File Encryption Questions

M

mtbcpa

I bring a backup drive home from my small business server and I
realize that I need to encrypt it to protect client data. I have a
couple of questions I could not find answers to that I am hoping
someone can help with:

1. In windows small business server, if I encrypt a folder on an
external drive, and select to have it encrypt all files and
subfolders, will all new files dropped into that folder be
automatically encrypted? In other words, is this a one time thing I
need to go through, or do I need to right click the folder and encrypt
it each time I am taking it offsite?

2. Do I understand correctly, that basically the encryption will not
allow the files to be accessed unless the user that was logged in when
the files were encrypted, is logged in when the files are being
accessed? If the original "encrypting" computer is destroyed and I
need to access these encrypted back up files, do I just create a user
with the same name and password on the new computer, and it will allow
me to access my files?

Thanks!
 
T

Tim Meddick

If you have a removable drive that happens to be formatted to NTFS (not
usual, as removable drives are usually Fat / Fat32) and you choose to
have encrypted files / folders on that drive - then they will be totally
inaccessible to any computer and user except for the user (profile) that
created them.

Somehow, I don't think that is going to be of any use to you for what
you wanted to do with this drive - needing it to be portable - and the
encryption with it.

The encryption will not be portable, however, it will only function on
the machine (& user) that created the encrypted files.

You would have to have admin privileges on the other PC and import the
encryption keys to a user on that machine in order for you to be able to
accomplish this.

==

Cheers, Tim Meddick, Peckham, London. :)
 
L

Lem

mtbcpa said:
I bring a backup drive home from my small business server and I
realize that I need to encrypt it to protect client data. I have a
couple of questions I could not find answers to that I am hoping
someone can help with:

1. In windows small business server, if I encrypt a folder on an
external drive, and select to have it encrypt all files and
subfolders, will all new files dropped into that folder be
automatically encrypted? In other words, is this a one time thing I
need to go through, or do I need to right click the folder and encrypt
it each time I am taking it offsite?

2. Do I understand correctly, that basically the encryption will not
allow the files to be accessed unless the user that was logged in when
the files were encrypted, is logged in when the files are being
accessed? If the original "encrypting" computer is destroyed and I
need to access these encrypted back up files, do I just create a user
with the same name and password on the new computer, and it will allow
me to access my files?

Thanks!

Do *NOT* use Windows Encrypting File System unless you are thoroughly
familiar with the "Best practices for the Encrypting File System" and
*scrupulously* follow them. There are many ways to permanently lose all
access to the content of encrypted files.
http://support.microsoft.com/kb/223316
 
M

mtbcpa

Do *NOT* use Windows Encrypting File System unless you are thoroughly
familiar with the "Best practices for the Encrypting File System" and
*scrupulously* follow them. There are many ways to permanently lose all
access to the content of encrypted files.http://support.microsoft.com/kb/223316

--
Lem -- MS-MVP

Apollo 11 - 40 years ago this month:http://www.nasa.gov/mission_pages/apollo/40th/index.html- Hide quoted text -

- Show quoted text -

I do not need to access the data as a portable drive, I only need to
access it if the original computer dies. I suppose I can backup the
encryption key somewhere else, which would allow me to use the data.
If I don't use the windows encryption, what products would you
recommend? Sorry for being such a noob.
 
P

Patrick Keenan

Do *NOT* use Windows Encrypting File System unless you are thoroughly
familiar with the "Best practices for the Encrypting File System" and
*scrupulously* follow them. There are many ways to permanently lose all
access to the content of encrypted
files.http://support.microsoft.com/kb/223316

--
Lem -- MS-MVP

Apollo 11 - 40 years ago this
month:http://www.nasa.gov/mission_pages/apollo/40th/index.html- Hide
quoted text -

- Show quoted text -

I do not need to access the data as a portable drive, I only need to
access it if the original computer dies. I suppose I can backup the
encryption key somewhere else, which would allow me to use the data.
If I don't use the windows encryption, what products would you
recommend? Sorry for being such a noob.
===========

Recovering from system failure is exactly the point you must be aware of.
And the issue is account credentials, not keys.

EFS encryption is very strong and unfortunately, mandatory steps are
*optional* and often missed. And if you don't back up the credentials or
designate a recovery agent, you will permanently lose the data when the
machine dies and you do a Windows repair.

You must do as much research as you can, back up the credentials, and test
the whole thing - including recovery - before using it.

HTH
-pk
 
H

HeyBub

mtbcpa said:
I do not need to access the data as a portable drive, I only need to
access it if the original computer dies. I suppose I can backup the
encryption key somewhere else, which would allow me to use the data.
If I don't use the windows encryption, what products would you
recommend? Sorry for being such a noob.

Don't encrypt your data.

Backup to a portable drive and put the drive in the safe.

Alternatively, copy the files to another computer on the network.

