Using Recovery manager for encrypted volumes for endpoints
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Using Recovery Manager for encrypted volumes for virtual machines
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
Alternately, you can use the Recovery option in the Protection tab of the virtual machine details to automatically fill in the recovery key ID, for both Windows and macOS endpoints.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume Information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS