The local security administrator (LSA) recovery bundle is used to regain access to Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) or Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) data. This article covers how to run the LSA recovery bundle.
Not applicable
The LSA recovery bundle can be used for Recovery. It also contains command-line interface (CLI) options. For more information, click the appropriate option.
The LSA recovery bundle may be run differently whether the endpoint is Online or Offline. Click the appropriate method for more information.
This process addresses situations where the user has access to the operating system but has either lost all access to encrypted data or must move the hard drive from one chassis to another. In this case, the LSA recovery bundle that is downloaded from the administration console can be copied to the computer and run locally.
If the user no longer has access to the operating system and the machine is locked in SDE Recovery Mode, an offline recovery must be performed.
The LSA recovery bundle may run by an Automatic or Manual method. The automatic method is recommended for versions 10.2.10 and later. The manual method works for all versions. Click the appropriate method for more information.
cmd
and then press OK.cd
command to browse to the directory where the LSA recovery bundle is located and then press Enter.LSARecovery_[HOSTNAME] -x 1 -p [PASSWORD]
and then press Enter.[HOSTNAME]
= Endpoint computer name[PASSWORD]
= Password assigned when downloading the LSA recovery bundleLSARecovery_[HOSTNAME] -gpk -p [PASSWORD]
and then press Enter.CMGKRcvr.txt
and GPKRCVR.TXT
.CMGKRcvr.txt
files are created, locate the file without a number appended.
CMGKRcvr.txt
and GPKRCVR.TXT
to external media or a share.CMGKRcvr.txt
and GPKRCVR.TXT
in a folder. The files may become unusable if stored on the root of external media.
CMGKRcvr.txt
and GPKRCVR.TXT
on the external media or share (Step 9).Copy CMGKRcvr.txt [ROOT]
and then press Enter.[ROOT]
represents the root of the operating system boot volume.GPKRCVR.TXT [ROOT]
and then press Enter.The recovery bundle allows flexibility in command-line options by using switches.
Parameter | Value | Required | Purpose |
---|---|---|---|
-v |
1 to 10 |
No | Sets the verbosity level of logs output. 1 is the lowest level of logging with 10 being the highest. The logs are written to the Windows logging directory in LSARecovery.log . |
-x |
0 |
No | Extracts recovery data for any data that could not be categorized. |
1 |
Extracts recovery data for the system data encryption (SDE) key. | ||
2 |
Extracts recovery data for the user key. | ||
-d |
See Example Below | No | Used with -x or -gpk to designate a directory to create the key. |
-p |
See Example Below | Yes, when using -x or -gpk |
Used to populate the password assigned when downloading the recovery bundle. |
-gpk |
None | No | Extracts recovery data for the GPK keys. |
CLI Examples:
Example #1:
LSARecovery_[HOSTNAME].exe -x 1 -p P@ssw0rd -d C:\Users\Administrator\Desktop\test
Example #1 contains:
LSARecovery_[HOSTNAME].exe
P@ssw0rd
C:\Users\Administrator\Desktop\test
Example #2:
LSARecovery_[HOSTNAME].exe -gpk -p Abcd1234
Example #2 contains:
LSARecovery_[HOSTNAME].exe
Abcd1234
LSARecovery_[HOSTNAME].exe
is being run fromTo contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.