Removing Encryption from a machine using the Endpoint Encryption Management Console: BEFORE LOGGING INTO THE CONSOLE - Make sure that you receive an email from the user's school email address as proof…
Use of this procedure is entirely at your own risk This procedure and the application “Wintech” if used incorrectly can and will cause irrecoverable data loss Howto: fix bad MBR (Master Boot…
Use of this procedure is entirely at your own risk This procedure and the application “Wintech” if used incorrectly can and will cause irrecoverable data loss Howto: Recover Data from an Encrypted…
To use either of the wintech or safetech recovery tools you will need to obtain a code of the day.. To obtain the code of the day you will need to log…
Taken from Appendix A of the deployment documentation... Removing / re-installing the encryption software Once installed the encryption software cannot be removed by the end user or school. To remove the…
This FAQ explains what to do if a laptop protected by the encryption service is lost or stolen. Be reassured with the fact that all of your data on that device is…
Who in a school can ask for a user recovery, i.e password reset... Ideally the user themselves should ring the Service Desk if they have problems with logging onto their laptop. Where…
If your users use a domain user at school and a local user at home when logging onto their laptop they face the following issues... Background: The first ever time an encryption…
You maybe worried about what happens to your encrypted device during the school holidays. Especially over Summer when it may not be used for over six weeks. Possible issues which may arise:…
Scenario – A device will not boot and displays an "Isolation period had expired" error message… Note: If you are a customer with this issue please telephone the Service Desk on 01392 385300…
Question: How are updates to the devices configuration applied, e.g. assigning a new user to a machine. Answer: Every time an encrypted device boots1, and after a set period of time2, the…
Summary: If you receive an error when attempting to login saying: "The isolation period has expired." you will need to log a call with the Service Desk who will follow this process...…
Question: Can I take an image of an encrypted device, i.e with Ghost? Answer: Any standard imaging tool should work with an encrypted device. However, because the whole of the disc (including…
Question: I’ve been looking at how we get onto an encrypted laptop as a local administrator. Is there a better way than the following: log on to the laptop with one of…
Question: Is there a a way of seeing a list of users assigned to a particular laptop? Answer: There is currently no way of seeing which users are assigned to a device…
Question: On going into the User Maintenance Wizard and choosing Refresh from Central Database, some of our users aren't listed. Why is this? Answer: Users which aren't shown in the list are already…
Question: The Secondary School Deployment Guidelines suggests that if a member of the ICT team has a laptop, then they need to have a normal user account as well as an admin…
Question: Can I relax the password policy used by the Scomis Encryption Service for my school so that my users have simpler password to remember? Answer: No; the password policy in place is…
Note: Don't forget to log a call before re-encrypting a recovered/re-imaged device so that you don't create a duplicate device. Problem: When imaging an encrypted device with WDS you might find that it appears to…
Please note that pre-requisites for installing encryption onto a mobile device require it to be fully backed up. We also recommend that (as with any date stored on a computer) the data…
We have found a small number of recent Toshiba Notebooks have problems with the Scomis Encryption Software with their default BIOS configuration and revision. With any installation you will backup your data…
Summary Under certain conditions, an anti-virus scanner can lock the Endpoint Encryption File System. This can cause data corruption as Endpoint Encryption attempts to to write data to the file system. To avoid this, exclude the…
To enable visually impaired users to easily use an laptop once it has been encrypted you need to contact the Service Desk. We can make a change to the device configuration which…
Scenario – A Customer is unable to log onto their encrypted device because they have forgotten their password… Note: If you are a customer who has forgotten your password please telephone the…