You may be considering cloning an encrypted disk in order to provide a standardized image for other endpoint devices.
Here are some things you should consider before doing this.
First, and probably most serious in terms of security, all devices descended from the original image will be protected by exactly the same encryption key.
Second, initially at least, all these devices will start off with exactly the same Windows device name.
Third, the key name that will protect each device will have no similarity to the device name.
1279 Things to consider when imaging computers from post-encryption hard disk images
- Updated on Feb 6, 2026
- 1 minute(s) read
- VN
Was this article helpful?