0x1 | [OK] |
[OK] |
0x2 | [ERR] |
[ERR] |
0x6 | Listing %1 New files added to this directory will be encrypted. |
Listing %1 New files added to this directory will be encrypted. |
0x7 | Listing %1 New files added to this directory will not be encrypted. |
Listing %1 New files added to this directory will not be encrypted. |
0x8 | Of %1 file(s) within %2 directorie(s)%3 are encrypted and %4 are not encrypted. |
Of %1 file(s) within %2 directorie(s)%3 are encrypted and %4 are not encrypted. |
0x9 | Setting the directory %1 to encrypt new files %0 |
Setting the directory %1 to encrypt new files %0 |
0xA | Encrypting files in %1 |
Encrypting files in %1 |
0xE | %1 file(s) [or directorie(s)] within %2 directorie(s) were encrypted. |
%1 file(s) [or directorie(s)] within %2 directorie(s) were encrypted. |
0xF | Setting the directory %1 not to encrypt new files %0 |
Setting the directory %1 not to encrypt new files %0 |
0x10 | Decrypting files in %1 |
Decrypting files in %1 |
0x14 | %1 file(s) [or directorie(s)] within %2 directorie(s) were decrypted. |
%1 file(s) [or directorie(s)] within %2 directorie(s) were decrypted. |
0x15 | Out of memory. |
Out of memory. |
0x16 | [Skipping %1] |
[Skipping %1] |
0x17 | %1!-*s!%0 |
%1!-*s!%0 |
0x18 | %1 |
%1 |
0x19 | %1: The file system does not support encryption. |
%1: The file system does not support encryption. |
0x1A | to 1 %0 |
to 1 %0 |
0x1B | Invalid drive specification: %1 |
Invalid drive specification: %1 |
0x1C | Error finding user certificate in Active Directory Domain Services |
Error finding user certificate in Active Directory Domain Services |
0x1E | Invalid Parameter: %1 |
Invalid Parameter: %1 |
0x1F | EFS certificate thumbprint for computer %1: %2 |
EFS certificate thumbprint for computer %1: %2 |
0x20 | Encrypted File(s) on your system: |
Encrypted File(s) on your system: |
0x21 | %1: Encryption updated. |
%1: Encryption updated. |
0x22 | Converting files from plaintext to ciphertext may leave sections of oldplaintext on the disk volume(s). It is recommended to use commandCIPHER /W:directory to clean up the disk after all converting is done. |
Converting files from plaintext to ciphertext may leave sections of oldplaintext on the disk volume(s). It is recommended to use commandCIPHER /W:directory to clean up the disk after all converting is done. |
0x23 | Please type in the password to protect your .PFX file: |
Please type in the password to protect your .PFX file: |
0x24 | Please retype the password to confirm: |
Please retype the password to confirm: |
0x25 | Passwords do not match. No certificate is generated. |
Passwords do not match. No certificate is generated. |
0x26 | Overwrite %1? (Yes/No): |
Overwrite %1? (Yes/No): |
0x27 | YN |
YN |
0x28 | Your .CER file was created successfully. |
Your .CER file was created successfully. |
0x29 | Your .PFX file was created successfully. |
Your .PFX file was created successfully. |
0x2A | Writing %1 |
Writing %1 |
0x2B | To remove as much data as possible, please close all other applications whilerunning CIPHER /W. |
To remove as much data as possible, please close all other applications whilerunning CIPHER /W. |
0x2C | 0x00 |
0x00 |
0x2D | 0xFF |
0xFF |
0x2E | Random Numbers |
Random Numbers |
0x2F | There is no local EFS certificate that is used to encrypt this file. Nolocal EFS certificate is backed up. |
There is no local EFS certificate that is used to encrypt this file. Nolocal EFS certificate is backed up. |
0x30 | There is no local current EFS certificate to be backed up. |
There is no local current EFS certificate to be backed up. |
0x31 | Your certificate(s) and the corresponding key(s) are being backed up. If you didn't start the process, press CANCEL. Press OK to confirm. |
Your certificate(s) and the corresponding key(s) are being backed up. If you didn't start the process, press CANCEL. Press OK to confirm. |
0x32 | EFS certificate(s) is(are) backed up successfully. |
EFS certificate(s) is(are) backed up successfully. |
0x33 | EFS certificate backup failed. |
EFS certificate backup failed. |
0x34 | EFS certificate and key backup. |
EFS certificate and key backup. |
0x35 | Please type the backup PFX file name. |
Please type the backup PFX file name. |
0x36 | Output PFX file path too long. Make it shorter and try again. |
Output PFX file path too long. Make it shorter and try again. |
0x37 | Users who can decrypt: |
Users who can decrypt: |
0x39 | No User found. |
No User found. |
0x3A | Unknown |
Unknown |
0x3B | Certificate thumbprint: %1 |
Certificate thumbprint: %1 |
0x3C | Recovery Certificates: |
Recovery Certificates: |
0x3D | No recovery certificate found. |
No recovery certificate found. |
0x3E | Key information cannot be retrieved. |
Key information cannot be retrieved. |
0x3F | Key Information: Algorithm: %1 Key Length: %2!d! Key Entropy: %3!d! |
Key Information: Algorithm: %1 Key Length: %2!d! Key Entropy: %3!d! |
0x40 | Compatibility Level: |
Compatibility Level: |
0x41 | Windows 2000 |
Windows 2000 |
0x42 | Windows XP/Server 2003 |
Windows XP/Server 2003 |
0x43 | Windows Vista/Server 2008 |
Windows Vista/Server 2008 |
0x44 | Windows 7 |
Windows 7 |
0x45 | Unknown Version |
Unknown Version |
0x46 | Adding user to files in encrypted folder %1 |
Adding user to files in encrypted folder %1 |
0x47 | Adding user to encrypted folder %1 |
Adding user to encrypted folder %1 |
0x48 | Adding user to files in folder %1 |
Adding user to files in folder %1 |
0x49 | User was added to %1 file(s) [or directorie(s)] within %2 directorie(s). |
User was added to %1 file(s) [or directorie(s)] within %2 directorie(s). |
0x4A | Enterprise Protected |
Enterprise Protected |
0x4B | Enterprise protected by: |
Enterprise protected by: |
0x4C | Enterprise key has been revoked. |
Enterprise key has been revoked. |
0x4D | Application Protected |
Application Protected |
0x50 | Removing user from files in encrypted folder %1 |
Removing user from files in encrypted folder %1 |
0x51 | Removing user from encrypted folder %1 |
Removing user from encrypted folder %1 |
0x52 | Removing user from files in folder %1 |
Removing user from files in folder %1 |
0x53 | User was removed from %1 file(s) [or directorie(s)] within %2 directorie(s). |
User was removed from %1 file(s) [or directorie(s)] within %2 directorie(s). |
0x54 | U %1 |
U %1 |
0x55 | E %1 |
E %1 |
0x56 | Updating EFS KEY from files in encrypted folder %1 |
Updating EFS KEY from files in encrypted folder %1 |
0x57 | Updating EFS KEY from encrypted folder %1 |
Updating EFS KEY from encrypted folder %1 |
0x58 | Updating EFS KEY from files in folder %1 |
Updating EFS KEY from files in folder %1 |
0x59 | EFS KEY was updated on %1 file(s) [or directorie(s)] within %2 directorie(s). |
EFS KEY was updated on %1 file(s) [or directorie(s)] within %2 directorie(s). |
0x5A | Displays or alters the encryption of directories [files] on NTFS partitions. CIPHER [/E | /D | /C] [/S:directory] [/B] [/H] [pathname [...]] CIPHER /K [/ECC:256|384|521] CIPHER /R:filename [/SMARTCARD] [/ECC:256|384|521] CIPHER /P:filename.cer CIPHER /U [/N] CIPHER /W:directory CIPHER /X[:efsfile] [filename] CIPHER /Y CIPHER /ADDUSER [/CERTHASH:hash | /CERTFILE:filename | /USER:username] [/S:directory] [/B] [/H] [pathname [...]] CIPHER /FLUSHCACHE [/SERVER:servername] CIPHER /REMOVEUSER /CERTHASH:hash [/S:directory] [/B] [/H] [pathname [...]] CIPHER /REKEY [pathname [...]] /B Abort if an error is encountered. By default, CIPHER continues executing even if errors are encountered. /C Displays information on the encrypted file. /D Decrypts the specified files or directories. /E Encrypts the specified files or directories. Directories will be marked so that files added afterward will be encrypted. The encrypted file could become decrypted when it is modified if the parent directory is not encrypted. It is recommended that you encrypt the file and the parent directory. /H Displays files with the hidden or system attributes. These files are omitted by default. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. Note: By default, /K creates a certificate and key that conform to current group policy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /N This option only works with /U. This will prevent keys being updated. This is used to find all the encrypted files on the local drives. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery key for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is generated. Note: By default, /R creates an 2048-bit RSA recovery key and certificate. If ECC is specified, it must be followed by a key size of 256, 384, or 521. /P Creates a base64-encoded recovery-policy blob from the passed-in certificate. This blob can be used to set DRA policy for MDM deployments. /S Performs the specified operation on the given directory and all files and subdirectories within it. /U Tries to touch all the encrypted files on local drives. This will update user's file encryption key or recovery keys to the current ones if they are changed. This option does not work with other options except /N. /W Removes data from available unused disk space on the entire volume. If this option is chosen, all other options are ignored. The directory specified can be anywhere in a local volume. If it is a mount point or points to a directory in another volume, the data on that volume will be removed. /X Backup EFS certificate and keys into file filename. If efsfile is provided, the current user's certificate(s) used to encrypt the file will be backed up. Otherwise, the user's current EFS certificate and keys will be backed up. /Y Displays your current EFS certificate thumbprint on the local PC. /ADDUSER Adds a user to the specified encrypted file(s). If CERTHASH is provided, cipher will search for a certificate with this