Disk Encryption Manager Reporting

There are 2 dedicated reports available in N-sight RMM for Disk Encryption Manager:

  1. Disk Encryption Report: Provides a graphical overview of Encryption Statuses and Encryption Enabled Vs Disabled by default. You can also opt to add Device and Volume details if required
  2. Recovery Key Report: Provides a list of ALL Recovery Keys and their associated Key ID / Protector ID / Recovery Key ID in one location. Often used when devices are removed/decommissioned from the dashboard, so that Recovery Keys are known for any drives still encrypted after turning off DEM. The report does not require the end-users to supply their Key ID / Protector ID / Recovery Key ID to be run. To provide a single Recovery Key to one end-user in the event they require it, please see: Provide a Recovery Key for an End-user

As the Recovery Key Report contains sensitive information and allows decryption of all listed devices, caution should be taken when assigning permissions to technicians to access and run the report.

Disk Encryption Report

To access the Disk Encryption Report:

  1. In the N-sight RMM dashboard select Reports > Managed Antivirus ReportsDisk Encryption Report. The Disk Encryption Report controls open in a new tab in your browser
  2. Select the target Clients, Sites, and Devices using the drop-down menus
  3. Tick the check box for Device Details and/or Volume Details if required
  4. Click Generate to create the report
  5. Once the report has generated, click Export PDF to create a PDF of the report if required

If you selected Device Details, Volume Details or both, these sections of the report show beneath the graphs and can be filtered to show only the information required by selecting or deselecting which columns to show.

To change the shown columns on a generated report:

  1. Click Columns to the upper right of the report section
  2. Tick or untick the columns as required

You can also export the Device Details and Volume Details sections to CSV by clicking CSV Export next to the Columns button to the upper right of the required report section.

Recovery Key Report

If you close your N-sight RMM (trial or full) account entirely then you will have to rely on your Recovery Key Report. Ensure you have produced the report and have saved this securely for future use before closing down you N-sight RMM account, as we do not store anything in this case.

If you delete your devices from N-sight RMM, the last known Recovery Key will be retained in the Recovery Key Report for 90 days only.

If you remove Disk Encryption Manager from devices, and they remain in N-sight RMM, you still have access to the Recovery Key Report which has the history of the last known Recovery Key before the device returned the control to the end user. Be aware, the end-user may have re-encrypted which would change the Recovery Key from what N-sight RMM last had on record.

In these scenarios, we highly recommended running the Recovery Key Report and storing it in a safe location before performing any other actions. Otherwise, you will not be able to access the Recovery Keys from N-sight RMM or Technical Support.

To access the Recovery Key Report:

  1. In the N-sight RMM dashboard select Reports > Managed Antivirus ReportsRecovery Key Report. The Recovery Key Report controls open in a new tab in your browser
  2. Select the target Clients, Sites, and Devices using the drop-down menus
  3. Tick the check box to Include removed devices (maximum 90 days) if required
  4. Click Generate to create the report
  5. Once the report has generated, click Export PDF to create a PDF of the report if required

If you selected to Include removed devices (maximum 90 days), this appears as a separate section within the generated report and both sections can be filtered to show only the information required by selecting or deselecting which columns to show. The Recovery Keys stored are the last known keys recorded by N-sight RMM – they could have changed as the end user has control of the removed devices and may have re-encrypted on their own.

To change the shown columns on a generated report:

  1. Click Columns to the upper right of the report section
  2. Tick or untick the columns as required

You can also export the Active Devices and Include removed devices (maximum 90 days) sections to CSV by clicking CSV Export next to the Columns button to the upper right of the required report section.

You will sometimes see multiple entries for the same device in this report, this happens due to the internal processes of BitLocker updating the encryption keys for a device (for example, in the event that the drive has been encrypted by BitLocker prior to implementing Disk Encryption Manager). As such, when a user needs the Recovery Key, the Protector ID offered by BitLocker during the boot will be one of any already used for the disk encryption on that device. To aid in this, the report lists all Protector IDs and Recovery Keys associated to the device.