1
As suggested in Considerations when using imaging software with Endpoint Encryption software and reported by many experts in similar threads ( e.g. Clone McAfee encrypted partition to SSD ), Windows installed on properly cloned HDDs and SSDs used to start beautifully . . . until a few months ago.
Over the past several weeks I have tried many different cloning software and HDD / SSD duplicators (hardware) in vain to create usable carboncopies of encrypted HDDs / SSDs. (Windows OS does start but crashes halfway with a blue screen.) Does anybody happen to know if McAfee changed anything with respect to its endpoint disk encryption?
Why didn’t you suspend the encryption before you cloned the drive? – Ramhound – 2017-10-28T13:08:11.870
Thank you very much for your kind comment. I have been simply trying to follow remarks posted at ''Best practices for manually decrypting an encrypted hard disk with Drive Encryption/Endpoint Encryption for PC'' ( https://kb.mcafee.com/corporate/index?page=content&id=KB66433 ) which reads as follows.
quote
McAfee is not responsible for data loss from a Force Decryption. The product team recommends that you always perform a sector level backup (RAW/CLONE) of the hard drive to avoid data loss. Examples of products to use for sector level backup are Paragon, Acronis, or Ghost.
unquote