Best Practices Guide McAfee File and Removable Media Protection 4.3.0 For use with ePolicy Orchestrator 4.6.6, 4.6.7, 5.0.1, 5.1 Software COPYRIGHT Copyright © 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide Contents 1 Introduction 5 How File and Removable Media Protection works . . . . . . . . . . . . . . . . . . . . . . 5 Purpose of this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 General recommendations 7 Deployment and activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Database sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Policy assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Moving machines with FRP installed from one McAfee ePO server to another . . . . . . . . . . 9 Compatibility with other encryption products . . . . . . . . . . . . . . . . . . . . . . . 9 Delegated administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Encryption options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Blocking processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Key request exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3 File and Removable Media Protection use cases 13 Secure sharing with USB devices . . . . . . . . . . . . . . . . . . . . . . . . . . . Enforce Encryption (onsite access only) . . . . . . . . . . . . . . . . . . . . . . Allow Encryption (with offsite access) or Enforce Encryption (with offsite access) . . . . . Device exemptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Secure sharing with CD/DVD/ISOs . . . . . . . . . . . . . . . . . . . . . . . . . . Protecting sensitive folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General encryption guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . Removing a folder encryption policy . . . . . . . . . . . . . . . . . . . . . . . Encrypted parent folder — decrypted subfolder . . . . . . . . . . . . . . . . . . . Protecting sensitive files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enable search encrypted option . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protecting network share folders . . . . . . . . . . . . . . . . . . . . . . . . . . . Securing email attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Encryption keys 13 14 14 15 16 16 16 17 17 17 18 18 19 21 Regular and user personal keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 User local keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Index McAfee File and Removable Media Protection 4.3.0 23 Best Practices Guide 3 Contents 4 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 1 Introduction ® McAfee File and Removable Media Protection (FRP) delivers policy-enforced, automatic and transparent encryption of files and folders on PCs, file servers, emails, and removable media such as USB devices and CD/DVDs. FRP is managed by McAfee® ePolicy Orchestrator (McAfee ePO), creating a central point of management that ensures your data is safe wherever it goes. Typical FRP use cases include encrypting files such as spreadsheet and sensitive documents, and enabling secure access to a specific folder on a network file share, enabling users to securely copy information on removable media and send self-extracting files in email attachments to partners or clients. Contents How File and Removable Media Protection works Purpose of this guide How File and Removable Media Protection works FRP encrypts files and folders on local drives, network shares, and removable media devices according to the policies enforced by the McAfee ePO server. FRP supports both user and system-based policies, and provides a single point of control to protect data in your environment through integration with McAfee ePO. FRP relies on Microsoft Windows credentials, so both registered domain users and local system users can be assigned product policies and encryption keys. When the FRP client is installed on the system, the system synchronizes with the McAfee ePO server and fetches product policies and encryption keys. The FRP client acts like a filter between the application creating or editing the files and the storage media. When a file is saved, the FRP filter executes the assigned policies and encrypts the data if applicable. The product is transparent to the end user, ensuring a seamless experience. File and Removable Media Protection is available as part of the following suites: • McAfee Complete Endpoint Protection - Business (CEB) • McAfee Complete Data Protection - Advanced (CDA) • McAfee Complete Data Protection (CDB) McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 5 1 Introduction Purpose of this guide Purpose of this guide This guide suggests best practices for deployment and management. It also discusses optimization and maintenance before and after deployment. This document encapsulates the professional opinions of FRP certified engineers, and is not an exact science. You must understand both the product and the environment where it will be used before deciding on an implementation strategy. Calculations and figures in this guide are based on field evidence and not theoretical system testing; they are our best advice at the time of writing. Review the best practices and use the guidelines that best fit your environment. This is not intended to serve as a product guide. 