?
Solved

Open symantec full disk encrypted disk on sperate PC

Posted on 2014-07-28
3
Medium Priority
?
455 Views
Last Modified: 2014-08-05
HI,

I have a laptop which has a corrupt Windows install but encrypted with Symantec Endpoint Encryption 8.0.1 Full Disk edition.

It was encrypted by a previous IT company and we do not have any media for the software.

I need to ideally slave the disk onto another PC to get the data off it and then wipe the disk and rebuild.

How do i do this?

We use truecrypt and that allows you to plugin a slave unit with the relevant password and open it up.

Can i use another laptop which is encrypted using the same Symantec software?

thanks
0
Comment
Question by:timb551
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 56

Expert Comment

by:McKnife
ID: 40224315
Hi.

It will not hurt to simply try it. Even if it won't work, that will do no harm to the disk.
I am experienced only with symantec encryption desktop 10, with that product, you can do that, it will ask for a password as soon as the disk is connected.
0
 

Accepted Solution

by:
timb551 earned 0 total points
ID: 40233616
No it didnt work, had to wipe the drive and lose the data and start again.
0
 

Author Closing Comment

by:timb551
ID: 40240755
Had to rebuild the unit from scratch losing the data.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
This Micro Tutorial will teach you how to change your appearance and customize your Windows 7 interface to your unique preference. This will be demonstrated using Windows 7 operating system.
This Micro Tutorial will give you a introduction in two parts how to utilize Windows Live Movie Maker to its maximum editing capability. This will be demonstrated using Windows Live Movie Maker on Windows 7 operating system.
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question