How to Completely Erase a PC: What Actually Gets Deleted and What Doesn't

Wiping a PC sounds simple — click a button, wait, done. But "completely erased" means different things depending on why you're doing it, what hardware you have, and what you're trying to protect against. Understanding those differences is what separates a clean slate from a false sense of security.

Why You'd Want to Fully Erase a PC

The reason matters more than most people realize. Common scenarios include:

  • Selling or donating the machine — you want no personal data recoverable by the next owner
  • Fixing a deeply infected or corrupted system — malware, ransomware, or software that survives normal uninstalls
  • Starting fresh after performance degradation — years of bloat, broken installs, and registry clutter
  • Repurposing the device — handing it to a family member or redeploying it for work

Each scenario has a different threshold for what "completely erased" actually needs to mean.

What a Factory Reset Actually Does

Windows 10 and 11 both include a built-in Reset This PC feature under Settings → System → Recovery. When you choose "Remove everything", it deletes your personal files, apps, and settings, then reinstalls Windows.

You'll typically see two sub-options:

  • "Just remove my files" — faster, but leaves data recoverable with basic file recovery tools
  • "Remove files and clean the drive" — overwrites the drive, making recovery significantly harder

The second option is the one that actually matters if you're handing the machine to someone else. The first is fine if you're keeping the computer yourself.

🖥️ On Windows 11, the reset process also lets you choose whether to restore a cloud download (fresh copy from Microsoft servers) or a local reinstall (uses files already on your drive). Cloud download is generally cleaner, especially if your local installation is what's causing problems.

HDDs vs. SSDs: The Erase Process Isn't the Same

This is where hardware type changes everything.

Drive TypeOverwrite Effective?Recommended Erase Method
HDD (spinning disk)Yes — multiple-pass overwrites work wellFull format or secure erase tool
SSD (solid-state)Overwriting is less reliable due to wear-levelingManufacturer secure erase or ATA Secure Erase command
NVMe SSDSame issue as SATA SSDNVMe-specific sanitize command or manufacturer tool

On an HDD, a single-pass overwrite with zeros is considered sufficient for most threat models. The old "35-pass Gutmann method" is largely unnecessary for modern drives — one thorough pass does the job.

On an SSD, the drive's internal controller manages where data is physically written, which means overwriting the same logical address doesn't necessarily overwrite the same physical cells. Manufacturer-provided secure erase tools (Samsung Magician, Crucial Storage Executive, etc.) or the ATA Secure Erase command — run through a bootable utility — are more reliable methods. The Windows "clean the drive" option does a reasonable job for general use, but security-focused users dealing with sensitive data often prefer hardware-level tools.

BIOS-Level and Bootable Erase Options

If Windows itself is compromised or you want a wipe that happens completely outside the operating system, bootable tools are the answer.

DBAN (Darik's Boot and Nuke) is a longtime standard for HDDs — it runs from a USB drive and wipes everything before Windows even loads. It does not support NVMe drives, which is a significant limitation with modern hardware.

For SSDs, Parted Magic is a bootable environment that includes secure erase commands for both SATA and NVMe drives, though it's a paid tool. Some motherboard BIOS interfaces (particularly on newer systems) also expose a Secure Erase option directly.

Don't Forget: It's Not Just the Drive

A complete erase involves more than the storage device. Things people commonly overlook:

  • Microsoft account sign-out — if you're signed into Windows with a Microsoft account, delink it before wiping so the next user can't access your account history or linked services
  • License deactivation — Windows digital licenses are often tied to hardware, but signing out of your Microsoft account ensures clean transfer
  • TPM reset — on newer machines with TPM 2.0 chips (used for Windows Hello, BitLocker, etc.), clearing the TPM in BIOS settings removes any stored cryptographic keys
  • BitLocker — if your drive was encrypted with BitLocker, the reset process handles decryption, but if you're doing a manual wipe, you'll want to decrypt first or the data will be unreadable gibberish to any recovery attempt (which, depending on your goal, might actually be what you want)
  • Cloud-synced data — wiping the PC doesn't delete what's in OneDrive, Google Drive, or any other cloud service. That requires separate action

What a "Complete" Erase Actually Looks Like in Practice

For most people selling a Windows 10/11 machine:

  1. Sign out of Microsoft account and delink the device
  2. Use Reset This PC → Remove Everything → Remove files and clean the drive
  3. Choose cloud download for a fresh Windows installation
  4. Clear TPM in BIOS if the machine uses BitLocker or Windows Hello

For higher-security needs (sensitive work data, compliance requirements):

  1. Use a hardware-level secure erase tool appropriate for your drive type
  2. Reinstall Windows from external media
  3. Physically verify the wipe with a recovery tool if needed

🔒 The gap between these two approaches is real — and whether it matters depends entirely on what was on the drive, who might get the machine, and what level of data recovery you're trying to prevent.

The Part That Depends on Your Setup

How thoroughly you need to erase your PC — and which method will actually achieve that — comes down to factors that vary from machine to machine: the type and age of your drive, whether encryption was in use, your version of Windows, and what risk you're actually protecting against. A machine being donated to a family member and a machine being decommissioned from a business environment are not the same problem, even if the hardware looks identical.