This article will outline how to decrypt a drive with Symantec Endpoint Encryption remotely as well as manually.
It is not recommended to decrypt systems for most reasons. Decrypting will attempt to convert encrypted sectors to decrypted, and once decrypted, the system is in its most vulnerable state.
Decryption is also an irreversible process and should be done within a controlled environment to minimize exposure with your sensitive data.
Instead of decrypting, reach out to Symantec Encryption Support for guidance.
Even in recovery situations, it is always recommended to leave the system encrypted, and attempt to authenticate the disk you are working with.
In most cases, it is not necessary to decrypt. If you are sure decryption is the desired process, there are a few ways to address this.
Decryption can be done in three ways:
1. Local Method
TIP: Make sure the system is plugged into AC power in order to encrypt or decrypt systems.
1. First open the Symantec Endpoint Encryption Client Administrator from the Start menu:
Confirm the User Account Control dialog to permit the SEE Client Administrator to open.
2. Enter the credentials for the SEE Client Administrator:
3. Click the Internal Drives tab to see the disks available. On the right side, click the chevron expansion symbol to show all the disks.
Next, check the box next to the drive you wish to decrypt, and click "Decrypt":
Important tip: If you have multiple disks, such as a C: (boot) drive and a D: (data) drive, decrypt the D drive first:
4. The disk shows now be decrypting:
2. Server Commands Method to Decrypt a machine
WARNING: This is a highly sensitive setting and could result in all your machines being decrypted unintentionally. Do NOT modify any existing policies with this setting. Symantec recommends instead to decrypt systems on an as-needed basis using the local method.
In order to decrypt a system via the server commands, login go the SEE Management Console, find the machine using the Computer Status Report, right click the machine and then select the option to decrypt:
Once a machine is decrypting, it is not possible to reverse the process so proceed with extreme caution.
3. Using a Decryption Policy via GPO or SEE Native policy
WARNING: This is a highly sensitive setting and could result in all your machines being decrypted unintentionally. Do NOT modify any existing policies with this setting. It is always recommended to create separate SEE Native policy and assign designated machines to this policy for the sole purpose of decrypting. Symantec recommends instead to decrypt systems on an as-needed basis using the local method. If that is not possible, using the Server Commands and decrypting a single machine is then recommended. This option should be used only when using extreme caution.
Using the SEE Native policy, it is highly recommended to create a separate group to assign machines to for the sole purpose of decrypting.
Using a Remote Decryption policy to decrypt machines
WARNING: This is a highly sensitive setting and could result in all your machines being decrypted unintentionally. Do NOT modify any existing policies with this setting. It is always recommended to create separate GPO and assign machines to this GPO for the sole purpose of decrypting. Symantec recommends instead to decrypt systems on an as-needed basis using the local method. If that is not possible, using the Server Commands and decrypting a single machine is then recommended. This option should be used only when using extreme caution.