Using Recovery manager for encrypted volumes for endpoints
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the
Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Using Recovery Manager for encrypted volumes for virtual machines
When endpoint users forget their encryption passwords and they cannot access encrypted volumes on their machines any longer, you can help them by retrieving recovery keys from the Network page.
To retrieve a recovery key:
Go to the Network page.
Click the
Recovery manager button in the action toolbar of the left-side pane. A new window appears.
In the Identifier section of the window, enter the following data:
The recovery key ID of the encrypted volume. The recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
On Windows, the recovery key ID is a string of numbers and letters available on the endpoint, in the BitLocker recovery screen.
Alternately, you can use the Recovery option in the Protection tab of the virtual machine details to automatically fill in the recovery key ID, for both Windows and macOS endpoints.
The password of your GravityZone account.
Click Reveal. The window expands.
In the Volume Information, you are presented with the following data:
Volume name
Type of volume (boot or non-boot).
Endpoint name (as listed in the Network Inventory)
Recovery key. On Windows, the recovery key is a password generated automatically when the volume has been encrypted. On Mac, the recovery key is actually the user account password.
Send the recovery key to the endpoint user.
For details about encrypting and decrypting volumes with GravityZone, refer to Encryption.
Page Menu
- Bitdefender – GravityZone
- Threats Xplorer
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Endpoint types
- Add Mailbox
- Configure Email
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Allow file download blocked by Bitdefender
- Email Security Licensing & Provisioning
- Check my monthly subscription for Bitdefender Security for AWS
- Viewing notifications
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Create reports
- Report types
- Reports
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Repair client
- Restart machine
- Features distribution
- Network discovery
- Container Protection
- Update client
- Security for Storage
- Uninstall client
- eXtended Detection and Response (XDR)
- Install
- Endpoint Risk Analytics (ERA)
- Patch tasks
- Sandbox Analyzer
- Exchange scan
- Security for Exchange
- Deleting policies
- Full Disk Encryption
- Scan
- Email Security
- Scan for IOC
- Risk scan
- Device Control
- Computer policies
- Patch Management
- Renaming policies
- Network Attack Defense
- Changing policy settings
- Content Control
- Configuring profiles
- Firewall
- Assigning policies
- Advanced Anti-Exploit
- Creating policies
- HyperDetect
- Troubleshooting
- Advanced Threat Control
- Patch tasks
- Antimalware
- Credentials Manager
- Introduction
- Best practices