|Recover access with Challenge/Response|
For more information, see About roles and sub-estates.
The key recovery file is used to initiate the Challenge/Response procedure on the endpoint computer when the Power-on Authentication is corrupt and the user cannot log on to the computer. The key recovery file must be exported. To initiate a Challenge/Response procedure when the Power-on authentication is corrupt, see the Sophos Disk Encryption tools guide.
To export the key recovery file: