Quick fix: “Reset This PC → Remove everything” with “Just remove my files” option does a quick wipe. Some files may persist on free sectors (recoverable with tools). Use “Fully clean the drive” option for secure wipe (slow but thorough). After reset, run cipher /w:C: to overwrite free space.
Reset This PC has two wipe options: quick (fast, files recoverable by forensic tools) and thorough (slow, files unrecoverable). If quick used and you wanted secure: run cipher to overwrite free space, or boot from USB and securely format the drive.
Affects: Windows 11 post-reset.
Fix time: ~2-8 hours (depending on disk size and method).
What causes this
Reset This PC options:
- Keep my files: preserves personal folders.
- Remove everything → Just remove my files: deletes file pointers; data still in disk sectors until overwritten. Recoverable with forensic tools.
- Remove everything → Fully clean the drive: overwrites all sectors. Unrecoverable. Takes 8+ hours on large drives.
Method 1: Run cipher to overwrite free space
The standard route.
- After Reset This PC completed (with quick wipe), open Command Prompt as Admin.
- Run:
cipher /w:C:Overwrites free space with random data, then zero.
- Wait. Takes ~30 min to several hours depending on free space size.
- For specific folders:
cipher /w:[folder path]. - For all drives: repeat for each (D:, E:, etc.).
- cipher /w doesn’t overwrite already-used sectors, but free sectors (where deleted files lived).
- Post-cipher: free space contains random bytes. Forensic recovery much harder.
- For SSD: TRIM already handles some of this. cipher still adds protection but TRIM essential.
This is the standard fix.
Method 2: Use full secure erase tools
For thorough wipe.
- DBAN (Darik’s Boot and Nuke): free, classic. Bootable USB. Wipes entire drive with multiple passes.
- Download. Create bootable USB (Rufus).
- Boot from USB.
- Pick wipe method:
- Quick erase: 1 pass random.
- DoD short: 3 passes.
- Gutmann: 35 passes (overkill for modern drives).
- Confirm. Wipe runs.
- For SSDs: use SSD’s own Secure Erase command via vendor utility (Samsung Magician, Crucial Storage Executive).
- For NVMe:
nvme format /dev/nvmeX -s 1(Linux). - For chronic disposal: full secure erase + remove drive from machine. Physical destruction for highest security.
This is the comprehensive route.
Method 3: Re-do Reset with Fully clean option
For redo.
- If you can: re-run Reset This PC.
- Settings → System → Recovery → Reset PC → Remove everything.
- Cloud download or Local reinstall.
- When asked: pick Change settings → Fully clean the drive: ON.
- Confirm. Reset proceeds with thorough wipe.
- Takes 8+ hours on large drives.
- For data privacy: this is the official Microsoft method for “sell / donate PC.”
- For SSDs: TRIM helps but Microsoft’s thorough wipe also passes overwrite.
- For external drives: separately wipe via Disk Management format → uncheck Quick format.
This is the redo route.
How to verify the fix worked
- Forensic recovery tools (Recuva, PhotoRec) find very few or no recoverable files.
- Free space appears as random / zero data when inspected.
- For DBAN: completes wipe, prints success message.
- For cipher: returns to prompt without errors.
If none of these work
If files still recoverable: SSD specifics: SSDs use wear-leveling; data may persist in spare sectors. Use SSD’s Secure Erase. For NVMe: vendor utility’s Secure Erase. For chronic concern: encrypt drive before disposal. BitLocker. Then wiping the key (regenerate) effectively wipes contents. For corporate compliance: certified erasure tool (Blancco, Smart Hard Disk Eraser). For environmentally responsible disposal: certified e-waste recycler. Some require certificate of destruction. For specific files: cipher /w doesn’t wipe specific named files. Use sdelete from Sysinternals: sdelete -p 3 -s -z C:\sensitive.
Bottom line: Run cipher /w:C: after Reset This PC to overwrite free space. For thorough: redo Reset with “Fully clean the drive” option. For disposal: DBAN bootable, or SSD vendor utility Secure Erase, or physical destruction.