logo
logo
  • Home
  • Power Sources and Cables
  • Phones
  • Office Tech
  • Smart Home Devices
  • Wearable Tech
  • Rising Tech
  • Computers

How to Reset and Remove Encryption on a Windows PC

Omair Khaliq Sultan
Written By Omair Khaliq Sultan
Original Publish Date: May 21, 2025, 10:42 AM
Last updated: Jun 2, 2025, 03:21 PM
Disclosure ↓
how to reset encrypted data on a pc
View all Contents
  • First, Confirm What Encryption You’re Dealing With
  • Backing Up Your Recovery Key Comes First
  • Turning Off BitLocker and Decrypting Your Drive
    • Graphical Decryption
    • Command Line Approach
  • Clearing the TPM Module (If You Plan to Re-Encrypt or Reinstall)
  • When You Can’t Decrypt—Wiping and Resetting the PC
    • Using Windows Installation Media
    • Performing a Full System Reset in Windows
  • Planning for Tomorrow: Re-Encrypting and Safe Practices
  • A Few Final Words of Caution

Every day, more users turn on full-disk encryption to protect personal or corporate data from prying eyes. On Windows PCs, BitLocker is the default choice for many, while some use alternative tools like VeraCrypt or Symantec Endpoint Encryption. But what happens if you need to reverse course—if you want to remove encryption, clear the drive, or start fresh? Whether you’ve forgotten a password, inherited a machine, or simply want to reformat without leftover encryption metadata, the process of “resetting” encrypted data can be daunting. Below is a thorough, human-friendly guide to navigating this safely.

First, Confirm What Encryption You’re Dealing With

Before pressing any keys, it’s crucial to understand exactly how your drive is encrypted. On most modern Windows installations, full-disk encryption is managed by BitLocker. If you’re running Windows 10 Pro, Enterprise, or Education, BitLocker will often appear as “BitLocker Drive Encryption” in the Control Panel. On newer devices—particularly those shipped with Windows 11 Home—“Device Encryption” under Settings > Privacy & Security is essentially a simplified version of BitLocker. If you don’t see either entry, or if you originally set up encryption using a third-party utility (VeraCrypt, Sophos, etc.), you’ll need to consult that vendor’s documentation for decrypting or removing their specific safeguards.

To check quickly for BitLocker:

• Open Settings, then navigate to Privacy & Security.
• Look for “Device Encryption.” If it’s active, you’ll see an on/off toggle or a message indicating the drive is protected.
• If you have Windows Pro or higher, type “Manage BitLocker” into the Windows search bar. The resulting window will show each drive’s encryption status, letting you know whether decryption is required.

If your workstation is joined to a corporate domain or managed over Azure AD, your encryption might be centrally controlled. In that case, you may have to contact your IT department to verify policies before proceeding.

Backing Up Your Recovery Key Comes First

Even if you think you have the correct password or PIN, always secure the recovery key before attempting any changes. Without this key, you cannot decrypt or disable BitLocker and risk losing all data. Recovery keys might reside in any of the following locations:

  • Your Microsoft Account: If you enabled BitLocker while signed in with a Microsoft account, the recovery key should be saved automatically to your online account. You can retrieve it by visiting https://account.microsoft.com/devices/recoverykey from any web browser.
  • USB Flash Drive: Many users are prompted during setup to save their key to a USB stick. Check any labeled drives—especially those marked “BitLocker Recovery Key.”
  • Printed Copy: If you opted to print a paper copy, locate that document and keep it handy.
  • Corporate Escrow (Active Directory or Azure AD): In enterprise settings, BitLocker recovery keys may be stored in your organization’s directory services. Your IT support team can help locate the correct key tied to your machine’s hardware ID.

If you cannot find the recovery key anywhere, you won’t be able to decrypt the drive normally; instead, you must prepare to wipe everything (more on that shortly).

Turning Off BitLocker and Decrypting Your Drive

Assuming you have the recovery key, the simplest path is to let Windows remove BitLocker protection and decrypt all data in one go. This can be done via the graphical interface or with a command-line tool:

Graphical Decryption

Go to Control Panel > System and Security > BitLocker Drive Encryption. Click “Turn off BitLocker” next to the encrypted volume and confirm your choice. Windows will begin decrypting. Depending on the drive’s size and your hardware speed, this could take anywhere from minutes to hours. Once complete, BitLocker will report the volume as fully decrypted, and the recovery key becomes inactive for that drive.

Command Line Approach

Open a Windows Terminal or Command Prompt as Administrator. Type manage-bde -status to view each volume and its encryption percentage. To start decryption, run manage-bde -off C: (replacing “C:” with the letter of your encrypted partition). You can monitor the process by running manage-bde -status again until it reports 0% encrypted. Either route achieves the same goal: BitLocker is disabled, the drive is decrypted, and you now have a “clean slate” to work with.



Clearing the TPM Module (If You Plan to Re-Encrypt or Reinstall)

The TPM (Trusted Platform Module) stores encryption keys and related credentials for BitLocker. If you intend to re-enable BitLocker later, or if you’re installing a fresh copy of Windows, it’s best practice to wipe the TPM so that old keys cannot interfere with new ones. Here’s a general approach:

  1. Reboot your computer and enter the BIOS/UEFI setup (commonly by pressing F2, F10, Delete, or Esc during the initial startup screen).
  2. Find the section labeled Security or Advanced, then select TPM Security (it could also appear as “Security Chip” on some systems).
  3. Choose the option to Clear or Reset TPM, and confirm. This action erases all existing TPM keys—so ensure you’ve backed up any data protected by BitLocker or any other TPM-based encryption.
  4. Save your changes and exit. Windows may later prompt you to re-initialize the TPM the next time it boots.

