In order to see the decryption status, the command from step 2 needs to be run periodically. In the screenshot there were 2 attempts - the first one was incorrect password (error -11500), and the second was the correct one, so it can be used for decryption:ĥ. To do that, command pgpwde -auth -disk 0 -interactive needs to be executed. It is possible to check if the known passphrases are correct. It might happen, that the error will be displayed after executing the decrypt command (for example, if wrong passphrase was specified). Once the correct is inserted, the decryption process will start: Once this is executed, you will be prompted for passphrase. Next command to run is the decryption command: pgpwde -decrypt -disk 0 -interactive. Check if there are users assigned to this disk - passphrase for any of that assigned user would be used for the decryption:Ĥ. Assuming that the affected drive is "0", run pgpwde -disk-status -disk 0 in order to see the status of the disk - is it encrypted, decrypted, instrumented:ģ. Run pgpwde -enum in order to check what is the disk number for the encrypted boot drive:Ģ. Once machine is booted from that iso, so you see the command-line window with the path "X:\windows\system32", follow the below steps:ġ. How to Customize Windows PE 4.0 and above using Symantec Encryption Desktop 10.3.2 and PGPRecoveryGUI.exe Here is the document which describes in details the process of customizing the Windows PE: In order to be able to boot affected machine using the Recovery CD, you need to create first custom Windows PE iso, which can be then burned on CD.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |