Salta al contenuto principale

Bitlocker Solution for True Image 2015 Recovery Media

Thread needs solution

There is a problem with the the Acronis Recovery media for True Image 2015 build 6525. It is not able to image only the used portion of Bitlocker locked disks. Instead, it does a sector by sector backup which results in a backup file as large as the full capacity of the original disk.

There is a workaround available using WinPE. The locked volume can be unlocked from a command prompt in WinPE using manage-bde.exe. In order for manage-bde.exe to work, you need to add some WinPE optional components to the WinPE build. The easiest way to do this is to use MustangPE. Download the version you want to use from the link in my signature below. Follow the instructions in the ReadMe.txt files. Also download the True Image plugin for the version of TI you want to use. Follow the instructions in the ReadMe.txt file in the plugin.

You need to copy the following text and place it in the AddPackages.ini file:

For x86 MustangPE use this text:

[Packages]
package1=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\WinPE-WMI.cab
package2=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\en-us\WinPE-WMI_en-us.cab
package3=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\WinPE-EnhancedStorage.cab
package4=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab
package5=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\WinPE-SecureStartup.cab
package6=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab

For x64 MustangPE use this text:

[Packages]
package1=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-WMI.cab
package2=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-WMI_en-us.cab
package3=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-EnhancedStorage.cab
package4=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab
package5=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-SecureStartup.cab
package6=C:\Program Files (x86)\Windows Kits\8.1\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab

Build MustangPE with the TI plugin and put it on a CD or USB flash drive. Boot the computer with MustangPE. Open a command prompt and use manage-bde.exe to unlock the encrypted volume. Some example follow:

1. manage-bde -unlock C: -pw (Where C: is the dive letter in WinPE for the locked volume. You can use the available A43 File Manager to help find the correct drive letter. It will show the volume label, but will not show you any contents.)

You will be aked for the password to unlock the volume. Key it in and hit the enter key. You should be told the volume was successfully unlocked.

2. manage-bde -unlock C: -RecoveryPassword 111111-222222-333333-444444-555555-666666-777777-888888 (This is the numerical password found in the Bitlocker -------------.txt file if you saved the recovery information to a USB flash drive.)

3. manage-bde -unlock C: -RecoveryKey "Full path and name of the .bek file" (This files can be found on the USB flash drive. You need the quotes only if there are any spaces in the path to the file.

4. manage-bde -unlock C: -cert -cf "Full path and name of the certificate file"

5. manage-bde -unlock C: -cert -ct "Path to the thumbprint"

After the volume is unlocked you can use True Image to backup the drive or volume. It will be backed up in an unencrypted state. You may password protect or encrypt the backup if you wish.

When you are done, you can lock the volume at the command prompt as follows:

manage-bde -lock C:

0 Users found this helpful

How do you work around when a Acronic .tib backup for restore purposes when the .tib is in a folder on a drive that is itself encrypted with bitlocker?

You should be able to use the WinPE created with instructions in the first post and unlock the encrypted drive before starting the restore process.

@Mustang: how to create the perfect Acronis True Image 2016 startup usb thumbdrive, so I can unlock my Samsung 850 SSD EVO?

The SSD is encrypted with Samsung magicia Endrypted Drive enabled. The drive is hardware encrypted with Windows 10 pro Bitlocker. This took some seconds.

Right now I cannot restore a Acronis TI 2016 made backup.

Thank you!

I have never dealt with hardware encryption. I tend to stay away from things that have the potential to make my life difficult. The only suggestion I have is to make the Acronis WinPE recovery media. Boot it and try to do a backup using the sector by sector option. Then try a restore. It may not work, but that's all I have to offer.