A 2019 study by Blancco Technology Group found that 42% of used SSDs sold on secondary markets contained recoverable data from previous owners. If you own a Crucial SSD and plan to sell, donate, or recycle your drive, deleting files or formatting the partition is not enough. Crucial provides a free tool — Storage Executive — that sends firmware-level commands to properly sanitize the drive. Here is exactly how to use it.
Key Takeaways:
- Crucial Storage Executive is a free Windows utility that can securely erase any supported Crucial or Micron SSD using firmware-level commands
- The Sanitize feature resets NAND cells at the hardware level, reaching over-provisioned and remapped areas that software overwriting misses
- PSID Revert is for drives with TCG Opal hardware encryption — it destroys the encryption key and returns the drive to factory state
- You cannot erase the boot drive from within Windows — the target SSD must be a secondary drive
- Compatible with MX-series, BX-series, P-series, T-series, T500, M550, and M500 Crucial SSDs
What Is Crucial Storage Executive?
Crucial Storage Executive is a free drive management utility from Crucial, the consumer storage brand of Micron Technology. The current version (11.11) runs on Windows 7 through Windows 11 (64-bit only) and works with Crucial SSDs connected via SATA or PCIe.
Beyond secure erasure, Storage Executive provides firmware updates, drive health monitoring (SMART data), over-provisioning management, and a feature called Momentum Cache that uses system RAM to accelerate burst writes. But the two features that matter for data erasure are Sanitize Drive and PSID Revert.
Sanitize Drive issues a firmware-level command that instructs the SSD controller to erase all NAND flash cells simultaneously. Unlike software-based overwriting — which writes zeros or random patterns through the host interface — the Sanitize command operates below the flash translation layer. The controller erases the maximum number of NAND elements allowed under the drive's power specification, resets the virtual-to-physical sector mapping table, and raises every cell to an identical erase voltage. This process reaches over-provisioned space, remapped cells, and other areas invisible to the operating system.
PSID Revert targets drives with TCG Opal self-encrypting drive (SED) functionality enabled. It destroys the media encryption key, making all stored data permanently unreadable, and returns the drive to its factory default state. This is a form of crypto erase — fast and effective, but only applicable when hardware encryption is active.
For a broader look at how SSD erasure works across all brands and interfaces, see our complete SSD secure erase guide.
Compatible Crucial SSD Models
Storage Executive supports the following Crucial SSD families:
| Series | Interface | Form Factor | Sanitize | PSID Revert |
|---|---|---|---|---|
| T700 | NVMe PCIe 5.0 | M.2 2280 | Yes | Yes (if TCG enabled) |
| T500 | NVMe PCIe 4.0 | M.2 2280 | Yes | Yes (if TCG enabled) |
| P5 Plus | NVMe PCIe 4.0 | M.2 2280 | Yes | Yes (if TCG enabled) |
| P3 / P3 Plus | NVMe PCIe 3.0/4.0 | M.2 2280 | Yes | Yes (if TCG enabled) |
| MX500 | SATA III | 2.5-inch / M.2 | Yes | Yes (if TCG enabled) |
| BX500 | SATA III | 2.5-inch | Yes | Limited |
| M550 | SATA III | 2.5-inch / M.2 / mSATA | Yes | Yes (if TCG enabled) |
| M500 | SATA III | 2.5-inch / M.2 / mSATA | Yes | Yes (if TCG enabled) |
Storage Executive also provides limited diagnostic functionality for Crucial X-series portable SSDs (X6, X8, X9, X9 Pro, X10 Pro), but the Sanitize and PSID Revert features are designed for internally connected drives.
Note: The BX500 is a budget SATA drive that lacks the TCG Opal encryption hardware found on the MX500 and NVMe models. PSID Revert may not be available on BX500 drives, but the Sanitize function still works.

Before You Start: Requirements and Preparation
Before running any erasure operation, make sure you have the following in place:
- A Windows PC — Storage Executive requires Windows 7 or later, 64-bit only. No macOS or Linux support.
