1948 - SecureDoc removal with SDBat utility

Prev Next

SecureDoc Decryption and Boot Logon Removal

This article outlines the steps required to decrypt a SecureDoc-encrypted disk and remove Boot Logon using scripting tools provided by WinMagic. It also includes instructions for executing these tasks locally and across a network.

NOTE to Support and PSE Staff: Before this information can be released, the customer must sign a Non-Disclosure Agreement (NDA).

Pre-requisites:

  1. A SecureDoc encrypted computer.
  2. SecureDoc 8.3 and later
  3. User running the SDBat.exe command needs to have Windows Admin rights.

The executable being used to run the script will be SDBat.exe, and the configuration file that contains the script will be AutoLogin.ini. Both files are in C:\Program Files\WinMagic\SecureDoc-NT

Step 1: Decrypt the disk

Scripting options

Keyword

/D - Decrypt w/ Thorough mode (slow)

/H - Decrypt w/ Standard mode (fast)

Command

Decrypt disk. (Thorough mode)

Prototype

SDUTIL HDx /D "[Key ID]” [/Hide]

Example

SDUTIL HDA /D "” /Hide

Function

Decrypt all hard disk or hard disk number x.

"HDA” means all hard disk. "HDx” means hard disk number x.

Parameter

"Key ID” is empty. It will use default key to decrypt.

/Hide – don't show progress bar during the conversion process. The default is to show progress bar if ‘/Hide' is not in command line.

✅ Preparation

  1. Ensure you have a valid admin key file (e.g., Administrator.dbk) capable of decrypting the drive.
  2. Copy AutoLogin.ini and rename it (e.g., Decrypt.ini).

Graphical user interface  Description automatically generated

  1. Edit Decrypt.ini with the following command: SDUTIL HD1 /D /KEYFILE "path to Administrator.dbk" /PWD "Password1"
  2. Save the file with UTF-16 LE encoding.

A screenshot of a computer  Description automatically generated

🔧 Decryption Command Syntax

From an elevated Command Prompt, cd to the WinMagic\SecureDoc-NT, where the SDBat.exe and configured Decrypt.ini files are located, and run sdbat.exe decrypt.ini. See screenshot below

Text  Description automatically generated

The disk conversion windows should appears as shown below. Once decryption completes, proceed to remove Boot Logon before rebooting. Failure to do so may trigger re-encryption.

Graphical user interface, text, application  Description automatically generated

🚫 Step 2: Remove Boot Logon

Keyword

/V

Command

Remove boot logon or remove software package.

Prototype

SDUTIL /V [/RemoveBL] [/RemoveTestPKG] [/RemoveSDPKG]

Example

SDUTIL /V /RemoveBL

Parameter

If there is no parameter, it will take remove boot logon as default. 
/RemoveBL – Set flag in MBR and remove boot logon after reboot. 
/RemoveTestPKG – Remove test package. 
/RemoveSDPKG – Remove SecureDoc package.

✅ Instructions

  1. Make another copy of AutoLogin.ini and rename it (e.g., RemoveBL.ini) and edit RemoveBL.ini with the following line: SDUTIL /V /RemoveBL /Force.

Graphical user interface, text, application  Description automatically generated

  1. Save the file with UTF-16 LE encoding.
  2. Run the script: sdbat.exe removebl.ini

The device will reboot automatically after Boot Logon is removed.

📌 Note for Legacy Boot Devices

For legacy systems, configure the profile to use V4 Boot Logon. Push the updated profile to selected devices, ensure communication with the SecureDoc server, and restart the device to apply changes.

Graphical user interface, text, application  Description automatically generated

🌐 Scripting Over a Network

To perform decryption remotely, push the modified AutoLogin.ini file to C:\Program Files\WinMagic\SecureDoc-NT on the target device using standard deployment tools (e.g., MS SMS, ZENworks). On the client machine, use an elevated Command Prompt to execute C:\Program Files\WinMagic\SecureDoc-NT\SDBat.exe AutoLogin.ini

⚠️ Note: SDBat.exe is already present in the SecureDoc-NT folder and does not need to be copied.