- As a Bitlocker data recovery software, M3 Bitlocker Recovery can easily recover lost data from formatted, damaged, corrupted, failed, inaccessible, deleted, lost Bitlocker encrypted partition as long as Bitlocker metadata is intact and the users provide the password or 48-digit recovery key to decrypt data from Bitlocker encrypted drive.
- Windows saves BitLocker recovery key in a simple text file when you choose to save recovery key as a file. Also, be careful when you choose to print the recovery key on a paper as anyone can have access to that piece of paper.
- M3 Data Recovery is one of the world's leading and professional data recovery solution providers specialize in Windows data recovery, Mac data recovery, Bitlocker encrypted drive data recovery, etc.
M3 Bitlocker Recovery is also a Bitlocker crack tool and Bitlocker decryption software which can help you decrypt data after Bitlocker drive encryption/decryption process failed, stuck.
Hi,I enabled BitLocker on some computers with Windows Ultimate 7.
These computers don't have TPM, so I had to make changes to GPEDIT to make it work with USB flash drive. Each time I encrypted the hard drive, it created 'BitLocker Recovery Key file' in TXT.
I like to understand when/how these keys are used.
So far what understand is this. I intentionally took the USB flash drive out of the computer and restarted it. Then the computer prompted for 48 digit key - BitLocker Recovery Key, I entered: 712921-100232-438999-066539-157036-381612-571373-133782 and it continued to load OS.
But when do I use and what is the purpose of:
Recovery key identification: E8AACEDF-41E8-49
Full recovery key identification: E8AACEDF-41E8-49BD-9188-00E58F51EFA9
BitLocker Recovery Key E8AACEDF-41E8-49BD-9188-00E58F51EFA9.txt
-------------- Contents --------------------------
BitLocker Drive Encryption Recovery Key
The recovery key is used to recover the data on a BitLocker protected drive.
To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen.
Recovery key identification: E8AACEDF-41E8-49
Full recovery key identification: E8AACEDF-41E8-49BD-9188-00E58F51EFA9
![Recovery Recovery](/uploads/1/2/5/3/125371936/409387156.jpg)
BitLocker Recovery Key:
712921-100232-438999-066539-157036-381612-571373-133782
-------------- Contents --------------------------
![Bitlocker Recovery Key Generator Free Download Bitlocker Recovery Key Generator Free Download](/uploads/1/2/5/3/125371936/475202371.jpg)
Active4 years, 10 months ago
Is there any difference between a BitLocker recovery key file and numerical password that would negatively impact my ability to unlock the drive in a disaster scenario?
Last year I bought an older puzzle game called Jigsaw Mania, and I play this game everyday. Puzzle pirates download to desktop.
I frequently encrypt USB hard drives that are used for backups with BitLocker. I save the
.BEK
file on the server being backed up and use that to unlock the drives. However, I also save offsite the Numerical Password as well as a copy of the .BEK
file.If it's not necessary to save both of these offsite, it would be simpler not to. Nip tuck season 1 download. But before I stop doing so I need to know if there are any differences or gotchas between these two unlock methods I need to take into consideration.
Some Details
- I'm doing this on Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2 machines
- I never store the keys in a TPM
- I use 'regular' BitLocker (not To-Go)
On Server 2008/R2 I enable BitLocker with:
on Server 2012/R2 I enable BitLocker with:
Twisty Impersonator
Twisty ImpersonatorTwisty Impersonator2,55166 gold badges1919 silver badges4343 bronze badges
1 Answer
The commands you posted are turning on BDE encryption for the volume you designate, saving a Recovery Key file (
-rk
) to C:BitLocker Keys
, and generating a numerical Recovery Password (-rp
).Should the time come that you need to recover a Bitlocker-encrypted volume, you can use either the Recovery Key file or the numerical Recovery Password. You don't need both.. and if you're not going to back up both, I'm a little curious as to why you're generating both. If you're only going to use one, you may as well just drop the other (
-rk
or the -rp
) from your command, and not generate a recovery option you're not going to use in the first place.The differences between the two methods don't seem to apply to your use case - it doesn't look like you're storing your recovery keys in Active Directory, or encrypting system drives, so it's really your choice as to which method you prefer.
So, in summary, either one is sufficient for recovery purposes; you don't need both.
In the BDE project I'm working on for my corporate overlords, I only generate a numerical recovery key, which gets backed up to Active Directory, and rely on a TPM module to store the encryption keys to unlock the drives for the end-user. Works fine, but actually inputting a 48 character string with the function keys on a computer is a bit more pain than I like to inflict on myself, so if I had it to do over, I might rely on Recovery Key files instead, for whatever that's worth.
HopelessN00bHopelessN00b49k2525 gold badges121121 silver badges194194 bronze badges