SHA1 hash. If CERTFILE is provided, cipher will extract the certificate from the file. If USER is provided, cipher will try to locate the user's certificate in Active Directory Domain Services. /FLUSHCACHE Clears the calling user's EFS key cache on the specified server. If servername is not provided, cipher clears the user's key cache on the local machine. /REKEY Updates the specified encrypted file(s) to use the configured EFS current key. /REMOVEUSER Removes a user from the specified file(s). CERTHASH must be the SHA1 hash of the certificate to remove. directory A directory path. filename A filename without extensions. pathname Specifies a pattern, file or directory. efsfile An encrypted file path. Used without parameters, CIPHER displays the encryption state of the current directory and any files it contains. You may use multiple directory names and wildcards. You must put spaces between multiple parameters. |
Displays or alters the encryption of directories [files] on NTFS partitions. CIPHER [/E | /D | /C] [/S:directory] [/B] [/H] [pathname [...]] CIPHER /K [/ECC:256|384|521] CIPHER /R:filename [/SMARTCARD] [/ECC:256|384|521] CIPHER /P:filename.cer CIPHER /U [/N] CIPHER /W:directory CIPHER /X[:efsfile] [filename] CIPHER /Y CIPHER /ADDUSER [/CERTHASH:hash | /CERTFILE:filename | /USER:username] [/S:directory] [/B] [/H] [pathname [...]] CIPHER /FLUSHCACHE [/SERVER:servername] CIPHER /REMOVEUSER /CERTHASH:hash [/S:directory] [/B] [/H] [pathname [...]] CIPHER /REKEY [pathname [...]] /B Abort if an error is encountered. By default, CIPHER continues executing even if errors are encountered. /C Displays information on the encrypted file. /D Decrypts the specified files or directories. /E Encrypts the specified files or directories. Directories will be marked so that files added afterward will be encrypted. The encrypted file could become decrypted when it is modified if the parent directory is not encrypted. It is recommended that you encrypt the file and the parent directory. /H Displays files with the hidden or system attributes. These files are omitted by default. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. Note: By default, /K creates a certificate and key that conform to current group policy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /N This option only works with /U. This will prevent keys being updated. This is used to find all the encrypted files on the local drives. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery key for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is generated. Note: By default, /R creates an 2048-bit RSA recovery key and certificate. If ECC is specified, it must be followed by a key size of 256, 384, or 521. /P Creates a base64-encoded recovery-policy blob from the passed-in certificate. This blob can be used to set DRA policy for MDM deployments. /S Performs the specified operation on the given directory and all files and subdirectories within it. /U Tries to touch all the encrypted files on local drives. This will update user's file encryption key or recovery keys to the current ones if they are changed. This option does not work with other options except /N. /W Removes data from available unused disk space on the entire volume. If this option is chosen, all other options are ignored. The directory specified can be anywhere in a local volume. If it is a mount point or points to a directory in another volume, the data on that volume will be removed. /X Backup EFS certificate and keys into file filename. If efsfile is provided, the current user's certificate(s) used to encrypt the file will be backed up. Otherwise, the user's current EFS certificate and keys will be backed up. /Y Displays your current EFS certificate thumbprint on the local PC. /ADDUSER Adds a user to the specified encrypted file(s). If CERTHASH is provided, cipher will search for a certificate with this SHA1 hash. If CERTFILE is provided, cipher will extract the certificate from the file. If USER is provided, cipher will try to locate the user's certificate in Active Directory Domain Services. /FLUSHCACHE Clears the calling user's EFS key cache on the specified server. If servername is not provided, cipher clears the user's key cache on the local machine. /REKEY Updates the specified encrypted file(s) to use the configured EFS current key. /REMOVEUSER Removes a user from the specified file(s). CERTHASH must be the SHA1 hash of the certificate to remove. directory A directory path. filename A filename without extensions. pathname Specifies a pattern, file or directory. efsfile An encrypted file path. Used without parameters, CIPHER displays the encryption state of the current directory and any files it contains. You may use multiple directory names and wildcards. You must put spaces between multiple parameters. |
0x5B | Enterprise Protected (Roamable) |
Enterprise Protected (Roamable) |