Installing and Using Native Encryption Management
Native Encryption Management replaces Full Disk Encryption.
How to manage user acquisitions of mobile accounts using Full Disk Encryption on macOS 10.13 or later: sk122674.
SmartEndpoint Settings for Native Encryption Management
Only these settings can be used to manage the Native Encryption Management feature on the client:
-
Recovery
-
Full Disk Encryption - Native Encryption Recovery Media.
-
Full Disk Encryption - Native Encryption Remote Help.
-
-
User Acquisition
-
Full Disk Encryption - Pre-boot enforcement will begin after the acquisition process has acquired X user(s).
-
-
Volume Encryption
-
Only protection of the system volume is supported.
-
-
Deployment
-
Download Mac Client - select the Full Disk Encryption feature.
-
Password Reset and Data Recovery
You can help users recover FileVault-encrypted data if they can't log in to their Mac.
You can help users recover their data or reset their password using a personal recovery key that is unique to the client computer. Resetting the password can be done remotely.
Password Reset Using a Personal Key
If a user forgets the login password, the administrator can send a personal recovery key to the remote user, to allow them to log in. The key is a string of letters and numbers separated by dashes.

-
Find the serial number of the locked device. It is usually printed on the back of the device.
-
Give the serial number to the support representative.

-
Get the serial number of the locked device from the user.
-
In SmartEndpoint, select Users and Computers.
-
In Global Actions, click Native Encryption Recovery Media.
-
In the Native Encryption Remote Help window, type the Serial Number.
-
Click Get Recovery Key.
-
Give the recovery key to the user.

-
Get the Recovery Key from the support representative.
-
Restart the Mac.
-
In the FileVault pre-boot screen, click the ? button.
A message shows: If you forgot your password you can reset it using your Recovery Key.
-
Type the Recovery Key, and click ->.
progress bar shows.
-
For Local Users:
-
In the Reset Password window, the user enters a new password, and optionally, a password hint.
-
Click Reset Password.
-
How to update the Personal Recovery Key (PRK) for Native Encryption Management FileVault, see sk138352.
Mac Recovery Using a Personal Key
A personal key is unique to the client Mac computer or device. The key is a string of letters and numbers separated by dashes.
To recover a user's FileVault-encrypted Mac using the personal key, the administrator reads the key to the user, and uses the key to decrypt and unlock the computer.
To decrypt and recover the user's FileVault-encrypted Mac:

-
Show the disk volumes on the Mac. Run the command:
diskutil apfs list
The volume to recover is the OS Volume. It has a name similar to
disk2s1
. -
Run this command:
diskutil apfs unlockVolume <Diskname> -passphrase <Personal Recovery Key>
The volume is now unlocked.
-
Get the list of apfs cryptousers. Run:
diskutil apfs listcryptousers <Diskname>
For example:
diskutil apfs listcryptousers disk2s1
For a local user, select the UUID of the user that has:
Type: Local Open Directory User
-
Decrypt the volume. Run:
diskutil apfs decryptVolume <Diskname> -user <User UUID>
-
Enter the password of the local user.
-
To monitor progress of the decryption, run:
diskutil apfs list

-
Run this command:
diskutil cs unlockVolume <lvUUID> -passphrase <Personal Recovery Key>
-
The user interface shows a prompt to allow access.
Enter the keychain password.
The volume is now unlocked.
-
Start the decryption. Run:
diskutil cs decryptVolume <lvUUID>
-
When prompted, enter the password for the local user.
-
To monitor progress of the decryption, run:
diskutil cs list
The user can now reboot the Mac normally.
They do not see the FileVault pre-boot screen.
Installing the Server Hotfix for Native Encryption Management
You must install a Hotfix on the Endpoint Security Management Server to make it possible to manage native FileVault encryption.
The R77.30.03 Hotfix and the R77.20 EP6.2 Hotfix are available for download on the E86.20 home page.
|
Notes:
|

-
Take a snapshot of the Endpoint Security Management Server, to save a backup.
-
Transfer the Hotfix package to the Endpoint Security Management Server:
-
For the R77.30.03 Hotfix:
uepm_HOTFIX_FLUORINE_NEM_010.tgz
-
For the R77.20 EP6.2 Hotfix:
uepm_HOTFIX_R77_20_EP6_2_NEM_001.tgz
Important - Make sure to use the binary mode.
-
-
Connect to the command line on the Endpoint Security Management Server.
-
Log in to the Expert mode.
-
Create a temporary directory:
mkdir /home/admin/temp
-
Extract the Hotfix package files to the temporary directory:
-
For the R77.30.03 Hotfix:
tar -zxvf uepm_HOTFIX_FLUORINE_NEM_010.tgz -C /home/admin/temp/
-
For the R77.20 EP6.2 Hotfix:
tar -zxvf uepm_HOTFIX_R77_20_EP6_2_NEM_001.tgz -C /home/admin/temp/
-
-
Go to the temporary directory and run the installation file:
cd /home/admin/temp
-
Run the Hotfix installation file:
-
For the R77.30.03 Hotfix:
./uepm_HOTFIX_FLUORINE_NEM_010
-
For the R77.20 EP6.2 Hotfix:
./uepm_HOTFIX_R77_20_EP6_2_NEM_001
-
-
Reboot the Endpoint Security Management Server.