
82 Enterprise Edition Administrator Guide
5
Cancel
the recovery dialog box.
Now you can use the LSARecovery file to run the recovery from a command line.
Recover the Data
1
Locate the recovery file downloaded from the Remote Management Console.
2
Right-click the recovery file and select
Run as administrator
.
Or (if you extracted the recovery file in the previous procedure)
Run the LSARecovery executable from a command prompt:
LSARecovery.exe –server [https://my.Dell Enterprise Server.com]
*
Or
LSARecovery.exe –server [IP address of the Dell Enterprise Server]
NOTE:
* The Dell Enterprise Server can either be specified in the command line as the URL or as the IP address, or by creating the servlet
URL registry entry that the Shield uses.
If the recovery is an SDE or HCA decryption recovery,
no escrow takes place and the only parameter needed in the
command line is the Dell Device Server’s URL.
If the recovery is occurring on a computer equipped with an HCA card,
as the recovery runs, it escrows the new HCA
Critical Data back to the Dell Device Server.
NOTE: If the HCA card is already owned, no escrow step is performed (unless recovery generates new data).
A dialog displays prompting you to select the scenario that best describes your problem.
3
Select the appropriate option:
For SDE Recovery
, select
My system fails to boot and displays a message asking me to perform SDE recovery
and click
Next
.
For HCA
Decryption,
select
I want to decrypt my HCA encrypted drive
and click
Next
.
For HCA
Recovery
, select
I want to restore access to my HCA encrypted drive
and click
Next
.
4
Click
Next
when the Backup\Recovery Information screen displays.
5
Select the disk to decrypt or recover and click
Next
.
6
Enter the recovery password. This is the recovery password defined when the recovery bundle was retrieved from the
Remote Management Console. A dialog displays notifying you of the disk that is being recovered.
7
Click
Recover
.
A dialog displays notifying you that recovery was completed successfully.
8
Click
Finish
.
9
Restart the computer when prompted and log in to Windows.
HCA NOTES: At the end of an HCA decryption process, if an HCA card is detected, the HCA recovery process changes
the boot order of the disk, bypassing the PBA so that the system boots directly to Windows.
If the HCA card was unowned prior to recovery
, then the recovery process takes ownership of the HCA, and escrows the
HCA Critical Data to the server.
Commentaires sur ces manuels