跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。
部分文章編號可能已變更。如果這不是您要找的文章,請嘗試搜尋所有文章。搜尋文章

How to Download the Dell Encryption Enterprise / Dell Encryption Personal Recovery Bundle

摘要: The LSA recovery bundle is downloaded for use with Dell Encryption Enterprise and Dell Encryption Personal.

本文可能採用自動翻譯。如果您對翻譯品質有任何寶貴意見,請使用此頁面底部的表單告訴我們,謝謝。

文章內容


症狀

The local security administrator (LSA) recovery bundle is used to regain access to Dell Encryption Enterprise (formerly Dell Data Protection | Enterprise Edition) or Dell Encryption Personal (formerly Dell Data Protection | Personal Edition) data. This article covers how to download the LSA recovery bundle.


Affected Products:

Dell Encryption Enterprise
Dell Data Protection | Enterprise Edition
Dell Data Protection | Server Edition
Dell Encryption Personal
Dell Data Protection | Personal Edition

Affected Operating Systems:

Windows


原因

Not applicable.

解析度

The process differs between the products:

  • Dell Encryption Enterprise
  • Dell Encryption Personal

Click the appropriate product for more information.

Click the appropriate Dell Data Security (formerly Dell Data Protection) server version for versioning information. For more information, see How to Identify the Dell Data Security / Dell Data Protection Server Version.

To download a recovery file:

  1. From a web browser, go to the Dell Data Security administration console at https://servername.company.com:8443/webui.
Note:
  • The example, servername.company.com, may differ from the server DNS in your environment.
  • The port, 8443, may differ from the Remote Management Console port in your environment.
  1. Sign in to the Dell Data Security administration console.

Dell Data Security administration console

  1. From the left menu pane, expand the Populations tab and then click Endpoints.

Endpoints

  1. From Endpoints:
    1. Populate an endpoint name in the Search field.
    2. Click the search icon.
    3. Click the appropriate Hostname.

Endpoints menu

Note:
  • Wildcards (*) may be used when searching.
  • The endpoint hostname and OS/Version may be different in your environment.
  1. Click Device Recovery Keys.

Device Recovery Keys

  1. Populate a Password and then click either Download or Downloadx64.

Password and download

Note:
  1. Save the recovery key.

Saving the recovery file

Note: The browser UI and recovery key filename may differ in your environment.

To download a recovery file:

  1. From a web browser, go to the Dell Data Security administration console at https://servername.company.com:8443/webui.
Note:
  • The example, servername.company.com, may differ from the server DNS in your environment.
  • The port, 8443, may differ from the Remote Management Console port in your environment.
  1. Sign in to the Dell Data Security administration console.

Dell Data Security administration console

  1. From the left menu pane, expand the Populations tab and then click Endpoints.

Endpoints

  1. From Endpoints:
    1. Populate an endpoint name in the Search field.
    2. Click the search icon.
    3. Click the appropriate Hostname.

Endpoints menu

Note:
  • Wildcards (*) may be used when searching.
  • The endpoint hostname and OS/Version may be different in your environment.
  1. Click Device Recovery Keys.

Device Recovery Keys

  1. Populate a Password and then click Download.

Password and download

  1. Save the recovery key.

Saving the recovery file

Note: The browser UI and recovery key filename may differ in your environment.

To download a recovery file:

  1. In Windows Explorer, go to C:\Program Files\Dell\Enterprise Edition\Console\ and then double-click Credant.Console.exe.

Credant Console

  1. Submit credentials to sign in to the Remote Management Console.

Signing in to the Remote Management Console

  1. From the left pane, click Endpoints.

Endpoints

  1. From Endpoint Search:
    1. Populate the Hostname.
    2. Click Search.
    3. Click the Details icon.

Endpoint Search menu

Note:
  • Wildcards (*) may be used when searching.
  • The endpoint hostname and OS/Version may be different in your environment.
  1. Click Device Recovery Keys.

Device Recovery Keys

  1. Populate a recovery Password and then click Save.

Password and save

  1. Save the recovery key.

Saving the recovery file

Click the appropriate Dell Encryption Personal for versioning information. For more information, see How to Identify the Dell Encryption Enterprise or Dell Encryption Personal Version.

To download a recovery file:

  1. Log in to the Windows computer.
  2. In the Windows System Tray, right-click the Dell Encryption icon and then select Open Dell Encryption.

Open Dell Encryption

  1. In the upper right of the local management console, click the keys icon.

Keys icon

  1. From the Backup keys and critical recovery data menu:
    1. Check Specify an alternate location to create the recovery bundle.
      1. Browse to a location.
      2. Optionally, click to Remember this location for future backups.
    2. Populate the Encryption Administrator Password.
    3. Click OK.

Backup keys and critical recovery data menu

Note: The location must be external storage (network location or USB).

To download a recovery file:

  1. Log in to the Windows computer.
  2. In the Windows System Tray, right-click the Dell Data Protection | Encryption icon and then select Open Dell Data Protection | Encryption.

Open Dell Data Protection Encryption

  1. In the upper right of the local management console, click the keys icon.

Keys icon

  1. From the Backup keys and critical recovery data menu:
    1. Check Specify an alternate location to create the recovery bundle.
      1. Browse to a location.
      2. Optionally, click to Remember this location for future backups.
    2. Populate the Encryption Administrator Password.
    3. Click OK.

Backup keys and critical recovery data menu

Note: The location must be external storage (network location or USB).

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

 

其他資訊

 

影片

 

文章屬性


受影響的產品

Dell Encryption

上次發佈日期

19 12月 2022

版本

12

文章類型

Solution