![]() If Windows loads successfully, you can copy important files from the machine prior to rebooting and starting the decryption process.Providing that the drive encryption record can be found or recovered, you have the option of pressing the D key to immediately start the decryption process or any other key to load Windows.It can be changed by navigating to the Keyboard option and selecting a different keyboard. Note that the US English keyboard is loaded by default. You can use a user's passphrase, a disk administrator passphrase or a WDRT (Whole Disk Recovery Token). At the bootguard screen you must authenticate.The initial screen states PGP Recovery Disk.Select the optical drive from the boot option menu to boot from the Recovery Disk.Access your system's boot option menu (usually by pressing F9, F10, or F12 immediately after powering up Windows, but consult the user guide of your PC for more details).To use the Recovery Disk, please do the following: If the system with problems is 32-bit, the file is "C:\Program Files\PGP Corporation\PGP Desktop\bootg.iso".If the system with problems is 64-bit, the file is "C:\Program Files (x86)\PGP Corporation\PGP Desktop\bootg.iso". ![]() In Windows 10, do this by right clicking on the file and choosing Burn disc image. To create the Recovery Disk simply locate the bootg.iso file on a machine that is running the same release of Encryption Desktop as the machine that has problems and burn the ISO to optical media. Note that if a machine can already load bootguard but you cannot authenticate, it is unlikely that the Recovery Disk will be of any help. Either attempt to load Windows or decrypt the drive.The Recovery Disk allows you to do the following: In System Summary, check that the value of BIOS Mode is Legacy. To determine if you are using Legacy BIOS, run msinfo32 or click on Control Panel / System and Security / Administrative Tools / System Information. The Recovery Disk can only be used on machines running legacy BIOS ( not UEFI). The bootable USB media or Drive Encryption command line tool will decrypt a disk many times faster than the Recovery Disk. Please therefore only use it to decrypt a drive as a last resort. The rate of decryption is approximately 9 GB per hour which means it will take about 28 hours to decrypt a 250 GB drive. The Encryption Desktop Recovery Disk has the same functionality as the bootable USB media but it is extremely slow for decrypting a drive. If you do not have access to the WinPE recovery media, you can create bootable USB media. Using the command line tool you can, for example, authenticate to the drive and copy important files from it. The recommended method of recovering an encrypted drive is to create Windows 10 WinPE recovery media because it boots to a command prompt and allows you to run PGPwde.exe, the Drive Encryption command line tool. Please note that progress will be very slow:ĩ.If a machine fails to load Windows or Encryption Desktop Drive Encryption bootguard (pre-boot) fails to load, you will need to decrypt the drive. If you press D to decrypt, decryption progress will be shown. If you successfully authenticate you will see a screen that gives you the option of pressing " D" to begin decryption or any other key to attempt to boot into Windows.Ĩ. To use a WDRT simply type it and press the Enter key:ħ. You will also need to press F4 if you are using Detailed bootguard authentication and wish to use a WDRT:Ħ. If you are using Simple bootguard authentication you will see the following screen. Ensure you see the following screen to confirm you have booted from the recovery disk and press any key: 4. Ensure the machine's BIOS is configured to boot from CD. Press F4 to use answers to self-recovery questions. The procedure for using the recovery disk is as follows: 1. If you have a token you can enter its PIN:ĥ. Here you can enter a valid passphrase or a WDRT (Whole Disk Recovery Token). Ensure you see the following screen to confirm you have booted from the recovery disk and press any key:Ĥ. Ensure the machine's BIOS is configured to boot from CD.ģ. The procedure for using the recovery disk is as follows:Ģ. Much faster options include "slaving" the disk to another machine running SED or building a WinPE image. You should be prepared for decryption to take place at a speed as slow as 2 GB per hour. Using the recovery disk should be considered a last resort because it is a 16-bit process and decryption will be extremely slow. Images are also available on the Symantec Knowledge Base. Windows x32: C:\Program Files\PGP Corporation\PGP Desktop.Windows 圆4: C:\Program Files (x86)\PGP Corporation\PGP Desktop.After SED is installed it can be found in the following folder: This image is named bootg.iso and is included with SED. One method of decrypting a drive encrypted with SED (Symantec Drive Encryption) for Windows is to use the Recovery Disk Image. ![]()
0 Comments
Leave a Reply. |