I am looking to overcome an issue with a 3rd party file based encryption tool, and Configmgr in-place imaging (or re-imaging). This is of course imaging w/out a boot USB key, or pxe (ZTI).
There is not a quick way to disable the encryption, but a better suggestion was made to avoid encrypting the Configmgr files required following the reboot into WinPE.
Does anyone know what files would need excluded from being encrypted to survive the reboot from "OS" into "WinPE" to start that bootup process? Once WinPE starts - it can of course blow away that drive to it's hearts content - but it needs to be able to boot up and read the files it has laid down and what it has edited in the BCD file.
I am assumign this folder:
-_SMSTasksequence
Not sure on the rest...any ideas?