Skip to Content

Computer Encryption Re-image Process

How to Decrypt, Re-Image, then Re-encrypt a Previously Encrypted Computer

Important:  Factors to Consider Before You Begin

  • Only computers that have been previously encrypted by ITAC are eligible to follow this re-encryption process.
  • Decryption can take 6+ hours to complete, regardless of the operating system (OS).
  • Full encryption can take 8+ hours to complete, regardless of the OS.

Windows OS Computers

Decrypting prior to re-imaging is always the preferred method. However, to date, ITAC has not encountered any issues with re-imaging an encrypted Windows device, as long as it has a standard hard disk drive (HDD).

Warning Triangle Important: A self-encrypting drive (SED) must be decrypted prior to re-imaging. Failure to do so could render the drive inoperable. If you are unsure if you have an SED, contact ITAC before you re-image the device.Warning Triangle

Follow these instructions for Windows Computers:

  1. Complete and submit a Re-image Encrypted Computer Request form.
  2. You will be provided with an ITAC service request ticket number.
  3. Re-image the computer.
  4. Bind the computer to the domain, and confirm that Software Center is populated.
  5. Ensure that TxState Client Administrators have Local Admin access to the device.

Note: ITAC must be provided with this access to be able to fully support the device.

  1. Once the request is received and steps 2-5 above are completed, ITAC will work with the requester to re-encrypt the device.

Mac OS Computers

Follow these instructions for Mac Computers:

  1. Complete and submit a Re-image Encrypted Computer Request form.
  2. You will be provided with an ITAC service request ticket number.
  3. As a Local Administrator, move forward with decrypting FileVault.

Important Note: It is very difficult to re-image an encrypted Apple computer; therefore, you should always decrypt before re-imaging.

  1. Re-image the computer.
  2. Install LANrev.
  3. Reply to the ticket e-mail, and an ITAC agent will work with you to encrypt the computer.
  4. Add a standard account to the device (named exactly as shown): ITAC-Support

Note: Create any password that you prefer for this account. ITAC must be provided with the ITAC-Support standard account to be able to fully support the device.


Other Operating Systems (OS)

An approved Texas State Device Encryption Exception Request (PDF) form must be on file with ITAC for each device that does not have a Windows or Mac OS.