If an Additional Decryption Key (ADK) is added to the PGP Encryption Server (Symantec Encryption Management Server), the ADK will automatically be added to the list of users authorized to manage the disk.
This means that the ADK can be used to authenticate to the disk and decrypt it.
For more information on ADK Best Practices and Guidelines, see the following KB:
To authenticate to a disk or decrypt a disk using an ADK or any other key such as the Disk Administrator Key, PGP Encryption Desktop must be installed.
In practice, therefore, this means that the encrypted disk must be attached as a secondary disk to a machine running PGP Encryption Desktop.
Decrypting disks is not recommended because there is always a risk that the disk is damaged. This may cause decryption to fail part way through the decryption process and the disk may become unusable.
A safer option is to authenticate to the disk and copy the required files from it. Once you are confident you have recovered all the necessary files you can either decrypt the disk or simply replace it.
To authenticate to the disk:
cd "\Program Files (x86)\PGP Corporation\PGP Desktop"
pgpwde --enum
pgpwde --list-users
pgpwde --auth -d 1 --keyid 0x12A34BCD -p mypassword
Request sent to Authenticate disk was successful
To decrypt the disk: