D-Secure Drive EraserComplete User Guide & Documentation ![]() About D-Secure Drive EraserD-Secure Drive Eraser is a boot-based, enterprise-grade drive sanitization solution designed to permanently and irreversibly erase all data from storage devices including HDDs, SSDs, NVMe drives, and USB storage. The software boots from a USB or PXE environment, operating independently of the host operating system to ensure complete and Tamper-proof audit reports with certificate for data destruction. D-Secure Drive Eraser supports 20+ internationally recognized erasure standards including NIST SP 800-88 Rev1, DoD 5220.22-M (3-pass and 7-pass), and custom overwrite methods. Each erasure operation generates a Tamper-proof audit report with certificate that can be uploaded to the D-Secure Cloud Console for centralized reporting and audit trail management. The software features an intuitive graphical interface with a step-by-step wizard that guides users through drive detection, wipe configuration, destructive confirmation, wipe progress monitoring, and completion verification. It requires no prior technical expertise and is suitable for IT administrators, ITAD companies, data centers, and compliance teams. Key Features:
About the GuideThis user guide provides comprehensive step-by-step instructions for every feature and function of D-Secure Drive Eraser. Each section includes detailed explanations accompanied by actual screenshots from the application.
This is a web-based guide and requires an active internet connection. You can read this guide with all popular browsers like Chrome, Firefox, and Safari. For better viewing experience, it is recommended to use the Chrome browser. Getting StartedCreating a Bootable USBTo use D-Secure Drive Eraser, you first need to create a bootable USB drive using our provided ISO image. We recommend using UNetbootin, a reliable and easy-to-use tool for creating bootable media on any operating system. Steps to create Bootable USB:
Important: Formatting the USB will erase all existing data on it. Please back up any important files before proceeding. Booting the ISO & GRUB MenuOnce you have created your bootable USB or configured your PXE server, boot the target machine from it. You will first be greeted by the GRUB Boot Menu.
![]() Loading Process (Please Wait 2-3 Minutes): After selecting the boot option, the system will begin extracting the ISO and loading the OS into memory. The system is working in the background, please be patient and wait for at least 2-3 minutes. During this loading period, you will see two different screens. First, an initial loading screen will appear as the system starts unpacking files. ![]() Shortly after, this will transition to a black screen with system initialization text. This is completely normal behavior and confirms the system is working properly. Once the background loading completes, it will automatically launch the graphical interface. ![]() Welcome Screen & System SummaryWhen the system boots using D-Secure Drive Eraser (via USB or PXE), the Welcome Screen is displayed. This screen provides an overview of your system hardware and serves as the starting point for the drive sanitization process.
Click the "Start Drive Sanitization" button to begin the erasure process. ![]() Detecting HardwareAfter clicking "Start Drive Sanitization", the application begins an automatic hardware detection process. The system scans all connected storage buses and devices.