6 • For details on how to deploy and use FRP, see the McAfee File and Removable Media Product Guide and the McAfee File and Removable Media Migration Guide. • For customized recommendations and optimizations for your environment, contact McAfee Professional Services. • To discuss product use cases and recommendations on feature usage and to obtain the latest information, visit the McAfee Community Forum: https://community.mcafee.com/community/ business/data/epoenc • For issues related to the product, contact McAfee Support. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 2 General recommendations Contents Deployment and activation Database sizing considerations Policy assignments Moving machines with FRP installed from one McAfee ePO server to another Compatibility with other encryption products Delegated administration Encryption options Deployment and activation This section provides general recommendations for the deployment of FRP. Client operating systems • Verify operating system support — Make sure that the client operating system, including service pack levels, is officially supported. For details, see KB81149. • Prevent deployment to non-supported client operating systems — Use McAfee ePO to prevent deployments to unsupported operation systems such as Windows XP 64 bit and Windows Vista 64 bit. McAfee ePO together with McAfee® Agentwill ensure that the FRP client is run only on endpoints with supported operating systems. VDI environments For the latest information on support for VDI environments, including installation details and applicable constraints, see KB81478. Deployment using third-party tools You can manually install FRP 4.3.x locally or in conjunction with a third-party deployment tool using the command line interface. To upgrade from McAfee® Endpoint Encryption for Files and Folders, you must first uninstall the existing version. You must install a supported version of McAfee Agent before using the command line method. The specific command depends on the operating system: • 32-bit operating system: msiexec.exe /q /i eeff32.msi • 64-bit operating system: msiexec.exe /q /i eeff64.msi McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 7 2 General recommendations Database sizing considerations After executing the command line instruction, you must restart the client to complete the installation procedure. For details on installing FRP from the command line, see KB81433. Deployment through McAfee ePO is the recommended approach. Encryption key deployment Initial key delivery following deployment to a large number of client systems can subject the Tomcat process on the McAfee ePO server to high load, as it has to process secure data channel messages to and from the client. To reduce the risk of overloading the Tomcat process, adopt a phased deployment strategy so that the key delivery can be evenly distributed. Although the number of systems that can be supported consecutively depends on a number of factors (server performance, number of keys granted to each client, whether database is local to McAfee ePO server, and so on), we recommend starting at 100 systems per hour and monitoring the load. Alternatively, consult McAfee Professional Services to determine the optimal rate for your environment. Database sizing considerations This section provides recommendations regarding database sizing. The main database sizing considerations for FRP relate to: • Encryption keys that are generated on McAfee ePO — regular and user personal keys • Removable Media Events (USB and CD/DVD) that are generated on FRP clients and sent to McAfee ePO for the purpose of auditing or reporting Encryption keys FRP creates three tables to maintain encryption key information. For an environment with 10,000 users where a user personal key is assigned to every user (10,000 keys) and 1000 regular keys, a combined total of ~20 MB of index space and ~6 MB of data space are required. Events Removable Media events are lightweight. This generic formula can be used to calculate the space requirements: Data Space = Number of events/per node/per day * Number of Nodes * Number of Days * 0.3 KB Index Space = Number of events/per node/per day * Number of Nodes * Number of Days * 0.002 KB For example, for an environment with 10,000 nodes with an average of 10 events per node per day, for a period of 30 days: • Data Space required = ~900 MB • Index Space required = ~6 MB Policy assignments This section provides recommendations regarding the effective implementation of policy assignments. Pragmatic policy assignment rules We recommend that you simplify policy assignments by defining a baseline or default policy for your organization, and implementing it as a system-based policy. Then, for any exceptions to the policy, create a user-based policy assignment rule. This rule will always supersede system-based policies 8 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide General recommendations Moving machines with FRP installed from one McAfee ePO server to another 2 (both those assigned via the System Tree and those assigned by system-based policy assignment rules), making this the easiest way to implement complex policies. This also minimizes the amount of processing on the McAfee ePO server. For further information on policy assignments, see KB81441 and KB72775. Moving machines with FRP installed from one McAfee ePO server to another Encryption keys and policy information must be exported and imported to the new McAfee ePOserver. For user personal keys to continue to function seamlessly, ensure that the user domain and user name details do not change. If you are using Role-Based Key