit (Windows ADK for Windows PE 4.0, 5.0, and 5.1) from the following location: http://www.microsoft.com/en-us/download/details.aspx?id=30652

Chapter 2 Creating a Windows PE CD or UFD This chapter includes the following topics: Creating a Windows PE Image Customizing Windows PE 4.0 and 5.0 for 32-bit Windows Environment Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment Creating a Windows PE Image Before you create the image, ensure that you do the following: Install Windows Assessment and Development Kit (ADK). Install Symantec Endpoint Encryption Drive Encryption. Create a folder on the C drive to install SEE Drive Encryption driver and tools, such as C:\EEDE. Note: You must use the deployment tools command prompt as an administrator when creating the Windows PE image. To create the Windows PE image 1 To open the deployment tools command prompt with the correct path variables, select Start > All Programs > Windows Kits > Windows ADK. 2 Do one of the following: To create an image for 32-bit Windows environment, run the following command:

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 32-bit Windows Environment 12 copype.cmd x86 C:\winpe_x86 This command creates the Windows PE image at C:\winpe_x86. To create an image for 64-bit Windows environment, run the following command: copype.cmd amd64 C:\winpe_amd64 This command creates the Windows PE image at C:\winpe_amd64 Customizing Windows PE 4.0 and 5.0 for 32-bit Windows Environment Ensure that you have copied Windows PE in the Windows folder c:\winpe_x86 and is ready for customization. To copy Windows PE in the Windows folder c:\winpe_x86 Run the following command: xcopy c:\winpe_x86\media\sources\boot.wim c:\winpe_x86\winpe.wim Note: Follow the instructions that are provided in the Windows Preinstallation Environment User s Guide to prepare a drive or folder for customization. The Windows Preinstallation Environment User s Guide is included with the Windows Assessment and Development Kit (ADK). To customize Windows PE, you must: Install the SEE Drive Encryption tools. Create the bootable ISO file and CD or UFD. Installing the SEE Drive Encryption tools for 32-bit Windows Environment Note: The eedrecoverygui.exe file is used to open the Symantec Disk Recovery utility. This utility provides an interface during recovery to help you decrypt and access your encrypted disks. To install the SEE Drive Encryption tools 1 Copy the following files into the Windows folder c:\eede. These files can be copied from the Drive Encryption installation directory (from a system that has Symantec Endpoint Encryption Drive Encryption installed).

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 32-bit Windows Environment 13 Encryption\eedAdminCli.exe Encryption\eedDEAL.dll Encryption\eedEngine.dll Encryption\eedPE.exe Encryption\eedRecoveryGui.exe Encryption\eedStart.exe Encryption\pgpbootb.bin Encryption\pgpbootg.bin Encryption\PGPce.dll Encryption\PGPce.dll.sig Encryption\stage1 %SYSTEMROOT%\system32\SHFOLDER.dll %SYSTEMROOT%\system32\drivers\eedDiskEncryptionDriver.sys 2 Open the Windows command prompt (as an administrator) and run the following commands: cd c:\eede eedpe /winpe c:\winpe_x86 c:\eede 3 Copy the file c:\winpe_x86\winpe.wim to c:\winpe_x86\media\sources\boot.wim and overwrite the old boot.wim file. To copy, run the following command: xcopy /y c:\winpe_x86\winpe.wim c:\winpe_x86\media\sources\boot.wim 4 Close the command prompt.

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment 14 Creating the bootable ISO file and CD or UFD The next step is to make the customized Windows PE as a bootable.iso file and CD or UFD. To create the bootable.iso file or CD 1 To open the deployment tools command prompt, select Start > All Programs > Windows Kits > Windows ADK. 2 As an administrator, run the following command: MakeWinPEMedia /ISO C:\WinPE_x86 C:\WinPE_x86\WinPE_x86.iso 3 Use the CD-record software to burn the CD image file of winpe_x86.iso. To create a bootable UFD 1 Use the file diskpart.exe in Windows to format the UFD. 2 Open the Windows command prompt as an administrator and run the following commands (the following sample commands assume that disk 1 is the UFD): diskpart select disk 1 clean create partition primary select partition 1 active format fs=fat32 assign exit 3 Open the deployment tools command prompt as an administrator and run the following command (the following sample command assumes that F: is the UFD device): MakeWinPEMedia /UFD C:\WinPE_x86 F: Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment Ensure that you have copied Windows PE in the Windows folder c:\winpe_amd64 and is ready for customization.

