diff --git a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md index d7631db8b9..4e8e4aeaea 100644 --- a/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md +++ b/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md @@ -79,21 +79,20 @@ It's possible that you might revoke data from an unenrolled device only to later >[!IMPORTANT] >To maintain control over your enterprise data, and to be able to revoke again in the future, you must only perform this process after the employee has re-enrolled the device. -1. Have the employee sign in to the unenrolled device, open a command prompt, and type: +1. Have the employee sign in to the unenrolled device, open an elevated command prompt, and type: - Robocopy "%localappdata%\Microsoft\EDP\Recovery" "new_location" /EFSRAW + Robocopy "%localappdata%\Microsoft\EDP\Recovery" "new_location" * /EFSRAW - To start Robocopy in S mode, press the Windows key + R. + Where "*new_location*" is in a different directory. This can be on the employee’s device or on a shared folder on a computer that runs Windows 8 or Windows Server 2012 or newer and can be accessed while you're logged in as a data recovery agent. + + To start Robocopy in S mode, open **Task Manager**. Click **File** > **Run new task** and type the command. - -or- + ![Robocopy in S mode](images\robocopy-s-mode.png) If the employee performed a clean installation and there is no user profile, you need to recover the keys from the System Volume folder in each drive. Type: Robocopy "drive_letter:\System Volume Information\EDP\Recovery\" "new_location" * /EFSRAW - Where "*new_location*" is in a different directory. This can be on the employee’s device or on a shared folder on a computer that runs Windows 8 or Windows Server 2012 or newer and can be accessed while you're logged in as a data recovery agent. - - 2. Sign in to a different device with administrator credentials that have access to your organization's DRA certificate, and perform the file decryption and recovery by typing: cipher.exe /D "new_location" diff --git a/windows/security/information-protection/windows-information-protection/images/robocopy-s-mode.png b/windows/security/information-protection/windows-information-protection/images/robocopy-s-mode.png new file mode 100644 index 0000000000..3b81bebd76 Binary files /dev/null and b/windows/security/information-protection/windows-information-protection/images/robocopy-s-mode.png differ