- The target SSD must NOT be your boot drive — Windows cannot erase the drive it is running from. Connect the Crucial SSD as a secondary drive, or use a USB-to-SATA adapter (for 2.5-inch drives) or a USB-to-NVMe enclosure (for M.2 drives).
- Administrator privileges — Run Storage Executive as an administrator. Right-click the application and select "Run as administrator."
- Back up any data you want to keep — Both Sanitize and PSID Revert permanently destroy all data on the drive, including partitions and file systems. There is no undo.
- For PSID Revert: have the physical drive accessible — You need to read the 32-character PSID code from the label on the drive itself.
- Uninterruptible power — Do not let the system lose power during the sanitize process. Desktop users should consider a UPS. Laptop users should keep the charger connected.
Bottom Line: Crucial Storage Executive is the easiest free option for securely erasing a Crucial SSD. The Sanitize function handles most situations. If your drive has TCG Opal encryption enabled and the Sanitize option is grayed out, run PSID Revert first to unlock the drive.
How to Sanitize a Crucial SSD with Storage Executive
This is the standard method for most users. Sanitize works on all supported Crucial SATA and NVMe SSDs regardless of whether encryption is enabled.
Step 1: Download and Install Storage Executive
- Go to crucial.com/support/storage-executive
- Download the latest version (currently version 11.11)
- Run the installer and follow the prompts
- Launch Storage Executive after installation
Step 2: Select Your Crucial SSD
- Open Storage Executive — it will scan for connected Crucial drives
- In the left panel, locate your target SSD (it will show the model name, capacity, and firmware version)
- Click on the drive to select it
- Confirm this is the correct drive by checking the serial number and capacity — erasing the wrong drive is irreversible
Step 3: Run the Sanitize Operation
- Navigate to the Sanitize Drive option in the left-hand menu
- Read the warning that all data on the drive will be permanently destroyed
- Confirm you want to proceed
- Storage Executive will force a system reboot to complete the sanitize operation — save any open work on other drives before confirming
- After reboot, the sanitize command executes at the firmware level
Step 4: Verify and Reinitialize
- Once the system reboots and the sanitize completes, reopen Storage Executive
- Select the drive and verify that it shows as empty with no partitions
- Open Windows Disk Management (right-click Start > Disk Management) to initialize the drive if you plan to reuse it
- Select GPT (GUID Partition Table) for drives over 2TB or any modern system, then create a new partition and format it
The entire Sanitize process typically takes under five minutes, including the reboot.
How to PSID Revert a Crucial SSD
Use PSID Revert when your Crucial SSD has TCG Opal self-encrypting drive features enabled. This is also the method to use if Sanitize is grayed out due to an active encryption lock, or if you have lost the drive's authentication password.
Step 1: Locate the PSID on Your Drive
- Physically access the Crucial SSD
- Find the label on the drive — for 2.5-inch drives (MX500, BX500), it is on the top face; for M.2 drives (P3, P5 Plus, T700), it is on a small sticker on the module
- Locate the 32-character PSID code (a mix of letters and numbers)
- Write it down carefully or take a photo — one wrong character and the operation will fail
Step 2: Run PSID Revert in Storage Executive
- Open Storage Executive as administrator
- Select the target Crucial SSD
- Navigate to PSID Revert in the menu
- Enter the 32-character PSID code exactly as printed on the drive label
- Confirm the operation
Step 3: Completion
- PSID Revert completes in seconds — it destroys the encryption key rather than erasing every cell individually
- All data becomes permanently unreadable
- The drive returns to factory default state with no partitions
- Reinitialize the drive in Disk Management if you plan to reuse it
After PSID Revert completes, the TCG encryption lock is removed. If you also want to run Sanitize for additional assurance, you can now do so — the Sanitize option should no longer be grayed out.