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment 15 To copy Windows PE in the Windows folder c:\winpe_amd64 Run the following command: xcopy c:\winpe_amd64\media\sources\boot.wim c:\winpe_amd64\winpe.wim Note: Follow the instructions that are provided in the Windows Preinstallation Environment User s Guide to prepare a drive or folder for customization. The Windows Preinstallation Environment User s Guide is included with the Windows Assessment and Development Kit (ADK). To customize Windows PE, you must: Install the SEE Drive Encryption tools. Create the bootable ISO file and CD or UFD. Installing the SEE Drive Encryption tools for 64-bit Windows Environment Note: The eedrecoverygui.exe file is used to open the Symantec Disk Recovery utility. This utility provides an interface during recovery to help you decrypt and access your encrypted disks. To install the SEE Drive Encryption tools 1 Copy the following files into the Windows folder c:\eede. These files can be copied from the Drive Encryption installation directory (from a system that has Symantec Endpoint Encryption Drive Encryption installed). Encryption\eedAdminCli.exe Encryption\eedDEAL.dll Encryption\eedEngine.dll Encryption\eedPE.exe Encryption\eedRecoveryGui.exe

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment 16 Encryption\eedStart.exe Encryption\pgpbootb.bin Encryption\pgpbootg.bin Encryption\PGPce.dll Encryption\PGPce.dll.sig Encryption\stage1 %SYSTEMROOT%\system32\SHFOLDER.dll %SYSTEMROOT%\system32\drivers\eedDiskEncryptionDriver.sys 2 Open the Windows command prompt (as an administrator) and run the following commands: cd c:\eede eedpe /winpe c:\winpe_amd64 c:\eede 3 Copy the file c:\winpe_amd64\winpe.wim to c:\winpe_amd64\media\sources and overwrite the old boot.wim file. To copy, run the following command: xcopy /y c:\winpe_amd64\winpe.wim c:\winpe_amd64\media\sources\boot.wim 4 Close the Windows command prompt. Creating the bootable ISO file and CD or UFD The next step is to make the customized Windows PE as a bootable.iso file and CD or UFD. To create the bootable.iso file or CD 1 To open the deployment tools command prompt, select Start > All Programs > Windows Kits > Windows ADK. 2 As an administrator, run the following command: MakeWinPEMedia /ISO C:\WinPE_amd64 C:\WinPE_amd64\WinPE_amd64.iso 3 Use the CD-record software to burn the CD image file of WinPE_amd64.iso file.

Creating a Windows PE CD or UFD Customizing Windows PE 4.0 and 5.0 for 64-bit Windows Environment 17 To create a bootable UFD 1 Use the file diskpart.exe in Windows to format the UFD. 2 Open the Windows command prompt as an administrator and run the following commands (the following sample commands assume that disk 1 is the UFD): diskpart select disk 1 clean create partition primary select partition 1 active format fs=fat32 assign exit 3 Open the deployment tools command prompt as an administrator and run the following command (the following sample command assumes that F: is the UFD device): MakeWinPEMedia /UFD C:\WinPE_amd64 F:

Chapter 3 Using a customized Windows PE CD or UFD for recovery This chapter includes the following topics: Accessing an encrypted disk Accessing an encrypted disk using the administrator command line Accessing an encrypted disk using the Symantec Disk Recovery Utility Accessing an encrypted disk You can use the customized Windows PE CD or UFD to access the encrypted disk in one of the following ways: Using the SEE Drive Encryption administrator command line Using the Symantec Disk Recovery Utility Accessing an encrypted disk using the administrator command line When you start your system in a Window PE environment using the customized Windows PE CD or UFD, the SEE Drive Encryption administrator command prompt appears. You can use the administrator command line to do the following: Recover the preboot screen of the client computer when a user fails to authenticate at preboot or the preboot screen is unavailable.

Using a customized Windows PE CD or UFD for recovery Accessing an encrypted disk using the administrator command line 19 Restore the previous master boot record (MBR) of the client computer after restoring from a volume backup. Decrypt an encrypted disk using the client administrator authentication. Decrypt an encrypted disk using Help Desk Recovery (for managed clients) or Advanced Help Desk Recovery (for unmanaged clients). Recovering the preboot screen To recover the preboot screen 1 Start the system in Window PE environment using the customized Windows CD or UFD. 2 At the administrator command prompt, run the following command: eedadmincli --recover Restoring the old MBR To restore the old MBR 1 Start the system in Window PE environment using the customized Windows CD or UFD. 2 At the administrator command prompt, run the following command: eedadmincli --fixmbr The command replaces the current MBR with the old MBR. Decrypting an encrypted disk using the client administrator credentials If there are multiple disks to decrypt, you should decrypt all of the secondary disks first, and then decrypt the primary disk.