The latter scheme does not protect you against fire or theft, but then
neither does merely encryping the data on a removable drive.
 
T

Twayne

mtbcpa said:
I bring a backup drive home from my small business server and I
realize that I need to encrypt it to protect client data. I have a
couple of questions I could not find answers to that I am hoping
someone can help with:

I am using XP's encryption and have used the revoery keys to recover it
from a disk failure so I believe I can anwer your quesions. You will
also find this same information on the MS web site and also in XP's Help
and Support are under "encryption"
1. In windows small business server, if I encrypt a folder on an
external drive, and select to have it encrypt all files and
subfolders, will all new files dropped into that folder be
automatically encrypted?

Yes. Go ahead and experiment with it; create a folder and a couple
dummy files, encrypt it, and copy another dummy file to it. You'lll
know it's encrypted by the Attribute if you're showing that column in
windows Explorer.

In other words, is this a one time thing I
need to go through, or do I need to right click the folder and encrypt
it each time I am taking it offsite?

No, if the folder and all its contents are encrypted, anything copied
into it will also be encrypted.
2. Do I understand correctly, that basically the encryption will not
allow the files to be accessed unless the user that was logged in when
the files were encrypted, is logged in when the files are being
accessed?

Yes, and then some.

If the original "encrypting" computer is destroyed and I
need to access these encrypted back up files, do I just create a user
with the same name and password on the new computer, and it will allow
me to access my files?

NO! This is where many people get into trouble with encryption on XP,
and windows has done a very poor job of documenting it. The kind of
security you described would not be very secure, would it?

If you have to chang a disk out, or reformat a disk, or reinstall the
OS, there is only ONE way to access your encrypted data; with the
exported encyption keys made when you set up the encryption folder/s.

When you set up your folders for encryption, IMMEDIATELY turn around and
export your encryption keys. With those, you can access the encrypted
files on another computer, disk drive, etc.. They're small and will fit
on a floppy or thumb or whatever. It goes without saying that wherever
the copy is kept needs to be secure and preferably not labeled as to it
contents so only you or your IT will know what they are.
It's a simple process and Help & Support covers it off nicely on how
to do the exports and how to import after a catastrophe, etc.. Just be
certain to have that information available, or do not use XP's
encryption. It's real, it works, and it's very secure.
The alternative is to have a dedicated recovery agent (someone else
who handles the exported data, etc. and is authoized to decrypt the
contents.
---------------------
To back up default recovery keys to a floppy disk

1.. Click Start, click Run, type mmc, and then click OK.
2.. On the File menu, click Add/Remove Snap-in, and then click Add.
3.. Under Add Standalone Snap-in, click Certificates, and then click
Add.
4.. Click My user account, and then click Finish.
5.. Click Close, and then click OK.
6.. Double-click Certificates - Current User, double-click Personal,
and then double-click Certificates.
7.. Click the certificate that displays the words File Recovery in the
Intended Purposes column.
8.. Right-click the certificate, point to All Tasks, and then click
Export.
9.. Follow the instructions in the Certificate Export Wizard to export
the certificate and associated private key to a .pfx file format.
Notes

a.. This operation must be performed by the recovery agent account
that has the recovery certificate and private key in their private
store.
b.. Before making any changes to the default recovery policy, be sure
to secure the default recovery private key. The default recovery keys in
a domain are stored on the first domain controller for the domain. The
domain administrator is the default recovery agent.
c.. For more information about using Certificates in MMC, see Related
Topics.
Related Topics

------------------------------



From Help and Support:

To encrypt a file or folder

1.. Open Windows Explorer.
2.. Right-click the file or folder that you want to encrypt, and then
click Properties.
3.. On the General tab, click Advanced.
4.. Select the Encrypt contents to secure data check box.

To recover an encrypted file or folder if you are a designated recovery
agent

1.. Use Backup or another backup tool to restore a user's backup
version of the encrypted file or folder to the computer where your file
recovery certificate and recovery key are located.
2.. Open Windows Explorer.
3.. Right-click the file or folder and then click Properties.
4.. On the General tab, click Advanced.
5.. Clear the Encrypt contents to secure data check box.
6.. Make a backup version of the decrypted file or folder and return
the backup version to the user.

To recover an encrypted file or folder without the file encryption
certificate

1.. Open Backup.
2.. Use Backup to make a copy of the file in case of loss or damage.
3.. Send the original encrypted file to the designated recovery agent.
4.. Have the recovery agent use their recovery certificate and private
key to decrypt the file.
5.. Have the recovery agent send the decrypted file back to you, using
any file transfer method that is desired.

