How to Verify Securely Wiped Drives After Reset This PC on Windows 11
🔍 WiseChecker

How to Verify Securely Wiped Drives After Reset This PC on Windows 11

Quick fix: After Reset This PC → Fully clean the drive, verify with Recuva (free recovery tool). Install → scan drive → if no files recoverable: wipe successful. For deeper verification: PhotoRec scans raw sectors. For complete proof: ddrescue image to file + hex view shows zeros. For SSDs: fsutil behavior set DisableDeleteNotify 0 ensures TRIM working.

Reset This PC’s “Fully clean the drive” option securely overwrites. To verify: run forensic recovery tools after. Few or no recoverable files = successful wipe.

Symptom: Want to verify securely wiped drives after Reset This PC on Windows 11.
Affects: Windows 11.
Fix time: ~30 minutes.

ADVERTISEMENT

What causes this need

For disposing / reselling PC: ensure data unrecoverable. Reset This PC offers Fully clean option; verify it worked. Especially important for: corporate compliance, sensitive personal data, legal requirements.

Method 1: Use Recuva to test recoverability

The standard route.

  1. After Reset This PC + Fully clean: boot fresh Windows.
  2. Install Recuva (free, by Piriform) from ccleaner.com/recuva.
  3. Run.
  4. Pick drive that was wiped (usually C: or specific letter).
  5. Pick file types: all.
  6. Tick Enable Deep Scan.
  7. Click Start.
  8. Wait. Scan time: 30 min to several hours.
  9. Results show recoverable files (if any).
  10. For Fully clean: should show very few or random / corrupt files.
  11. For Just remove my files: shows lots of recoverable.
  12. For comparison: a fully-wiped drive should show < 100 recoverable items (file system metadata).

This is the standard verification.

ADVERTISEMENT

Method 2: PhotoRec for deeper scan

For thorough verification.

  1. Download TestDisk / PhotoRec (free, open source).
  2. PhotoRec scans raw disk sectors for file signatures (independent of file system).
  3. Boot from Linux Live USB.
  4. Open Terminal. Run sudo photorec.
  5. Pick the drive (carefully — PhotoRec lists raw devices).
  6. Pick file types to recover (or all).
  7. Specify output directory.
  8. Scan runs. Recovers files based on signatures.
  9. For Fully clean: very few results.
  10. For random data wipe: PhotoRec may find no file-signature matches.
  11. For chronic concern: physical destruction (drill, shredder) for ultimate security.

This is the deeper route.

Method 3: Hex inspect sectors

For absolute proof.

  1. Boot Linux Live USB.
  2. Read disk sectors directly:
    sudo dd if=/dev/sdX bs=1M count=100 status=progress | xxd | head

    Reads first 100MB, displays as hex.

  3. For Fully clean: should be mostly zeros (0x00) or random data after wipe.
  4. For not wiped: visible patterns, possibly readable strings (filenames, content).
  5. For random samples: dd if=/dev/sdX bs=1M skip=10000 count=1 | xxd | head — read 10GB in.
  6. For SSDs after TRIM: random data sectors common. Wipe may show zeros.
  7. For verifying TRIM: fsutil behavior query DisableDeleteNotify. Result 0 = TRIM on, ideal.
  8. For chronic verification: combine all three methods for confidence.

This is the hex route.

How to verify the fix worked

  • Recuva: shows minimal recoverable files (under 50).
  • PhotoRec: few or no signature matches.
  • Hex inspection: sectors mostly zero or random.
  • For thorough wipe: completely unreadable to forensic tools.

If none of these work

If files still recoverable: Quick wipe used: re-do Reset This PC → pick Fully clean. For SSDs: TRIM should handle; may need vendor Secure Erase command. For wear-leveled spare sectors: SSDs have over-provisioned space. Random data may persist there. ATA Secure Erase wipes everything. For chronic concern: physical destruction. Drill 6-8 holes through drive. Then dispose. For corporate compliance: certified erasure tools (Blancco, Smart Hard Disk Eraser). For environmentally responsible disposal: certified e-waste recycler. Documentation. For RAID arrays: wipe each disk separately.

Bottom line: Run Recuva after wipe to test. Few or no recoverable = wipe successful. PhotoRec for deeper. Hex inspect sectors via dd for absolute proof. For SSDs: ensure TRIM is on, or use vendor Secure Erase.

ADVERTISEMENT