Providing a user with a recovery key for hard drives encrypted with BitLocker
To send a user a recovery key for a system hard drive that was encrypted using BitLocker:
Open the Kaspersky Security Center Administration Console.
In the Managed devices folder of the Administration Console tree, open the folder with the name of the administration group that includes the computer of the user requesting access to the encrypted drive.
In the workspace, select the Devices tab.
On the Devices tab, select the computer belonging to the user requesting access to the encrypted drive.
Right-click to open the context menu and select Grant access in offline mode.
The Grant access in offline mode window opens.
In the Grant access in offline mode window, select the Access to a BitLocker-protected system drive tab.
Prompt the user for the recovery key ID indicated in the BitLocker password input window, and compare it with the ID in the Recovery key ID field.
If the IDs do not match, this key is not valid for restoring access to the specified system drive. Make sure that the name of the selected computer matches the name of the user's computer.
Send the user the key that is indicated in the Recovery key field.
To send a user a recovery key for a non-system hard drive that was encrypted using BitLocker:
Open the Kaspersky Security Center Administration Console.
In the Administration Console tree, select the Additional → Data encryption and protection → Encrypted devices folder.
The workspace displays a list of encrypted devices.
In the workspace, select the encrypted device to which you need to restore access.
Right-click to display the context menu and select Get access to the device in Kaspersky Endpoint Security for Windows.
This opens the Restore access to the disk encrypted with BitLocker window.
Prompt the user for the recovery key ID indicated in the BitLocker password input window, and compare it with the ID in the Recovery key ID field.
If the IDs do not match, this key is not valid for restoring access to the specified drive. Make sure that the name of the selected computer matches the name of the user's computer.
Send the user the key that is indicated in the Recovery key field.