跳转至主要内容
  • 快速、轻松地下订单
  • 查看订单并跟踪您的发货状态
  • 创建并访问您的产品列表
某些文章编号可能已更改。如果这不是您要查找的内容,请尝试搜索所有文章。搜索文章

How to Download the Dell Encryption Enterprise or Dell Encryption Personal Recovery Bundle

摘要: Learn about how to download the LSA recovery bundle for use with Dell Encryption Enterprise and Dell Encryption Personal.

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

说明

The local security administrator (LSA) recovery bundle is used to regain access to Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) or Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) data. This article covers how to download the LSA recovery bundle.


Affected Products:

  • Dell Encryption Enterprise
  • Dell Data Protection | Enterprise Edition
  • Dell Data Protection | Server Edition
  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

The process to download the LSA recovery bundle (also known as the Dell Encryption recovery bundle) differs between the products:

Click the appropriate product for more information. For more information about each product, refer to What is Dell Encryption Enterprise and What is Dell Encryption Personal.

Dell Encryption Enterprise

Click the appropriate Dell Data Security (formerly Dell Data Protection) server version for versioning information. For more information, refer to How to Identify the Dell Data Security Server Version.

  1. From a web browser, go to the Dell Data Security administration console at https://servername.company.com:8443/webui.
    Note:
    • The example, servername.company.com, may differ from the server DNS in your environment.
    • The port, 8443, may differ from the Remote Management Console port in your environment.
  2. Sign in to the Dell Data Security administration console.
    Dell Data Security administration console
  3. From the left menu pane, expand the Populations tab and then click Endpoints.
    Endpoints
  4. From Endpoints:
    1. Populate an endpoint name in the Search field.
    2. Click the search icon.
    3. Click the appropriate Hostname.
    Endpoints menu
    Note:
    • Wildcards (*) may be used when searching.
    • The endpoint Hostname and OS/Version may be different in your environment.
  5. Click Device Recovery Keys.
    Device Recovery Keys
  6. Populate a Password and then click either Download or Downloadx64.
    Password and download
    Note:
  7. Save the recovery key.
    Saving the recovery file
    Note: The browser UI and recovery key filename may differ in your environment.
  1. From a web browser, go to the Dell Data Security administration console at https://servername.company.com:8443/webui.
    Note:
    • The example, servername.company.com, may differ from the server DNS in your environment.
    • The port, 8443, may differ from the Remote Management Console port in your environment.
  2. Sign in to the Dell Data Security administration console.
    Dell Data Security administration console
  3. From the left menu pane, expand the Populations tab and then click Endpoints.
    Endpoints
  4. From Endpoints:
    1. Populate an endpoint name in the Search field.
    2. Click the search icon.
    3. Click the appropriate Hostname.
    Endpoints menu
    Note:
    • Wildcards (*) may be used when searching.
    • The endpoint Hostname and OS/Version may be different in your environment.
  5. Click Device Recovery Keys.
    Device Recovery Keys
  6. Populate a Password and then click Download.
    Password and download
  7. Save the recovery key.
    Saving the recovery file
    Note: The browser UI and recovery key filename may differ in your environment.
  1. In Windows Explorer, go to C:\Program Files\Dell\Enterprise Edition\Console\ and then double-click Credant.Console.exe.
    Credant Console
  2. Submit credentials to sign in to the Remote Management Console.
    Signing in to the Remote Management Console
  3. From the left pane, click Endpoints.
    Endpoints
  4. From Endpoint Search:
    1. Populate the Hostname.
    2. Click Search.
    3. Click the Details icon.

    Endpoint Search menu
    Note:
    • Wildcards (*) may be used when searching.
    • The endpoint Hostname and OS/Version may be different in your environment.
  5. Click Device Recovery Keys.
    Device Recovery Keys
  6. Populate a recovery Password and then click Save.
    Password and save
  7. Save the recovery key.
    Saving the recovery file

Dell Encryption Personal

Click the appropriate Dell Encryption Personal version for versioning information. For more information, refer to How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

  1. Log in to the Windows computer.
  2. In the Windows System Tray, right-click the Dell Encryption icon and then select Open Dell Encryption.
    Open Dell Encryption
  3. In the upper right of the local management console, click the keys icon.
    Keys icon
  4. From the Backup keys and critical recovery data menu:
    1. Check Specify an alternate location to create the recovery bundle.
      1. Browse to a location.
      2. Optionally, click to Remember this location for future backups.
    2. Populate the Encryption Administrator Password.
    3. Click OK.
    Backup keys and critical recovery data menu
    Note: The location must be external storage (network location or USB).
  1. Log in to the Windows computer.
  2. In the Windows System Tray, right-click the Dell Data Protection | Encryption icon and then select Open Dell Data Protection | Encryption.
    Open Dell Data Protection Encryption
  3. In the upper right of the local management console, click the keys icon.
    Keys icon
  4. From the Backup keys and critical recovery data menu:
    1. Check Specify an alternate location to create the recovery bundle.
      1. Browse to a location.
      2. Optionally, click to Remember this location for future backups.
    2. Populate the Encryption Administrator Password.
    3. Click OK.
    Backup keys and critical recovery data menu
    Note: The location must be external storage (network location or USB).

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

受影响的产品

Dell Encryption
文章属性
文章编号: 000130800
文章类型: How To
上次修改时间: 29 10月 2024
版本:  14
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。