Master secure file and folder erasure across your network. Learn the complete process from selection to verification, ensuring sensitive data is permanently destroyed beyond recovery for compliance and data protection.
When you delete a file using Windows Explorer or empty the Recycle Bin, you're only removing the file's reference from the file system—the actual data remains intact on your hard drive until it's eventually overwritten by new data. This creates a significant security risk: anyone with data recovery software can retrieve deleted files, potentially exposing sensitive business information, confidential documents, financial records, or personal data long after you thought it was gone.
Secure erasure solves this problem by overwriting the file's storage space with random data multiple times, following regulated algorithms that meet international standards. This process ensures that even sophisticated forensic recovery tools cannot retrieve your data. Organizations subject to regulations like GDPR, HIPAA, SOX, or PCI-DSS often require secure erasure to demonstrate compliance with data protection mandates.
Data Breach Prevention
Protect against unauthorized data recovery from decommissioned computers or repurposed storage
Regulatory Compliance
Meet legal requirements for data sanitization and demonstrate due diligence during audits
Identity Theft Protection
Prevent criminals from recovering personal information, passwords, or financial data from discarded drives
Intellectual Property Security
Safeguard trade secrets, proprietary designs, and confidential business strategies from competitors
Proper preparation prevents mistakes and ensures smooth erasure operations. Follow this checklist before beginning any file or folder erasure to avoid common pitfalls and maximize success rates.
Verify Your Selections Carefully
Secure erasure is permanent and irreversible—there is no "undo" button once the process begins. Take extra time to review every file and folder you've selected before confirming. A single mischosen checkbox could result in losing critical business data forever.
Best practice: Ask a second administrator to review your selections for high-stakes erasure operations involving large amounts of data or sensitive systems.
Confirm Active Domain Connection
D-Secure requires an active connection to your Active Directory domain to access network computers. Verify you're connected and authenticated with administrator credentials that have sufficient permissions on target machines.
Check: Look for the green connection indicator in the status bar. If disconnected, click Home → Connect Domain and re-authenticate before proceeding.
Close All Applications on Target Computer
Files currently open by applications (Word documents being edited, databases in use, log files being written to) cannot be erased because the operating system locks them. Attempting to erase locked files results in "Failed" status for those items.
Solution: Before beginning erasure, ensure users on the target computer have closed all applications. For server computers, you may need to temporarily stop services that are accessing files you want to erase.
Tip: Schedule erasure operations during off-hours (evenings, weekends) when users aren't actively working to minimize file locking issues.
Review Ignore File List Settings
The Ignore File List (configured in Settings) automatically protects specific files, extensions, or folders from erasure. Items on this list will be skipped even if you manually select them, which can be confusing if you aren't aware.
Action: Quickly review your Ignore List (Settings → Ignore File List) to ensure it's up-to-date and doesn't accidentally protect files you intend to erase.
This comprehensive guide walks you through every step of erasing files and folders from a network computer, from initial connection to final verification. Each step includes detailed explanations, tips for efficiency, and warnings to prevent mistakes.
Foundation step - ensures network access
Before you can erase files on remote network computers, you must establish a connection to your Active Directory domain. Click Home → Connect Domain from the ribbon. A login dialog appears prompting for credentials.
Enter your username (format: domain\username) and password. These credentials must have administrator privileges on the target computers you plan to erase files from. After authentication succeeds, the navigation pane on the left populates with your domain's organizational unit (OU) structure.
Browse through the OU tree by clicking the arrow icons (▶) to expand organizational units. Computer objects appear as leaf nodes within OUs. Select the target computer by clicking its name. The computer name highlights, indicating it's ready for operations.
Efficiency Tips:
Opens file browser for remote computer
With target computer selected, right-click and choose Erase Files & Folders from context menu, or select computer and click the Erase Files & Folders button in Home ribbon.
A Windows Explorer-style interface opens displaying the complete file system of remote computer. You see all drives (C:, D:, network shares) and can navigate folders just like Explorer. Your access level depends on your permissions—admin credentials typically provide full access.
Note: Loading may take 10-30 seconds for computers with many drives or slow network connections.
Customize algorithm and verification for this operation
Before selecting files, optionally customize erasure settings for this specific operation by clicking Settings button in the file browser interface. This opens algorithm and verification options.
Choose your preferred Erasure Algorithm (DoD 5220.22-M, Gutmann, NIST 800-88, etc.) and Verification Method (None, Random, Total). If you don't change settings, D-Secure uses your default configuration from General Settings.