Management, ensure that you create equivalent roles on the new McAfee ePO server before importing the keys. If matching roles are not found, the key import process will fail. Compatibility with other encryption products FRP is not compatible with other file-level encryption products such as Microsoft Encrypted File System (EFS). Both FRP and products such as EFS are file encryption products that work at the same file system level, therefore a driver conflict would occur. Delegated administration Role-based key management provides the ability to logically separate and compartmentalize key management across multiple administrators. This functionality is critical for separation of duties across business functions and subsidiaries, and also helps protect the activities of different groups from one another. This functionality is enabled in three steps (performed by the Global Key Administrator): • Creation of a role (for example, Finance) • Creation of a permission set (with the necessary privileges) and its assignment to a role • Creation of a McAfee ePO user to serve as the Key Admin (for example, Finance Key Admin) and associating the user with the appropriate permission set The permission set binds the role (Finance) with the McAfee ePO user (Finance Key Admin). Any McAfee ePO Global Administrator can play the role of Global Key Administrator. The Global Key Administrator is assigned the "Default" role and does not have access to keys associated with other roles. If, for example, the HR Finance Key Admin leaves the organization, Global Key Administrator can create a new McAfee ePO user and assign the user the necessary role and permission set required for managing the HR Group. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 9 2 General recommendations Encryption options An audit trail is created to enable the monitoring of key management and policy assignment functions performed by administrators to ensure compliance and prevent abuse by administrators. Encryption options Blocking processes FRP acts as a persistent encryption engine. When a file is encrypted, it remains encrypted even if the file is moved out of an encrypted directory. Nonetheless, in certain scenarios encrypted data might be unintentionally exposed in plaintext. For example, when uploading files to an FTP server, encrypted files are uploaded in plain text format. This is because socket communication is used for the file operation instead of Windows I/O file operation. To allow encrypted data to be uploaded with persistent encryption, you can configure the FTP process as a blocked process. Blocked processes (applications) always receive files in cipher text from the FRP filter driver, meaning that the files are not decrypted for the blocked processes. The main purpose of process blocking is to prevent encrypted data from being unintentionally exposed in plaintext; this is done by circumventing the FRP encryption engine. Consider the process exemption feature as a prevention feature, a part of the concept of digital rights management, rather than a way for users to share encrypted data over Internet or web-mail. 10 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide General recommendations Encryption options 2 Processes that can be safely blocked • FTP processes • File sharing processes • File backup processes Processes that are risky to block • Internet browser processes • Email client processes The data remains encrypted, but the applications might alter the file and render the data unreadable when sent to a network resource or email recipient. The source file remains intact at all times. Processes that must never be blocked • Data compression applications like WinZip • FRP client processes • Windows Explorer • Virus scanning processes • Windows processes • Processes for other McAfee products Key request exclusions You can define key request exclusions so that specific processes are not stopped when they trigger an authentication prompt and an encryption key is not available. For example, if there are encrypted files for which the key is unavailable (or there are files encrypted using user local keys), applications like virus scanners might get "stuck" on encrypted files because it cannot access the files, and the scanning process stops. To avoid such situations, make sure that you define key request exclusions for any process that automatically gets an Access Denied message if keys are unavailable. Key request exclusions should never be defined for Windows Explorer and FRP client processes. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 11 2 General recommendations Encryption options 12 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 3 File and Removable Media Protection use cases Contents Secure sharing with USB devices Secure sharing with CD/DVD/ISOs Protecting sensitive folders Protecting sensitive files Enable search encrypted option Protecting network share folders Securing email attachments Secure sharing with USB devices FRP offers a number of protection options for USB devices. Select the protection level based on the requirements of your environment. • To restrict access to the encrypted USB devices to within the company's environment only, select the Enforce Encryption (onsite access only) option. • To enable users to access encrypted USB devices on systems without having to install any McAfee encryption software, select either Allow Encryption (with offsite access) or Enforce Encryption (with offsite access) options. • The Enforce Encryption (with offsite access) option allows a file to be copied to the USB device only when it is encrypted, otherwise the device is rendered read-only. If the User Managed option is selected, files can be copied only to the encrypted portion of the device. • To define the use of USB sticks as read-only, select the Block Write Operations option. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 13 3 File and Removable Media Protection use cases Secure sharing with USB devices Enforce Encryption (onsite access only) These encryption options are relevant for the Enforce Encryption (onsite access only) setting. • No automatic decryption of existing files — If a removable media device is already subject to an Enforce Encryption (onsite access only) policy, the data on the USB device remains encrypted even if you disable it by setting the policy to Allow Unprotected Access. To decrypt the data on the device, set the Key Field option to Decrypt. Changing the policy to Allow Unprotected Access affects new devices only (devices not previously subject to the Enforce Encryption (onsite access only) policy). • New files keep getting encrypted — Disabling the Enforce Encryption (onsite access only) option does not mean that new files created on a removable media that have been subject to the removable media encryption policy will be in plaintext. New files are still encrypted when written to the media (the encryption policy is still applied to the USB device itself). To remove an applied encryption policy on removable media, set the Key Field option to Decrypt. • Ignore existing content on media — When the Ignore existing content on media option is disabled, all existing files on the attached removable media become encrypted (not ignored). Therefore, they can no longer be read from systems without FRP. Beware of leaving this option disabled. When this setting is enabled, only new files are encrypted when placed on a USB device where this policy is applied. Allow Encryption (with offsite access) or Enforce Encryption (with offsite access) It is possible to initialize the entire device or part of it based on the selected Protected Area setting. With the full device policy in place, if the end user chooses to back up the existing data, the data on the device is first copied to the system drive on the local computer. An encrypted container is then created on the removable device, and finally the data is copied back from the local computer to the encrypted container (removable device). In this process, there might be limitations in terms of free space on the local machine and the time required for the copy operations (back and forth) might be substantial. We recommend that the Administrator select the User Managed option. This allows the end user to determine the size of the encrypted container. The maximum size of the encrypted container that the user can create is equal to the free space on the USB device. Using the user personal key as the recovery key We recommend that the recovery key be configured as a recovery method, and that the user personal key be used for this purpose. Using a regular key as the recovery key allows all users with access to that recovery key to perform recovery on other users’ devices where the same recovery key is in use. Assigning the user personal key as the recovery key for removable media encryption ensures that the USB media can be recovered only by the user who encrypted it. Support for large files in the encrypted container Enable the Allow large file support (> 4 GB) option to allow files of size larger than 4 GB to be copied to the encrypted container. When a device that is initialized with EEFF 4.2 or below is inserted on to a FRP 4.3 client with the Allow large file support (> 4 GB) option enabled, the container format is automatically updated to support larger files (wherever applicable). There is no need to reinitialize the device. 14 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide File and Removable Media Protection use cases Secure sharing with USB devices 3 Clients running on EEFF 4.2 or below cannot recognize the new FRP 4.3 container format. Start by upgrading clients to FRP 4.3 with the Allow large file support (> 4 GB) option turned off. Once a critical mass of clients is on FRP 4.3, apply the new container format by enabling the policy. Machines running an earlier version FRP (EEFF) do not have the intelligence to detect the new container format. Files on the encrypted device can be read on these machines using the offsite application but this is not advisable. Mac OS X offsite browser for USB media Offsite support on Mac OS X clients has been introduced in FRP 4.3. Any encrypted device using the offsite access options (formerly known as EERM) can now be accessed on Mac OS X clients. In addition to being able to read files on the device, it is possible to do in-place edits and copy files to and from the encrypted USB device. Previously encrypted devices are automatically provisioned with the Mac offsite browser when the USB devices are inserted on to a FRP 4.3 client. There is no need to reinitialize existing encrypted devices. Auditing and reporting FRP provides rich auditing and reporting capabilities where end-user activity related to the use of USB media is captured and transmitted back to McAfee ePO. The product provides a rich reporting framework that allows administrators to run custom queries on the audit event database. Device exemptions Device exemptions are based on the Device Instance Path ID. Devices are exempted based on a substring match. For example, if the Device Instance Path ID was identified as USBSTOR \DISK&VEN_KINGSTON&PROD_DATATRAVELER_G3&REV_1.00\001CC0EC321DFBC0B717268 6&0, then these strings can be configured to exempt devices: • KINGSTON — Exempts all KINGSTON devices • DATATRAVELER — Exempts all DATATRAVELER models regardless of whether the MAKE is KINGSTON • G3 — Exempts any device with G3 • DISK&VEN_KINGSTON&PROD_DATATRAVELER_G3&REV_1.00, and so on The example above demonstrates the use of a single entry in the exclusion list to indicate string-based matching. For more details, see KB81519. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 15 3 File and Removable Media Protection use cases Secure sharing with CD/DVD/ISOs Secure sharing with CD/DVD/ISOs The protection level options offered for CD/DVDs are similar to the ones provided for USB devices. Select the protection level based on the requirements of your environment. Enforce Encryption (onsite access only) • Burning applications — Make sure that the burning software is on the list of supported CD/DVD burning applications in the FRP documentation. Using a non-supported burner can render CD/DVDs as plaintext, even though the policy stipulates encryption. For more details, see KB81450. • CD/DVD format limitations — Make sure that the CD/DVD media is on the list of supported CD/DVD formats. For more details, see KB76478. Protecting sensitive folders FRP enables you to encrypt the contents of entire folders thus protecting any sensitive data they contain. Encryption can be either policy-driven or user-driven. When encryption is policy-driven, the Administrator can enforce encryption of a folder by specifying the location and selecting the encryption key that is to be used for that folder. The Administrator can specify several folders (and select the corresponding encryption keys) in the same folder encryption policy. Alternatively, the Administrator can allow users to selectively encrypt or decrypt folders by enabling the Explicit Encrypt and Explicit Decrypt options. A folder encrypted by an Administrator-enforced policy cannot be decrypted by the end user using the Explicit Decrypt option. Folder encryption policy is single slot in nature. You can specify only one folder encryption policy referencing a particular system or a particular user. However, both of these can co-exist. For example, if user X logs in to system Y, the folder encryption policy applicable to system Y and user X is enforced provided that they do not conflict. If they do conflict, the user-based policy overrides the system-based policy. General encryption guidelines • Local volumes — Do not encrypt entire local volumes and in particular the system volume; doing so can cause deadlocks on the client systems. • Do not encrypt entire local drives — FRP is file and folder encryption software, not full disk encryption software. Thus, except for removable media, we do not recommend its use to encrypt entire drives. ® For full disk encryption with McAfee ePO management, review the capabilities of either McAfee Drive Encryption or McAfee Management of Native Encryption (MNE). ® 16 • Program Files directory — Do not encrypt the Program Files; doing so can cause deadlocks on the client systems. • Microsoft Outlook data directories — Do not encrypt the Microsoft Outlook data directories containing the OST and PST files. Instead, we recommend the use of Windows EFS for this purpose. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide File and Removable Media Protection use cases Protecting sensitive files 3 • User profile folder — Do not encrypt the entire “User” profile. Although the User profile is a folder per se, it is not recommended to encrypt that entire folder with a folder encryption policy as it might cause deadlocks. Instead, try to isolate the folders that actually might contain sensitive data. If this is a real concern, consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the FRP-HDLP integration. • Desktop folder — Be careful if you plan to encrypt the Desktop folder. Only do this if you’re sure you don’t have static links to other drives on the desktop. LNK-linked shortcuts are fine, but static hard links to other drives will render these targets being encrypted if the shortcuts are on the Desktop. It is a best practice to specify specific directories in the FRP folder policy screen. This is done by selecting [Desktop] and then adding the specific paths like [Desktop]\FolderA and [Desktop]\FolderB. Choose [Desktop] only if you’re sure that there are no static links to other drives on the desktop. • Whenever possible, select only folders containing sensitive files — Always try to pinpoint the folders containing sensitive data rather than generalizing on a high directory level. If this is a real concern, use file extension encryption or consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the FRP-HDLP integration. Removing a folder encryption policy Removing a folder encryption policy does not automatically decrypt the content of that folder. To decrypt an encrypted folder, you must specify a policy pointing to the folder location and select Decrypt in the Encryption key field. Encrypted parent folder — decrypted subfolder By default, all sub-folders in a folder that is assigned