mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
added image
This commit is contained in:
parent
dbff31ad15
commit
cf0f39ed22
@ -79,21 +79,20 @@ It's possible that you might revoke data from an unenrolled device only to later
|
||||
>[!IMPORTANT]
|
||||
>To maintain control over your enterprise data, and to be able to revoke again in the future, you must only perform this process after the employee has re-enrolled the device.
|
||||
|
||||
1. Have the employee sign in to the unenrolled device, open a command prompt, and type:
|
||||
1. Have the employee sign in to the unenrolled device, open an elevated command prompt, and type:
|
||||
|
||||
<code>Robocopy "%localappdata%\Microsoft\EDP\Recovery" "<i>new_location</i>" /EFSRAW</code>
|
||||
<code>Robocopy "%localappdata%\Microsoft\EDP\Recovery" "<i>new_location</i>" * /EFSRAW</code>
|
||||
|
||||
To start Robocopy in S mode, press the Windows key + R.
|
||||
Where "*new_location*" is in a different directory. This can be on the employee’s device or on a shared folder on a computer that runs Windows 8 or Windows Server 2012 or newer and can be accessed while you're logged in as a data recovery agent.
|
||||
|
||||
-or-
|
||||
To start Robocopy in S mode, open **Task Manager**. Click **File** > **Run new task** and type the command.
|
||||
|
||||

|
||||
|
||||
If the employee performed a clean installation and there is no user profile, you need to recover the keys from the System Volume folder in each drive. Type:
|
||||
|
||||
<code>Robocopy "<i>drive_letter</i>:\System Volume Information\EDP\Recovery\" "<i>new_location</i>" * /EFSRAW</code>
|
||||
|
||||
Where "*new_location*" is in a different directory. This can be on the employee’s device or on a shared folder on a computer that runs Windows 8 or Windows Server 2012 or newer and can be accessed while you're logged in as a data recovery agent.
|
||||
|
||||
|
||||
2. Sign in to a different device with administrator credentials that have access to your organization's DRA certificate, and perform the file decryption and recovery by typing:
|
||||
|
||||
<code>cipher.exe /D "<i>new_location</i>"</code>
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 13 KiB |
Loading…
x
Reference in New Issue
Block a user