Algorithm Selection Guide:
Mark items for permanent deletion
Navigate the file system using folder tree on left and file list on right. Use checkboxes next to items to mark them for erasure. Selection methods include:
Individual Selection
Click checkbox next to each file/folder to select
Multiple Selection
Ctrl+Click for non-consecutive items
Range Selection
Shift+Click to select ranges
Folder Selection
Select folder to include all contents recursively
Selected item count and total size appear at bottom. Review carefully—this is your last chance before irreversible erasure.
Warning: Selecting folders erases all files inside. Expand folders to verify contents before selecting.
Final checkpoint before permanent deletion
Click Erase Data or Proceed button. A confirmation dialog displays comprehensive summary of pending operation including total files, total size, computer name, paths, selected algorithm, and verification method.
CRITICAL: Review this summary meticulously. Verify every detail matches your intentions. Check file counts match expectations. Confirm paths are correct. Ensure algorithm is appropriate for data sensitivity.
POINT OF NO RETURN
Once you click Confirm Erasure or Yes, Proceed, the process begins immediately. Data will be permanently overwritten and cannot be recovered by any means—not by D-Secure, not by data recovery services, not by forensic labs.
If you have ANY doubt about your selections, click Cancel and review again. It's better to take an extra 5 minutes to verify than to lose critical data forever.
Track real-time operation status
Progress screen appears showing real-time status. Watch as D-Secure processes each file through the selected algorithm's overwrite passes. Progress indicators include current file path, percentage complete, files processed, estimated time remaining, and any errors.
Current File
Shows active erasure
Progress %
Overall completion
Files Done
Count completed
Duration depends on file sizes, algorithm passes, and verification. DoD 3-pass on 100GB might take 1-2 hours. Gutmann 35-pass could take 10+ hours. You can click Stop to cancel, though partially erased files may exist.
Tip: For large operations, use scheduled tasks to run erasures overnight/weekends automatically.
Verify results and create compliance documentation
Upon completion, Erasure Summary report displays final results categorized as Successfully Erased, Skipped (Ignore List), and Failed (locked/permission issues). Each category shows file counts and details.
Successfully Erased
Files permanently destroyed—unrecoverable by any method
Skipped Files
Protected by Ignore List—review list if unexpected
Failed Files
Couldn't erase—usually locked by apps or insufficient permissions
Each summary includes unique Report ID for tracking. Access full report anytime from Home → Reports. Export to PDF or XML for compliance documentation, audits, or regulatory submissions.
Best Practice: Archive all erasure reports for 7+ years to demonstrate compliance during audits (GDPR Article 30, SOX Section 404).
Test with non-critical data first
Practice on test files to understand process before erasing important data
Schedule during off-hours
Run large erasures overnight/weekends to avoid file locks and performance impact
Archive all erasure reports
Keep comprehensive audit trail for compliance, legal, and regulatory requirements
Match algorithm to sensitivity
Use DoD 7-pass/Gutmann for classified data; DoD 3-pass for business; 1-pass for non-sensitive
Never erase system folders
Avoid Windows, Program Files, System32—will render computer unusable
Don't interrupt sensitive operations
Stopping mid-erasure may leave data partially overwritten—security risk
Never skip backup verification
Always confirm backups exist and are restorable before erasing original data
Avoid maximum passes needlessly
Gutmann (35-pass) on non-sensitive data wastes hours—use appropriate algorithm
❌ Files show as "Failed" in summary
Cause: Insufficient permissions or files locked by running applications.
Solution: Verify admin rights. Ensure no programs are using those files. Close all applications on target computer. For servers, temporarily stop services holding file locks. Retry erasure after resolving locks.
⏱️ Erasure is extremely slow
Cause: High-pass algorithms (Gutmann 35-pass, Pfitzner 33-pass) take proportionally longer.
Solution: For most business use, DoD 5220.22-M (3-pass) or (7-pass) provides excellent security with acceptable speed. Reserve 30+ pass algorithms for exceptionally sensitive data where security outweighs time considerations.
🔌 Cannot access remote computer files
Cause: Network connectivity issue, domain disconnection, or insufficient permissions.
Solution: Verify network connection to target computer (ping test). Confirm domain connection is active (check status bar). Ensure credentials have administrator rights on target. Check firewall settings allow file sharing. Verify target computer is powered on and network-accessible.
⚠️ Selected files aren't being erased
Cause: Files are on the Ignore File List configured in Settings.
Solution: Review Settings → Ignore File List. Remove entries you want to erase. Re-run erasure operation. Protected items are ALWAYS skipped regardless of manual selection.