Using Recovery manager for encrypted volumes for endpoints
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the
Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Using Recovery Manager for encrypted volumes for virtual machines
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the
Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
Alternately, you can use the Recovery option in the Protection tab of the virtual machine details to automatically fill in the recovery key ID, for both Windows and macOS endpoints.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume Information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Page Menu
- Bitdefender – GravityZone
- Report types
- Repair client
- Reconfigure client
- Configuration
- Operation
- Operation
- Best practices
- Viewing and managing scheduled reports
- Announcements
- Executive Summary
- Reports
- Restart machine
- Create reports
- Deleting notifications
- Configuring notification settings
- Taking report-based actions
- Saving reports
- Emailing reports
- Printing reports
- Notifications
- Notification types
- Viewing notifications
- Risk scan
- Best practices
- Credentials Manager
- Patch tasks
- Troubleshooting
- Creating policies
- Assigning policies
- Configuring profiles
- Changing policy settings
- Renaming policies
- Computer policies
- Check my monthly subscription for Bitdefender Security for AWS
- Scan for IOC
- Scan
- Deleting policies
- Exchange scan
- Patch tasks
- Install
- Uninstall client
- Update client
- Network discovery
- Patch Management
- Deleting endpoints
- Threats Xplorer
- Introduction
- Antimalware
- Advanced Threat Control
- HyperDetect
- Advanced Anti-Exploit
- Firewall
- Content Control
- Network Attack Defense
- Using Recovery Manager for encrypted volumes
- Device Control
- Email Security
- Full Disk Encryption
- Security for Exchange
- Sandbox Analyzer
- Endpoint Risk Analytics (ERA)
- eXtended Detection and Response (XDR)
- Security for Storage
- Container Protection
- Endpoint types
- Email Security Licensing & Provisioning
- Install Security Server through Control Center
- Install security agents – standard procedure
- Install Security Server manually
- AD Connect
- Bitdefender Endpoint Security Tools for Linux quick start guide
- Install security agents – use cases
- Whitelist Email
- Configure Email
- Add Mailbox
- Features distribution
- Network inventory
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies