Windows 7 Help Forums

The first copy is encrypted with the user's public key, and the second is encrypted with the designated recovery agent’s public key. These steps ensure that the recovery agent can access the FEK and decrypt the file if necessary. ... You can encrypt and decrypt folders (and files within a folder) from a command line using Cipher. You can also ... ................
................