Sanitize vs. PSID Revert: When to Use Each
| Scenario | Use Sanitize | Use PSID Revert |
|---|---|---|
| Standard SSD erasure before selling or recycling | Yes | Not needed |
| Drive has TCG Opal encryption configured | Try first — if grayed out, run PSID Revert | Yes, run first |
| Lost your SED authentication password | No (locked out) | Yes — this is the recovery method |
| Need to erase a BX500 (no TCG hardware) | Yes | Not available |
| Want the fastest possible erasure on an SED | Either works | Yes — completes in seconds |
| Need a certificate of erasure for compliance | Neither — use BitRaser | Neither — use BitRaser |
For most consumer scenarios — selling a used drive, wiping before recycling, clearing a drive for reuse — Sanitize is all you need. PSID Revert is the fallback for encryption-locked drives and the preferred method when crypto erase speed matters on SED-equipped models.
SATA vs. NVMe: What Differs in Practice
While Storage Executive provides the same interface for both SATA and NVMe Crucial SSDs, the underlying commands differ:
SATA SSDs (MX500, BX500, M550, M500): Storage Executive issues an ATA Sanitize command or ATA Secure Erase command through the SATA interface. The drive controller handles the NAND cell reset. SATA drives connected via USB adapters may have limited command passthrough — if Sanitize fails over USB, connect the drive directly to a SATA port on the motherboard.
NVMe SSDs (T700, T500, P5 Plus, P3): Storage Executive issues an NVMe Sanitize command as defined in the NVMe specification. NVMe drives generally have faster and more reliable sanitize implementations than SATA drives. USB-to-NVMe enclosures vary in their command passthrough support — direct M.2 slot connections are more reliable.
Both interface types reach over-provisioned space and remapped cells. The critical distinction is that SATA drives connected through USB may not pass firmware commands correctly, while NVMe drives in direct M.2 slots have the most reliable behavior. For the technical background on these different commands, see our NIST 800-88 standard explainer.
Common Issues and Troubleshooting
Sanitize option is grayed out. The drive likely has TCG Opal encryption enabled. Run PSID Revert first, then retry Sanitize. Also verify you are running Storage Executive as administrator.
Storage Executive does not detect the drive. Confirm the SSD is a Crucial or Micron model — the tool does not work with other brands. Check that the drive is connected via SATA or PCIe (not USB, which may limit detection). Try a different SATA port or M.2 slot. Update Storage Executive to the latest version.
Sanitize fails or hangs after reboot. Power interruption during sanitize can leave the drive in an incomplete state. Restart the system and try again. If the drive remains in a locked state, PSID Revert may recover it. As a last resort, contact Crucial support — some drive states require a factory reset tool.
PSID Revert fails with "invalid PSID" error. Double-check every character of the 32-character code. Common mistakes include confusing 0 (zero) with O (letter O), 1 (one) with l (lowercase L), and 5 with S. The code is case-sensitive.
Drive connected via USB adapter is not supported. USB passthrough for ATA Secure Erase and NVMe Sanitize commands depends on the adapter's controller chip. Many budget adapters strip these commands. Use a direct SATA or M.2 connection instead.
Limitations of Crucial Storage Executive for Erasure
Storage Executive is an excellent free tool, but it has real limitations:
- Windows only — no macOS or Linux version exists
- Crucial/Micron drives only — it will not work with Samsung, WD, Kingston, Intel, or any other brand
- No certificate of erasure — if you need documented proof of sanitization for HIPAA, GDPR, PCI DSS, SOX, or any compliance framework, Storage Executive does not provide it
- Cannot erase the boot drive — you must connect the target SSD as a secondary drive
- USB connections are unreliable — firmware commands may not pass through USB adapters correctly
- No batch processing — you can only erase one drive at a time, making it impractical for IT departments decommissioning dozens of drives
If you need compliance-grade erasure with certificates, multi-brand support, or batch processing, consider a dedicated erasure tool like BitRaser Drive Eraser. For a broader look at your options, see our best data erasure software roundup.
Frequently Asked Questions
Is Crucial Storage Executive Sanitize the same as secure erase?
Yes. The Sanitize Drive function issues a firmware-level sanitize command to the SSD controller, which resets NAND cells rather than simply overwriting data. This is functionally equivalent to a secure erase and reaches areas that software-based overwriting cannot, including over-provisioned and remapped cells.
Can I use Crucial Storage Executive to erase my boot drive?
