![]() ![]() Troubleshooting Tools: Drive Encryption Administrator Command Line Interface Both IIS 6 and 7 components are required. Symantec Endpoint Encryption Autologon Settings may be managed from the client machine itself using the built in Client Administrator Command Line Interface. The command line utility can be used to check the current status of Autologon, as well as enable or disable the utility. Only Drive Encryption Client Administrators can use the command line utility. ![]() * Use the command ( eedAdminCli -decrypt -disk -au * Use the command ( eedadmincli -status ) To check if the drive is Or fast boot if you are unable to boot from USB/DVD * Try to change the boot options to legacy and try to disable the secure boot * Change the BIOS boot sequence to boot from USB/DVD In the below examples, replace,, and with the appropriate values Check Status of Autologon:Įedadmincli -check-autologon -au -ap Enable Autologon (The count option is optional with a default of 1 if not specified):Įedadmincli -enable-autologon -count -au -ap Disable Autologon:Įedadmincli -disable-autologon -au -ap To be run from the C:\Program File\Symantec\Endpoint Encryption Clients\Drive Encryptionĭirectory inside Command Prompt. Use theĬommand ( eedadmincli -status ) to check the watermark values Note: Please do not restart the machine while it is decrypting. How to use the Autologon Utility for Symantec Endpoint Encryption version 11.I wanted to jump in and ask a couple questions, as we might have a bit of a misunderstanding going on.Symantec Encryption Endpoint 11.2.1 Installation Guide.Symantec Endpoint Encryption Policy Administrator Guide.How to: Install Symantec Endpoint Encryption 11.System Requirements for Symantec Endpoint Encryption Management Server 11.2.x.Low watermark is equal to the total sectors it indicates that the drive is completely Often as the low watermark will increase as the data decrypts. We offer two encryption products, and Chetan and Anthony are both correct, but from different product perspectives. If you are using Symantec Endpoint Encryption (SEE), Chetan basically has the right idea. I believe the drive encryption is somewhat tied into the hardware ID's etc from the system it was in originally, and it can be difficult if not impossible to recover data after a hardware failure (e.g. ![]() You could use SEE Removable Storage to transfer files to your business partner, even if the recipient does not have SEE installed. With Symantec Encryption Desktop (SED, formerly PGP Desktop), you can slave the drive to any othersystem that has SED installed, and attempt to access the drive to recover data. You would simply use any valid passphrase for the drive to authenticate to it. ![]()
0 Comments
Leave a Reply. |