Technical support

Knowledgebase: Full Disk Encryption
How do I decrypt a Legacy BIOS Workstation that is unable to boot Windows?
Article ID: KB281 email a link to this article

To decrypt a Managed Legacy BIOS Workstation, you must boot the Workstation using Ubuntu 18.04 and follow the instructions below to decrypt the disk(s).

In order to decrypt the Workstation, you will need the following:

  • For a Managed Workstation, you must have the FDE Admin credentials for the specific Workstation.
  • For a Standalone Workstation, either the FDE User or the FDE Admin credentials can be used.
  • This process requires a working Internet connection, a blank USB device (2GB or larger) and a keyboard & mouse.

If the data on the Workstation is important, ensure a full sector-by-sector backup of the existing hard drive(s) has been taken before attempting recovery.

Obtaining the Ubuntu ISO

The following instructions provide a way to use the 64-bit version of Ubuntu and run the Recovery tool. As this is a Live CD environment, you will need to perform these instructions again if you need to reboot at all. 

You will need to download the following Ubuntu ISO:

Please note, the instructions below may not work on other versions of Ubuntu or other flavours of Linux.

Creating a bootable Ubuntu USB device

Please follow the link below which outlines the process of running Ubuntu from a USB memory stick.

Booting Ubuntu on the Workstation

You will now need to boot from the USB stick, this may require you to change the Boot settings in the BIOS. On some devices, you may be required to hold down keys or buttons to access the BIOS. You should consult the devices instruction manual or manufacturers website. If your system contains hardware devices, such as WiFi or Ethernet adapters, that are not supported by this version of Ubuntu, then you may need to find alternative hardware that is supported.

Ensuring the USB device is connected to the machine, turn the machine on and, depending on the make/model, hold the correct key combination to access the boot menu. Select the USB device from the list to boot from it.

When Ubuntu first boots, choose Try Ubuntu without installing as shown below

Try Ubuntu

Starting the recovery process in Ubuntu

Once at the Ubuntu Desktop, ensure your keyboard and mouse work correctly.

If necessary, connect to a WiFi network using the WiFi (fan shaped) icon near the top right corner of the screen. 

Next, either press Ctrl+Alt+T to launch a Terminal window, or click the Ubuntu icon in the top left corner

Ubuntu Icon

Then in the Search box that appears, type term and press Return

Ubuntu Search

In the Terminal window, type wget and press Return

ubuntu@ubuntu : ~ $ wget

This will download a script file, displaying output similar to to the image below:

Resolving (
Connecting to (||:80...
HTTP request sent, awaiting response... 200 OK
Length: 1321 (1.3K) [application/x-sh]
Saving to: ''              100%[=====================>]   1.29K  --.-KB/s   in 0s

2019-01-01 00:00:00 (91.1 MB/s) - '' saved [1321/1321]

Next, type bash and press Return

ubuntu@ubuntu : ~ $ bash

The script will display the following text, followed by a lot of output as it downloads, installs and sets up required components:

Downloading ESET Endpoint Encryption Recovery Tool
Download successful
Downloaded file appears correct
Adding 32-bit Support
Updating Software DB

Once complete, you should see the following:

Soft Linking libparted

Download script complete. Please continue following the KB article.

Now we can run the Recovery Tool.

Type sudo ./dlprecovery -s and press Return

ubuntu@ubuntu : ~ $ sudo ./dlprecovery -s

If everything was installed correctly, the recovery tool will run and you will see the following:

ESET Endpoint Encryption FDE Recovery Tool
Version 1.10.0 (Build 42)
Copyright (c) ESET, spol. s r.o.

This software is bound by the standard Licence Agreement terms

Press Return to continue

From here, follow the on-screen instructions to decrypt the Workstation.

We use cookies on our website to enhance your browsing experience. Read more