Eset Full Disk Encryption Download

0 views
Skip to first unread message

Wynellewe Gr

unread,
Jul 24, 2024, 11:28:43 AM7/24/24
to destmikoho

Hi,

I 've got the problem that I activate the full disk encryption and then the computer requires a reboot to set the password and so on. The problem is that the window to set the password does not shows up but also I am not able to boot from the windows boot manager anymore.

eset full disk encryption download


Download Zip ::: https://urlin.us/2zKVeK



Hi,

I 've got the problem that I activate the full disk encryption and then the computer requires a reboot to set the password and so on. The problem is that the window to set the password does not shows up but also I am not able to boot from the windows boot manager anymore.

In order to properly diagnose this is the issue please can you use the Recovery Utility to grab the disk information of affected system, steps on that can be viewed here, the process will only take a few minutes - -eset-encryption-recovery-utility-diagnostics#DisplayDiskInfo

Hello AAndrejko,

thanks for your quick reply. Unfortunatly I can't do that because I cannot generate a Restoration file in the protect center, which is required for the encryption recovery utility. The status of the computer in the protect center is that the encryption is not active.

For this process you don't need the recovery file at all. It's merely at a diagnostics stage at the moment so you'll still be able to get the disk information without the recovery file. Within the media creation tool feel free to select diagnostics only when selecting the product type.

The case with that is usually the system is using a RAID bus, which we cannot read. The solution to this would be to temporarily go into the BIOS and turn the disk operation mode to AHCI instead of RAID. More info on that here - -error-disk-enumeration-failed-in-eset-endpoint-encryption-or-eset-full-disk-encryption

If that still doesn't work then I'd urge you to submit a ticket straight away with what info you have.

Hello AANdrejko,

Actually I don't think that thinkpad has the bios option because it has not even a raid controller. I opened a ticket already two days ago but no one has contacted me. I opened a new one today also. Shouldn't I get normaly a mail that a new ticket has opened? Because I got no.

Best regards and thanks for everything!

You may find the switch within the BIOS under Config -> Storage -> Controller Mode. Although I'm unsure what Thinkpad device you have in particular, the emulator has lots listed, so I'm unable to say for sure where it would be.

I can see you've submitted a ticket and it looks like it's being looked at now. I've given the assignee a message now too so hopefully they will be in contact soon, I'll give them all the info we've discussed on here but hopefully with a little more digging into the BIOS you should be able to find that switch to get the drive to detect in the recovery software.

I would also like to mention though if this device is a brand new device, or one where you've got a backup you can restore from, it may be worthwhile to simply wipe and re-install Windows, restore from the backup if you have one. Then before you attempt the process again, grab a diagnostic log from the machine in question and send that to support, steps on that can be viewed here - -eset-encryption-diagnostics-tool .

Another point that has popped into my mind about this - If you go into the BIOS and go to the security section, then SecureBoot, you may have an option called "Allow Microsoft 3rd party UEFI CA", this option needs to be enabled for our bootloader to function. This is a relatively new thing on certain devices, our bootloader is still signed by Microsoft though. The system may just boot after enabling this if it's disabled.

Hello AANdrejko,

thanks very much for your help it has been the 3rd party UEFI CA. Unfortunatly Lenovo has it deactivated by default so we have to touch every Laptop that we want to encrypt. But now it is working fine.

Thanks A Lot again!

With best regards.
Leon

In a future version of our software we do detect whether this has been enabled or not and allow/deny encryption starting when necessary so hopefully you wont run into a non-booting system in the future.

Toggling authentication within the ESET Full Disk Encryption is way to disable authentication from viewing on start-up at all. However, I would like to stress that since there's no user login prompt when authentication is disabled, the system is not protected from threats via our authentication pre-boot process and data will be accessible once Windows loads, the only authentication stopping anyone getting into the systems desktop at this point is Windows login.

I would also like to note that disabling authentication via policy or via a task in ESET Full Disk Encryption was not designed to be disabled permanently. The function is merely there to aid users and administrators when reboots are needed with minimal user interaction, such as when Windows is performing updates. It can also aid when travelling abroad.

If you would still like to disable the pre-boot authentication screen, I would like to turn your attention to one of our other encryption products, ESET Endpoint Encryption. In Endpoint Encryption there is an encryption mode called TPM No Extra Authentication, this uses the TPM to validate the boot process and then the Windows login screen is shown to the user if the TPM is present and intact. Although it's still good practice to ensure the users password is an adequate length and complexity and ensure Windows is up to date. You can see more information about it here - _server/3/en-US/what_is_a_trusted_platform_module.html

Thank you for your reply.
I understand that the solution is not made so that authentication is permanently disabled.
Eset endpoint encryption may be better to use than one would need.
Namely, we have a strong protection for Windows boot with an AD and a password reinforcement solution via Passphrase and verification if the password is not corrupted elsewhere.
However, I would like to know if we can manage Eset endpoint encryption on a platform like eset protect? We need to manage encryption remotely as we have multiple agencies all over the country/world.

Kind regards

Endpoint Encryption cannot be managed via ESET Protect, however it has it's own server to manage the Endpoints with a dedicated web interface. The EEE product has a lot more policies, customization options and features compared to EFDE so Protect wouldn't be suitable. You can view more information about it here - _server/3/en-US/index.html

As for managing encryption remotely EEE definitely has you covered. When EEE is used in managed mode (Paired with an EEE server) it uses what's known as our proxy server. The proxy server acts as a cloud which can send and receive commands from the server and client devices, this means any client that has an internet connection can sync with the Encryption Server. I'm very much paraphrasing what the Proxy Server and EEE server can do at this point due to this just being a forum post. The EEE product also has a lot more features like file & folder encryption, outlook integration, so much more. I would definitely recommend you get in touch with your local sales office, they should be able to give you more information in terms of how the product works, and possibly run through a demo with you to see how it works in your environment.

I have a problem with encryption. I could not the recover password for ESET EFDE using the password recover, so I tried data recovery but still could not get my computer back. Now my question is if I format my disk, will ESET still ask for the pre login password ? If so how can remove the password if it is stored in the BIOS? I have given up on all my data, Just want a fresh install.

Note that the ESET Encryption Boot files are not stored within the BIOS rather the EFI System Partition (ESP), so formatting the Disk completely will remove these files and you will not need to enter your FDE Password again or remove it manually.

However, we might be able to assist you in decrypting the Disk if we can understand why you were not able to use the Recovery Password, what did it say when you attempted to use the Recovery Password?

What really happened was this; I encrypted the disk and completed successfully. But some of my application like teams where not opening, giving an error ""Your computer's Trusted Platform Module has malfunctioned. If the error persists, contact your system administrator with the error code 80090016". So did some google search and there was one article that said to run TPM.msc and clear tpm. When I did this and after restarting the computer the computer, when I entered my ESET pre-login password, it said it was a wrong password. So decided to do a password recovery, entering the password generated, I could start Windows 10, but this time the Windows goes to a repair mode and yet it could not repair Windows system.

ff7609af8f
Reply all
Reply to author
Forward
0 new messages