When You Can’t Decrypt—Wiping and Resetting the PC

If your recovery key is irreversibly lost, you have no way to restore the encrypted data. The only remaining path is to wipe the drive completely—deleting every bit of information, encrypted or not. There are two common methods:

Using Windows Installation Media

  1. Create a bootable USB installer for Windows using Microsoft’s Media Creation Tool.
  2. Boot from that USB drive, choose your language preferences, and click “Next.”
  3. At the first setup screen, press Shift + F10 to open a command prompt (or use the “Repair your computer” option and then select “Command Prompt”).
  4. Type diskpart and press Enter. In the DiskPart shell, run:
    list disk
    select disk X
    (replace X with the number of your system disk)
    list partition
    select partition Y (replace Y with the encrypted partition number)
    delete partition override
  5. After exiting DiskPart, close the command prompt and continue with the Windows installer. The setup process will recreate whatever partitions it needs and install a fresh, unencrypted system.

Performing a Full System Reset in Windows

  1. If you can still boot into Windows but cannot decrypt, go to Settings > System > Recovery (in Windows 11) or Settings > Update & Security > Recovery (in Windows 10).
  2. Select Reset this PC, then choose Remove everything. If BitLocker is still active, Windows will prompt for your recovery key. If you can’t provide it, the reset process will proceed by reformatting the drive entirely—erasing all existing data.
  3. Follow the on-screen instructions to complete the reset. This effectively gives you a brand-new installation, free of any traces of the previous encryption.

Planning for Tomorrow: Re-Encrypting and Safe Practices

Once you’ve decrypted or wiped your drive, you may want to reapply encryption, provided you’ve addressed whatever issue forced the reset in the first place. Here are some guidelines:

  • Re-enable BitLocker (or Another Encryption Solution):
    After reinstalling Windows, open Settings > Privacy & Security > Device Encryption (or “Manage BitLocker”) and turn on encryption again. Walk through the prompts to generate a new recovery key, and save it in multiple places: your Microsoft account, a USB drive, and a printed copy locked in a safe.
  • Use Strong Passphrases and Store Keys Safely:
    Choose a password that mixes letters, numbers, and symbols—something you can remember but isn’t easily guessed. If you’re using a PIN, make it at least six digits long and avoid obvious sequences. Store your recovery key in more than one place—ideally offline in a secure location. Cloud storage is convenient, but if that account is ever compromised, you lose both your data and your keys.
  • Keep Firmware and Drivers Up to Date:
    TPM firmware occasionally receives updates from your motherboard manufacturer or the PC vendor. Keeping that firmware current helps avoid compatibility hiccups if you clear and reinitialize the TPM. Likewise, update your storage-controller and chipset drivers. A mismatched driver can sometimes interfere with BitLocker’s ability to unlock a volume.

A Few Final Words of Caution

You Cannot Recover a Lost Key: If you proceed without a valid recovery key, simply accept that everything on the drive will be gone forever. There is no “backdoor”—encryption works.

Clearing the TPM Destroys Old Keys: Do not clear the TPM unless you are certain no information on that chip is still needed. If you clear it while still relying on an existing BitLocker key, you lock yourself out.

Corporate or Managed Devices: If your PC belongs to a company, your organization might require a specific procedure or a central IT policy to decrypt or wipe drives. Always check with IT support before making any irreversible changes.

Third-Party Encryption: If you used VeraCrypt or another tool instead of BitLocker, follow that software’s official guidance. The general flow is the same—decrypt if possible, or wipe if not—but each tool will have its own commands and interface.

By following these steps carefully—first identifying your encryption method, backing up keys, decrypting or wiping when necessary, and then re-encrypting responsibly—you can regain full control over your PC without leaving sensitive remnants behind. It may feel overwhelming at first, but each stage is straightforward when tackled in order. Once you’ve been through it, you’ll have the confidence to manage encryption on any Windows computer, secure in the knowledge that you can reset your drive whenever circumstances demand it.

Your Trust, Our Core Commitment

At Rising Tech, earning and maintaining your trust is the cornerstone of our mission. We're dedicated to transparency, impartiality, and the relentless pursuit of truth in every article, review, and recommendation we publish. Our commitment to these principles ensures that you, our valued reader, are always equipped with reliable and unbiased information. Let us be your trusted guide in the ever-evolving world of technology.

Contributors

Omair Khaliq Sultan
Omair Khaliq Sultan
Omair is a certified strength coach with a specialization in Powerlifting-style training and sports rehab. He also has a keen interest in tech, music, and cooking. When he's not working, you'll probably find him lifting weights, noodling on his guitar, perfecting his smash burger recipe, or watching tech reviews on YouTube.
Computers FAQ Guides
Related Reads
  • Fix Your Computer Yourself and Save Some Cash – Here’s How
  • The Best Internet Security Software of 2025
  • 6 Must-Have Laptop Accessories That Increase Privacy and Security
  • How to Format a USB Drive That Doesn’t Show Up on Your Computer
  • The Best USB to USB-C Adapters of 2025
  • How to Increase Data Transfer Speed from CPU to GPU
  • How to Protect Yourself from Credit Card Fraud: Essential Tips for Staying Safe
Back to top
logo

©2025. All Rights Reserved

  • About Us
  • FAQ
  • Contact Us
  • Privacy
  • Terms
Contact

contact@risingtech.org

We independently research, test, review, and recommend the best products. If you buy something through our links, we may earn a commission at no cost to you. Click here to learn more about our process.