Using a customized Windows PE CD or UFD for recovery Accessing an encrypted disk using the administrator command line 20 To decrypt an encrypted disk using the client administrator credentials 1 Start the system in Window PE environment using the customized Windows CD or UFD. 2 To decrypt an encrypted disk, run the following command at the administrator command prompt: eedadmincli --decrypt --disk <number> --au <AdminUserName> --ap <AdminPassword> Where, <number> is the disk number on the system, <AdminUserName> and <AdminPassword> are the user name and password of the client administrator. For example, eedadmincli --decrypt --disk 0 --au clientadmin1 --ap password1 3 To check the progress of decryption, run the following command at the administrator command prompt periodically: eedadmincli --status --disk <number> Where, <number> is the disk number on the system. For example, eedadmincli --status --disk 0 Decrypting an encrypted disk using the Help Desk Recovery commands If there are multiple disks to decrypt, you should decrypt all of the secondary disks first, and then decrypt the primary disk. To decrypt an encrypted disk using Help Desk Recovery 1 Call your help desk administrator. 2 Start the system in Window PE environment using the customized Windows CD or UFD. 3 To view the name and sequence number of the computer, run the following command at the administrator command prompt: eedadmincli --helpdesk-recovery 4 Read out the displayed computer name and sequence number to the help desk administrator.

Using a customized Windows PE CD or UFD for recovery Accessing an encrypted disk using the Symantec Disk Recovery Utility 21 5 Note down the response key of the computer that the help desk administrator provides. 6 To use the response key and decrypt, run the following command at the administrator command prompt: eedadmincli --decrypt --disk <number> --response-key <response-key> Where, <response-key> is the response key that the help desk administrator provides and <number> is the disk number on the system. To decrypt an encrypted disk using Advanced Help Desk Recovery 1 Call your help desk administrator. 2 Start the system in Window PE environment using the customized Windows CD or UFD. 3 To view the name, sequence number, and challenge key of the computer, run the following command at the administrator command prompt: eedadmincli --helpdesk-recovery --verbose 4 Read out the displayed computer name, sequence number, and challenge key to your help desk administrator. 5 Note down the response key of the computer that the help desk administrator provides. 6 To use the response key and decrypt, run the following command at the administrator command prompt: eedadmincli --decrypt --disk <number> --response-key <response-key> Where, <response-key> is the response key that the help desk administrator provides and <number> is the disk number on the system. Accessing an encrypted disk using the Symantec Disk Recovery Utility Symantec Disk Recovery Utility provides an interface for you to enter your credentials for authentication, select the disk that you want to decrypt, and track the progress of decryption. The utility decrypts the entire disk and does not decrypt a partition. Note: Ensure that you provide an uninterrupted power supply to your computer when decryption is in progress.

Using a customized Windows PE CD or UFD for recovery Accessing an encrypted disk using the Symantec Disk Recovery Utility 22 To open the Symantec Disk Recovery Utility 1 Start the system in Window PE environment using the customized Windows CD or UFD. 2 At the administrator command prompt, type eedrecoverygui.exe, and press Enter. 3 In the Symantec Disk Recovery Utility welcome screen, click Next. 4 From the Choose a physical drive to process list, select the encrypted disk that you want to access, and then click Next. This list displays only the disks that are encrypted. The list does not show any unencrypted disks, external disks, or removable drives. 5 Select one of the options for authentication. Your options are: Client Admin You can use the authentication credentials of the client administrator. Help Desk Recovery You can use the response key that the help desk administrator provides to decrypt the encrypted disk. Decrypting an encrypted disk using the client administrator authentication To decrypt an encrypted disk using the client administrator authentication 1 In the Symantec Disk Recovery Utility dialog box, select the Client Admin option. 2 Do the following: 3 Click Next. Type the user name of the client administrator in the Username box. Type the password of the client administrator in the Password box. 4 Read the message about the uninterrupted power supply, and then click OK. The utility displays a progress bar to indicate the progress of decryption. 5 After the decryption of the disk is complete, in the confirmation dialog box, click OK.

Using a customized Windows PE CD or UFD for recovery Accessing an encrypted disk using the Symantec Disk Recovery Utility 23 Decrypting an encrypted disk using Help Desk Recovery To decrypt an encrypted disk using Help Desk Recovery 1 In the Symantec Disk Recovery Utility dialog box, select the Help Desk Recovery option. 2 Call the help desk administrator for authentication. 3 Provide the following information from the Symantec Disk Recovery Utility dialog box to your help desk: Computer The domain and the name of the computer. Sequence No. A four-digit number that is used to synchronize a client with the server. 4 If the help desk administrator fails to retrieve your computer information and requests you to use the Advanced Help Desk Recovery, then press F5. The Symantec Disk Recovery Utility dialog box displays the Challenge Key. Provide the challenge key to your administrator. 5 Note down the response key that the help desk administrator provides. 6 Type the response key in the Response Key box, and then click Next. 7 Read the message about uninterrupted power supply, and then click OK. The utility displays a progress bar to indicate the progress of decryption. 8 After the decryption of the disk is complete, in the confirmation dialog box, click OK.