Not directly. Storage Executive runs within Windows and cannot erase the drive that Windows is running from. You need to connect the Crucial SSD as a secondary drive in another system, use a USB-to-SATA or USB-to-NVMe adapter, or boot from a different drive to erase the target SSD.
What is the difference between Sanitize and PSID Revert in Storage Executive?
Sanitize issues a firmware-level erase command that resets all NAND cells on the drive. PSID Revert is specifically for drives with TCG Opal hardware encryption enabled — it destroys the encryption key and returns the drive to factory defaults. If your drive has TCG encryption configured, you may need to run PSID Revert before Sanitize will work.
Does Crucial Storage Executive work with non-Crucial SSDs?
No. Storage Executive is designed exclusively for Crucial and Micron-branded SSDs. It will not detect or manage drives from other manufacturers. If you need to erase drives from multiple brands, use a universal tool like BitRaser Drive Eraser, Parted Magic, or the Linux hdparm and nvme-cli commands.
Where do I find the PSID code on my Crucial SSD?
The PSID is a 32-character alphanumeric code printed on a label on the physical drive itself. On 2.5-inch SATA drives like the MX500, it is on the label on the top face of the drive. On M.2 NVMe drives like the P3 or P5 Plus, it may be on a small sticker on the module. You must read the code directly from the hardware.
Will Crucial Storage Executive erase my SSD firmware or SMART data?
No. Both Sanitize and PSID Revert erase user data, partitions, and the file system, but they do not affect the drive firmware, SMART diagnostic data, or the controller configuration. After erasure, the drive functions normally and can be repartitioned and reformatted for reuse.
How long does Crucial Storage Executive Sanitize take?
The Sanitize operation typically completes in seconds to a few minutes, depending on drive capacity and model. This is far faster than software-based overwriting because the SSD controller erases NAND cells in parallel at hardware speed rather than sequentially writing data through the host interface.
Does Crucial Storage Executive provide a certificate of erasure?
No. Storage Executive does not generate a certificate or audit log documenting the erasure. If you need a certificate of data destruction for compliance with HIPAA, GDPR, PCI DSS, or other regulations, use a tool like BitRaser Drive Eraser that produces tamper-proof erasure reports.
Can I use Crucial Storage Executive on a Mac?
No. Storage Executive is a Windows-only application requiring Windows 7 or later (64-bit). There is no macOS or Linux version. Mac users with a Crucial SSD can erase it by connecting the drive to a Windows system, or by using Linux command-line tools like hdparm (for SATA) or nvme-cli (for NVMe). See our Mac drive wipe guide for alternatives.
What should I do if Sanitize is grayed out in Storage Executive?
If the Sanitize option is unavailable, the drive likely has TCG Opal encryption enabled, which locks out the Sanitize function. Run PSID Revert first to remove the encryption lock and return the drive to factory state, then try Sanitize again. Also confirm the drive is not your boot drive and that Storage Executive is running with administrator privileges.
The Bottom Line
Crucial Storage Executive is a straightforward, free way to securely erase any supported Crucial SSD. Use Sanitize for standard erasure and PSID Revert for encryption-locked drives. Just remember: it only works on Crucial hardware, it cannot erase boot drives, and it does not generate compliance certificates. For a walkthrough of all SSD erasure methods across every brand, start with our complete guide to wiping a hard drive.
Last updated: February 2026. We regularly review and update our guides to ensure accuracy.
Sources:
- An Overview of Crucial Storage Executive. https://www.crucial.com/support/articles-faq-ssd/overview-crucial-storage-executive
- Methods for Erasing a Crucial SSD. https://www.crucial.com/support/articles-faq-ssd/methods-for-erasing-an-ssd
- Crucial Storage Executive FAQ. https://www.crucial.com/support/articles-faq-ssd/storage-executive-faq
- Crucial Storage Executive Download Page. https://www.crucial.com/support/storage-executive
- NIST Special Publication 800-88 Rev. 2, Guidelines for Media Sanitization. https://csrc.nist.gov/publications/detail/sp/800-88/rev-2/final
- NVM Express Base Specification. https://nvmexpress.org/specifications/