GiliSoft Full Disk Encryption: Complete Setup and First-Time Use Guide
This guide walks you through installing, configuring, and performing your first full-disk encryption with GiliSoft Full Disk Encryption (GFDE). It assumes a Windows PC and that you want whole-drive protection for system and data partitions. Follow each step carefully to avoid data loss.
Before you begin — preparations (do these first)
- Backup: Create a full image or file backup of your system and important files to an external drive or cloud.
- Power: Ensure your laptop is plugged in or desktop has reliable power.
- Free space & health: Verify sufficient free disk space and run a disk check (chkdsk) to fix file-system errors.
- Recovery media: Create Windows recovery USB or system repair disc.
- Passwords: Choose a strong passphrase (12+ characters with mixed types) and store it securely in a password manager or printed copy kept safe.
- Note compatibility: Full-disk encryption is system-level; some multiboot setups, certain OEM recovery partitions, or older BIOS-only systems can complicate the process.
Step 1 — Download and install GiliSoft Full Disk Encryption
- Visit the official GiliSoft website and download the GFDE installer for your Windows version.
- Run the installer as Administrator.
- Follow the installer prompts:
- Accept license agreement.
- Choose installation folder (default is fine).
- Allow any driver or kernel-module installation if Windows prompts (required for disk-level encryption).
- Reboot if prompted.
Step 2 — Initial program setup and license activation
- Launch GiliSoft Full Disk Encryption as Administrator.
- If you purchased a license, enter your license key under the activation or registration area, then activate online.
- Allow the application to check for updates; install any recommended patches.
Step 3 — Configure encryption options
- Encryption algorithm: Choose AES-256 if available (strong and widely supported).
- Pre-boot authentication: Enable pre-boot login/password prompt—this prevents unauthorized booting.
- Key storage: Prefer passphrase-based keys; avoid storing keys in unencrypted files. If using a keyfile or USB key, ensure a backup exists.
- Rescue disk / recovery key: Generate and securely store the recovery key or rescue disk as recommended by GFDE.
Step 4 — Create a recovery/rescue medium
- Use GFDE’s built-in tool (or Windows recovery) to make a rescue USB or ISO.
- Store a copy in a secure external location separate from the computer.
- Record the recovery key on paper and keep it in a safe place.
Step 5 — Start full-disk encryption (first-time run)
- In GFDE, select the system drive (usually C:) and any other partitions you want encrypted.
- Confirm chosen encryption algorithm and authentication settings.
- Click “Encrypt” (or equivalent). The software will:
- Prepare pre-boot authentication.
- Begin encrypting the drive in the background or during a scheduled maintenance window.
- Monitor progress. Encryption speed depends on drive size and hardware (SSD vs HDD).
- Do not power off or interrupt the process. If a suspension occurs, use the recovery instructions provided by GFDE.
Step 6 — First reboot and pre-boot authentication test
- After encryption completes (or after a reboot during setup), the system should show a pre-boot login prompt.
- Enter your chosen passphrase to boot Windows.
- Verify:
- Windows loads normally.
- All files and applications are present.
- System performance is acceptable.
Step 7 — Verify encryption and create final checks
- In GFDE, confirm the encryption status shows “Encrypted” for each protected volume.
- Run a quick file access test (open several documents and apps).
- Check that Windows Recovery Environment still works (boot from recovery USB and ensure it recognizes the encrypted disk if needed).
- Make a second copy of your recovery key and store separately.
Troubleshooting common first-run issues
- Boot loop or inability to authenticate: Use the rescue disk or recovery key. If available, contact GiliSoft support with logs.
- Missing files after encrypting: Restore from your backup image; encryption itself should not delete files.
- Performance slowdowns: Ensure firmware/driver updates installed; check for background tasks. SSDs generally handle encryption with less slowdown.
- Windows update failures after encryption: Temporarily decrypt (if supported) or use GFDE’s maintenance mode before major updates, then re-encrypt.
Best practices after setup
- Keep regular backups, especially before OS updates.
- Store recovery keys in two secure, separate locations.
- Update GiliSoft regularly and apply Windows updates after confirming GFDE compatibility notes.
- Use strong, unique passphrases and change them periodically if your security policy requires it.
Quick checklist (final)
- Backup completed
- Recovery media & key created and stored
- AES-256 (or equivalent) selected
- Pre-boot authentication enabled and tested
- System drive encrypted and verified
- Secondary backups and recovery copies stored
Following these steps will give you a secure, fully encrypted disk with recoverable access if something goes wrong. If you need a tailored checklist for a multiboot or corporate deployment, tell me your environment and I’ll produce one.
Leave a Reply