A loading spinner with status messages is displayed during this process. The status bar at the bottom shows "Initializing" while detection is in progress. ![]() Network Connection SetupConnecting via Wi-FiAfter hardware detection, a Network Connection dialog appears prompting you to connect to the internet for license validation. The Wi-Fi tab displays all available wireless networks. Each network entry shows the network name (SSID), signal strength, security status, and frequency band (2.4 GHz or 5 GHz). Click on a network to connect. You can also click "Skip" to proceed without a network connection and use offline mode instead. ![]() Connecting via LAN / EthernetSwitch to the "LAN / Ethernet" tab for wired connections. This option is ideal for enterprise environments where wired connections are more reliable. If no Ethernet cable is detected, click "Detect LAN Connection" after plugging in the cable. The system will automatically configure the network using DHCP. ![]() Authentication & LoginAfter network setup, the Authentication Required screen appears. Enter your registered Email Address and Password and click "Login" to authenticate. After a successful login, you will be connected to the cloud console, and your license credits (Wipes) will be updated. Pro Tip: If you are logging in for the first time, ensure your internet connection is stable for license synchronization. If you are in an environment where the internet is not available, click "Continue in Offline Mode". You can then follow the offline activation process. ![]() Offline ActivationThe Offline Activation screen allows you to activate your license without internet. This is essential for air-gapped or secure environments. Step 1 — Your Machine Code: A unique machine code is generated based on your hardware. Copy this code and send it to support@dsecuretech.com to receive your activation response code. Step 2 — Enter Activation Code: Enter the received activation code and click "Verify & Activate" to complete the activation. Click "Back to Login" to return to the login screen, or use "Continue in Offline Mode" to proceed with limited functionality. ![]() Working with D-Secure Drive EraserDashboard OverviewAfter authentication, the Dashboard serves as the main control center, providing a comprehensive overview of system status, license info, and recent activity. Dashboard Components:
![]() Recently Wiped Drives:Below the main cards, the Recently Wiped Drives section shows history of sanitized drives. ![]() Drive Erasure Process (5-Step Wizard)Step 1: Drive DetectionClick "Start New Drive Erasure" to begin. Step 1 displays all detected storage devices:
Select a drive (highlighted with green border) and click "Continue with Selected Drive". ![]() Step 2: Wipe ConfigurationConfigure the sanitization method and verification options for the selected drive.
An "Irreversible Operation" warning reminds you that all data will be permanently destroyed. Click "Proceed to Confirmation" to continue. ![]() With Method Selected:Once you select an erasure method and verification level, the configuration summary updates with estimated completion time. ![]() Step 3: Destructive ConfirmationStep 3 is the final security checkpoint where a clear DESTRUCTIVE OPERATION warning is given. You must confirm the selected drive and wipe method here.
Warning: Once the wipe starts, it cannot be recovered. Data will be permanently destroyed. ![]() Step 4: Wipe Progress MonitoringAfter confirmation, the erasure process begins. You can track progress in real-time.
If you need to stop the process in an emergency, use the "Stop" button at the bottom. Shredding Animation: A professional shredding animation indicates that data is being securely destroyed. Step 5: Completion & Report GenerationUpon completion, the system shows a Success Notification. This means every sector of the drive has been successfully overwritten. Drive Sanitized Successfully!A Tamper-proof audit report with certificate has been automatically generated. You can view it by clicking the "View Report" button. The report includes full drive details, the algorithm used (e.g., NIST 800-88), and verification status. You can save it to a USB or upload it directly to the D-Secure cloud. Report Structure: Each generated report is structured for maximum compliance. The **first page** serves as the official **Certificate**, while the **second page** onwards contains the detailed **Summary** and **Annexure** including drive health and erasure logs. ![]() Reports & Compliance ProofsThe Reports section provides a centralized view of all compliance reports with certificate and records.
Note: Reports are cryptographically signed to ensure tamper-proof integrity. The **Certificate (Page 1)** is designed for quick compliance audits, with subsequent pages providing full forensic audit trails. ![]() Settings & ConfigurationGeneral SettingsThe Settings page is organized into three tabs: General, Account, and Network.
![]() Default Wipe Method & Verification:Scroll down to set defaults that will be pre-selected for every new erasure session. ![]() Account SettingsThe Account tab allows you to manage your user profile and license information. You can see how many wipes have been used and how many remain. ![]() Reports & Settings - Product ScreenshotsReports Dashboard: ![]() General Settings: ![]() Help Documentation: ![]() Software Details (About): ![]() About — Product & System InformationThe About page provides detailed product and system hardware information. Product Information:
System Hardware:
![]() Help — User Manual & DocumentationThe Help page serves as a built-in documentation center with a search bar and expandable topic sections.
For additional help: support@dsecure.io and docs.dsecure.io. ![]() Contact & SupportEmail: support@dsecuretech.com Website: www.dsecuretech.com Documentation: docs.dsecure.io Support Hours: 24/7 Business Hours |