{"id":105051,"date":"2025-06-02T05:09:01","date_gmt":"2025-06-02T05:09:01","guid":{"rendered":"http:\/\/tariqkhan"},"modified":"2025-06-02T05:09:01","modified_gmt":"2025-06-02T05:09:01","password":"","slug":"unlocking-the-x-phy-ssd-as-a-secondary-drive","status":"publish","type":"docs","link":"https:\/\/x-phy.com\/products\/endpoint-security\/support\/knowledgebase\/docs\/unlocking-the-x-phy-ssd-as-a-secondary-drive\/","title":{"rendered":"Unlocking the X-PHY\u00ae SSD as a secondary drive"},"content":{"rendered":"<p>If the SSD is locked due to attacks by ransomware, data cloning theft, temperature or physical disconnections, the SSD can be unlocked by connecting it as a secondary drive and running the X-PHY PC Application.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Step 1: From the Dashboard select \u201cDrive 1\u201d to access the secondary X-PHY SSD.<\/h3>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-large wp-image-87622\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-1-1024x604.png\" alt=\"\" width=\"1024\" height=\"604\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Step 2: Key in your registered password for Drive 0 in order to access Drive 1.<\/h3>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-87623\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-2-1024x604.png\" alt=\"\" width=\"1024\" height=\"604\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Step 3: Click on the \u201cConfiguration\u201d tab, the locked status will be shown <b>\u201cDisk Locked\u201d <\/b>in the configuration page\u00a0 of the application. Click <b>\u201cUnlock Disk\u201d <\/b>button to unlock the SSD.<\/h3>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-87624\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-3.jpg\" alt=\"\" width=\"797\" height=\"474\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Step 4: The application will prompt for the password and the Authenticator OTP.<\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-87625\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-4-1024x604.png\" alt=\"\" width=\"1024\" height=\"604\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-87626\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-5-1024x604.png\" alt=\"\" width=\"1024\" height=\"604\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Step 5: Once authentication is verified, the SSD will be unlocked.<\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-87627\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/X-PHY-Unlock-6.jpg\" alt=\"\" width=\"814\" height=\"484\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the SSD is locked due to attacks by ransomware, data cloning theft, temperature or physical disconnections, the SSD can be unlocked by connecting it as a secondary drive and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"doc_category":[73],"doc_tag":[],"class_list":["post-105051","docs","type-docs","status-publish","hentry","doc_category-x-phy-guard-guide"],"year_month":"2025-12","word_count":124,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"X-PHY Editorial","author_nicename":"usama","author_url":"https:\/\/x-phy.com\/author\/usama\/"},"doc_category_info":[{"term_name":"X-PHY\u00ae Guard PC Application Guide","term_url":"https:\/\/x-phy.com\/products\/endpoint-security\/support\/knowledgebase\/x-phy-guard-guide\/"}],"doc_tag_info":[],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/docs\/105051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=105051"}],"version-history":[{"count":0,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/docs\/105051\/revisions"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=105051"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/doc_category?post=105051"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/doc_tag?post=105051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}