an "encrypt" policy are also encrypted. However, it is possible to set a subfolder as decrypted even if (any) parent folder is set to be encrypted. For example, it is possible to encrypt the My Documents folder through a folder encryption policy and have it contain the My Video subfolder in plain text format using the Decrypt option. Protecting sensitive files FRP enables you to encrypt the contents of files based on the file extension. As with folder encryption, file encryption can be either policy-driven or user-driven. It is possible to add as many processes and extensions as you like within a single file encryption policy. It is also possible to mix encryption keys for different processes, as long as it is done in a rational manner. File encryption policy is single slot in nature similar to Folder encryption policy. Example of policy-driven file encryption This example assumes that you want to encrypt files created by Microsoft Excel. Enter both the process name and the [exe] extension, for example, “excel.exe”. Process names can easily be identified by starting the corresponding application and then locating the process name in the Windows Task Manager. Only the extension should be entered ("xls"); wildcards or dots (*.xls", or ".xls") should be omitted. Specify the encryption key with which files created by the Excel application should be encrypted. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 17 3 File and Removable Media Protection use cases Enable search encrypted option Avoid using the wildcard (“*”) as extension The wildcard (“*”) extension in file extension encryption is very powerful — every file created by the stated application will be encrypted, including templates, index files, and so on. Despite its appeal, we strongly recommend that you carefully define the file types might be created and contain sensitive data worth encrypting. Make a serious attempt to list the file types created in your organization that might contain sensitive data. For example, a template file (e.g., <text>*.dot) does not normally contain any sensitive data. If this is a real concern, consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the FRP-HDLP integration. Enable search encrypted option FRP policy includes the Enable search encrypted option, which makes it is possible to list files encrypted by FRP. The Search encrypted option is available as a context menu option on the FRP client. In the search dialog, if <any key = encrypted> is selected, all encrypted files/folders in the selected location are listed. Protecting network share folders FRP enables you to protect your network share folders by applying encryption policies to these shares. There are a number of steps that can be taken to optimize network and system performance in the process. Explicitly encrypt large shares in advance For large network folders that require encryption, apply a folder encryption policy that points to the network share location on a single dedicated machine where FRP is already deployed. Initiating encryption from this single machine prevents multiple systems from attempting to enumerate, fetch, encrypt and upload files simultaneously over the network, thus minimizing the risk of network bandwidth failure and file server payload overflow. Depending on the size of the share folder, this initial encryption task may be set to run overnight, at the weekend, or whenever typical network usage will be minimal. Tune network parameters When encrypting large folders on a network share through a policy, we strongly recommend adjusting the following policy options for optimal performance. These values are recommended: 18 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 3 File and Removable Media Protection use cases Securing email attachments • I/O utilization: 20% (set in Encryption Options policy). This option controls the amount of I/O bandwidth used by each system during encryption, and while not specific to network shares, the bandwidth will be higher when large encrypted folders are processed. • Bandwidth limit: 100 KB/sec (set in Network policy. This option controls the network bandwidth used by each system during encryption. Introducing a limit helps distribute the encryption load of a network share between the client systems, while also preventing network overload). • Network latency: 600 ms (set in Network policy). This option prevents encryption attempts when the network performance is already degraded. Enable file size limitation The Enable limiting of file size... option enables you to exclude (very) large files from encryption through policy enforcement. This is particularly important for network shares where the encryption of large files can cause heavy network traffic. This option applies only to files contained in folders encrypted according to a Folder Encryption policy. Explicitly encrypted files are not subject to this limitation, nor are files encrypted by a file extension encryption policy. Files drag-dropped to encrypted folders and files saved to encrypted folders are also not affected. Restrict maximum number of clients You might want to tune the network folder encryption based on the capacity of the client machines and the overall network traffic. For example, you might set the parameter Maximum number of clients allowed to encrypt folder to 10 to increase the encryption intensity if there is generous network capacity. Securing email attachments FRP enables you to secure email attachment using self-extractors. • Use Allow creation of Self-extractors or Enable sending of encrypted email attachments to help end users secure email-attachments. The Enable sending of encrypted email attachments restricts the encrypted attachments to be accessed within the company's environment. Self-extractors can be used to share information with an external party. • Maximum data input size — The maximum data input size for a self-extractor is 10 MB. Although larger data input can be used, the recommended maximum input is 10 MB because the self-extractor code is optimized for this maximum data input. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 19 3 File and Removable Media Protection use cases Securing email attachments 20 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 4 Encryption keys This chapter provides best practice recommendations related to the use of encryption keys. Contents Regular and user personal keys User local keys Regular and user personal keys FRP enables the use of regular and user personal keys. Deactivate encryption keys instead of deleting them In McAfee ePO, we strongly advise against deleting keys. Instead, it is sufficient to just deactivate keys. This is to safeguard against any eventuality where a document is encrypted with a key that is no longer in the system. A deleted encryption key cannot be restored. User personal keys User personal keys give the Administrator the ability to create unique keys for users. These keys are created on the McAfee ePO server when the user logs on to the client system for the first time after the policy is enforced. User personal keys can be referenced in the Grant Key policy generically (as a single key), but create unique keys for each of the assigned users. Use personal keys and multiple McAfee ePO databases Avoid using user personal keys in a multi-database McAfee ePO environment. This is only safe to do if a user only registers with one McAfee ePO database and always gets policies and keys from the same single McAfee ePO instance. User local keys A local key is limited to the user and client system where it was created. Permission to create local keys must be assigned to the users by the Administrator as part of a policy. User local keys vs. user personal keys Note the differences between user local key and user personal key features. Users manually create their own user local keys on their local machines and share them via export and import processes. These user local keys are not uploaded to the McAfee ePO database and therefore do not transfer with the user to other computers via default FRP functionality. McAfee File and Removable Media Protection 4.3.0 Best Practices Guide 21 4 Encryption keys User local keys The availability of the user local key functions is subject to policy control. User personal keys are individual keys for each user automatically created in McAfee ePO and also managed centrally in McAfee ePO. The user is never engaged in creating and managing user personal keys – user personal keys are managed in McAfee ePO. Delete user local keys with caution Exercise caution when allowing users to delete local user encryption keys. Once deleted, there is no way to restore that key or any data encrypted with that key. 22 McAfee File and Removable Media Protection 4.3.0 Best Practices Guide Index A format limitations 16 Allow Encryption onsite access only 14 with offsite access 14 auditing 15 B G global key administrator 9 I blocking processes 10 I/O utilization 18 ISOs 16 C K CDs 16 compatibility, other encryption products 9 key request exclusions 11, 21 keys encryption 7, 21 recovery 14 user local keys 21 user personal 14 user personal keys 21 D data input size, self-extractors 19 decryption, automatic 14 delegated administration 9 deployment 7 Desktop folder 16 device exemptions 15 drives, encryption 7 DVDs 16 L large file support 14 latency 18 local volumes 16 E M email attachments 19 encryption general guidelines 16 encryption keys deactivating vs. deleting 21 key request exclusions 11 encryption keys, deployment 7 Enforce Encryption 14 enforce encryption, CD/DVD/ISOs 16 exemptions, device 15 Mac X OS offsite browser 15 Microsoft Outlook data directories 16 migration, between ePO servers 9 F file extension encryption 17 file size limitation, network share folders 18 folder encryption 16 guidelines 16 parent and child folders 17 removing from policy 17 McAfee File and Removable Media Protection 4.3.0 N network parameters tuning 18 network share encryption, intensity 18 network share folders bandwidth limit 18 explicit encryption, large folders 18 file size limitation 18 maximum number of clients 18 protection 18 O operating systems 7 Best Practices Guide 23 Index P U policy assignment rules 8 process blocking 10 Program Files directory 16 purpose 6 USB devices 13 Allow Encryption (with offsite access) 14 auditing 15 Enforce Encryption (onsite access only) 14 Enforce Encryption (with offsite access) 14 exemptions 15 ignore existing content 14 large file support 14 Mac X OS offsite browser 15 user local keys deleting 21 user personal keys 14, 21 multi-database environment 21 R recovery keys 14 removable media 13 reporting 15 role-based key management 9 S search encrypted option 18 secure sharing 13, 16 self-extractors 19 System Tree policy assignment rules 8 24 McAfee File and Removable Media Protection 4.3.0 W wildcards, file extensions 17 Best Practices Guide 00