HERE'S THE ONE YOU PROBABLY WANT:
To back up default recovery keys to a floppy disk

1.. Click Start, click Run, type mmc, and then click OK.
2.. On the File menu, click Add/Remove Snap-in, and then click Add.
3.. Under Add Standalone Snap-in, click Certificates, and then click
Add.
4.. Click My user account, and then click Finish.
5.. Click Close, and then click OK.
6.. Double-click Certificates - Current User, double-click Personal,
and then double-click Certificates.
7.. Click the certificate that displays the words File Recovery in the
Intended Purposes column.
8.. Right-click the certificate, point to All Tasks, and then click
Export.
9.. Follow the instructions in the Certificate Export Wizard to export
the certificate and associated private key to a .pfx file format.
Notes

a.. This operation must be performed by the recovery agent account
that has the recovery certificate and private key in their private
store.
b.. Before making any changes to the default recovery policy, be sure
to secure the default recovery private key. The default recovery keys in
a domain are stored on the first domain controller for the domain. The
domain administrator is the default recovery agent.
c.. For more information about using Certificates in MMC, see Related
Topics.
Related Topics



Pls read Help & Support on a search for Encryption .

HTH,

Twayne`
 
T

Twayne

Tim Meddick said:
If you have a removable drive that happens to be formatted to NTFS
(not usual, as removable drives are usually Fat / Fat32) and you
choose to have encrypted files / folders on that drive - then they
will be totally inaccessible to any computer and user except for the
user (profile) that created them.

Somehow, I don't think that is going to be of any use to you for what
you wanted to do with this drive - needing it to be portable - and
the encryption with it.

As long as he exports his encryption certificates and keys that are made
when he encrypts, and uses those, he'll be able to access the files
anywhere.
The encryption will not be portable, however, it will only function on
the machine (& user) that created the encrypted files.

It will only function transparently on that machine. On any other
machine he'll need his certificate and keys. See Help & Support under
encryption for more details.
You would have to have admin privileges on the other PC and import the
encryption keys to a user on that machine in order for you to be able
to accomplish this.

I'd assume that would be him unless they have a designated IT person.
You're right about needing admin privs to import the cert/keys though.

HTH,

Twayne`
 
T

Twayne

Lem said:
Do *NOT* use Windows Encrypting File System unless you are thoroughly
familiar with the "Best practices for the Encrypting File System" and
*scrupulously* follow them. There are many ways to permanently lose
all access to the content of encrypted files.
http://support.microsoft.com/kb/223316

Which is what makes the XP EFS and excellent encryption system. All
will be fine as long as the cert/keys are kept for importing.

Twayne
 
T

Twayne

Patrick Keenan said:
I do not need to access the data as a portable drive, I only need to
access it if the original computer dies. I suppose I can backup the
encryption key somewhere else, which would allow me to use the data.
If I don't use the windows encryption, what products would you
recommend? Sorry for being such a noob.
===========

Recovering from system failure is exactly the point you must be aware
of. And the issue is account credentials, not keys.

EFS encryption is very strong and unfortunately, mandatory steps are
*optional* and often missed. And if you don't back up the
credentials or designate a recovery agent, you will permanently lose
the data when the machine dies and you do a Windows repair.

The person doing the encryption becomes the default recovery agent if
one is not specifically assigned. And preferably the cert/key records
should be maintained in two or three copies, one of them offsite, just
as with backups/archives. A restore of encrypted files would also make
them unaccessible without the cert/keys, BTW. It's really a simple
process once you get used to it AND play with it, to get the experience
under your belt. Use dummy files for a sandbox time of course.

Actually, it's the certificate and keys that must be exported. With
those, you will not permanently lose the data by doing a windows repair.
The certs/keys will give you access wherever the files reside on any
other or same drive. Without them, yes, you would lose access to the
data.
EFS is one thing MS did right, and they they screwed up the
documentation for it by not putting the export/import info where it's
easily found and visible. Dumb.

Twayne

You must do as much research as you can, back up the credentials, and
test the whole thing - including recovery - before using it.

That's definitly true!
 
T

Tim Meddick

At the end of the day, there are a range of portable USB HDs and
pen-drives that have encryption built-in - so all you have to do is
either type the pin code into the device before use (port. HDs) or in
some cases, wipe your fingerprint over the built-in reader before use
(pen-drives).

The pen-drive with the fingerprint reader was on sale for about $32
(GBP19.95)

==

Cheers, Tim Meddick, Peckham, London. :)




Do *NOT* use Windows Encrypting File System unless you are thoroughly
familiar with the "Best practices for the Encrypting File System" and
*scrupulously* follow them. There are many ways to permanently lose
all
access to the content of encrypted
files.http://support.microsoft.com/kb/223316

--
Lem -- MS-MVP

Apollo 11 - 40 years ago this
month:http://www.nasa.gov/mission_pages/apollo/40th/index.html- Hide
quoted text -

- Show quoted text -

I do not need to access the data as a portable drive, I only need to
access it if the original computer dies. I suppose I can backup the
encryption key somewhere else, which would allow me to use the data.
If I don't use the windows encryption, what products would you
recommend? Sorry for being such a noob.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top