Encryption Compatibility with the Datto Solution

Topic

This article explains the potential limitations of backing up and restoring operating systems that use hard drive encryption. This article also provides an FAQ about the types and methods of encryption used by Datto.

Environment

  • Datto SIRIS
  • Datto ALTO
  • Datto NAS

Description

Using active disk encryption on a host protected by a Datto device can potentially create a situation in which one or more encrypted files cannot be fully restored. It can also limit the Datto appliance's access to back up key files on the host operating system needed to create a bootable virtualization. Because many different types of encryption products exist, we recommend that you perform thorough compatibility testing before you are in a disaster recovery scenario.

NOTE  Datto Technical Support cannot make specific compliance-related recommendations.

Common Encryption Types

File-Level Encryption - Files using this type of encryption can often be restored by a Datto appliance. The health of a protected server, such as corruption on the server's hard drive, can affect the decryption capabilities of file-level encryption.

Full-Disk Encryption - If your server uses a full-disk encryption product, such as BitLocker or TrueCrypt, the machine is in a decrypted state when your Datto appliance backs it up. As a general rule, disk-level encryption solutions which perform decryption at a low level, before the operating system is completely loaded, will work with the Datto solution.

However if the encryption solution is dependent upon a running application or driver within the operating system, it's much less likely to be compatible. Datto recommends performing periodic Local Virtualizations and File Restores to test the boot and restore integrity of full-disk encryption backups.

Encrypted Windows Boot Files - Datto does not recommend encrypting Windows boot files, because this type of encryption might affect the bootability of the protected system in a restore scenario.

If you are concerned about the security of your data during its transfer between the protected system and the Datto appliance, consider encrypting the data with SIRIS encryption (login required).

Restoring Machines with Encryption

Depending on the level of encryption in use on the production machine, restore options may be more limited in nature. If the encryption is at the drive level, and the drive is unlocked, or we are able to back it up in an unencrypted state, there should be no limitation on restores.

If you are backing up a volume using file-level or block level encryption, certain granular restores such as file restores will not work properly. If the machine you are restoring data to has the same encryption software as the source then iSCSI-based restores, such as our Direct Restore Utility, may allow the files to be decrypted, so long as the machine accessing the restore has the same software.

If EFS is in use, the restore would need to have the same local user or administrator role to match the file's owner or administrator of the file. If neither scenario is the case, than the only way to extract files would need to be done through virtualizing the agent, be it on the local device, on a hypervisor, or as a last resort, in the cloud.

Restore Type Compatibility Chart

Encryption File Restore Direct Restore BMR Image Export/ESX upload Virtualization (Local/cloud/hypervisor)
EFS X
7zip
VeraCopy X
TrueCrypt/VeraCrypt
Dm-crypt
Bitlocker

Additional Resources