Encrypting File System

advertisement
USING "ENCRYPTING FILE
SYSTEM" TO PROTECT
FILES AND FOLDERS
IN "WINDOWS.."
1
Web location for this
presentation:
http://aztcs.org
Click on
“Meeting Notes”
2
SUMMARY
Many of the "editions" of
"Windows 2000", "Windows
XP", "Windows Vista",
"Windows 7", and "Windows 8"
have the "Encrypting File
System" (EFS) for securing files
and/or folders inside NTFS hard
3
drive partitions.
•
•
•
•
TOPICS
Basics of Encrypting File System
"EFS" versus "BitLocker"
"Encrypting File System" Service
Using the "Certificate Manager" to
Check for Existing Personal "Public
Key Certificates"
• Encrypting A File or Folder with EFS
• Using the "Certificate Manager" to
Export a Newly-Created Public Key and
4
Private Key
TOPICS (continued)
• .PFX "Personal Information Exchange"
files
• Decrypting an EFS-encrypted file/folder
• Deleted Certificates Stay in RAM And
Are Active Until You Reboot
5
BASICS OF EFS
• The "Encrypting File System"
(EFS) is a feature of "NTFS"
hard drives (and partitions)
for many editions of
"Windows 2000" through
"Windows 8".
6
BASICS OF EFS (continued)
• When view in "Windows
Explorer" ("File Explorer"), a
folder that contains only
"Encrypting File System"encrypted files will have it's
name in green text:
7
8
BASICS OF EFS (continued)
• When viewed in "Windows
Explorer" ("File Explorer"),
a file that is encrypted by
"Encrypting File System"
will have it's name in
green text:
9
10
BASICS OF EFS (continued)
• Another user on the same computer
will be unable to open/view the EFSprotected file.
• If someone takes your hard drive,
and puts it into an external hard drive
enclosure and attaches the
enclosure to their own computer,
they will be unable to open/view the
EFS-protected file.
11
12
13
BASICS OF EFS (continued)
• "ESF" is a feature of "NTFS"
hard drives (and partitions)
for many editions of
"Windows 2000" through
"Windows 8".
14
BASICS OF EFS (continued)
• In EFS, "public key
certificates", "private keys",
and passwords to controll the
various keys all work together
to give you "two factor
authentication".
15
BASICS OF EFS (continued)
• The advantages of having
certificates are detailed in `
http://www.trustico.com/material/Te
chpaper_10_Best_Practices_Securi
ng_Your_Enterprise.pdf#page=6
and
http://serverfault.com/questions/182
980/how-is-using-client-certificatesmore-secure-than-tls-plus-basic16
authentication
BASICS OF EFS (continued)
• According to
http://en.wikipedia.org/wiki/Encr
ypting_File_System, Ecrypting
File System (EFS) is available
for the following editions of
"Windows..":
17
BASICS OF EFS (continued)
18
BASICS OF EFS (continued)
• "Windows Vista Starter", "..Home
Basic", and "..Home Premium"
allow only decryption--so you can
read encrypted files but you
cannot encrypt them according to
http://pcworld.about.net/od/encry
ption1/The-Simple-Way-to-KeepYour-Pr.htm
19
BASICS OF EFS (continued)
• For "Windows Vista Starter",
"..Home Basic", and "..Home
Premium" you can decrypt EFSencrypted files using the cipher
command line command. See
http://windows.microsoft.com/isIS/windows-vista/What-isEncrypting-File-System-EFS
20
BASICS OF EFS (continued)
• "Windows 7 Starter", "..Home
Basic", and "..Home Premium"
allow only decryption--so you can
read encrypted files but you not
encrypt them
21
BASICS OF EFS (continued)
• For "Windows 7 Starter", "..Home
Basic", and "..Home Premium"
you can decrypt EFS-encrypted
files using the cipher command
line command.
22
BASICS OF EFS (continued)
• See
http://answers.microsoft.com/enus/windows/forum/windows_7windows_programs/cipherexereturns-error-the-request-isnot/9d5cb3fc-d092-4551-bc9ff62dbd46f37c?msgId=5ad136cadedf-4013-8f1c-81627b907895
23
BASICS OF EFS (continued)
24
BASICS OF EFS (continued)
• "Encrypting File System" is also
available for NTFS drives/partitions
for the "..Pro" and "..Enterprise"
editions of "Windows 8".
• "Encrypting File System" will not be
available for the "..RT" or "Windows
8" editions of "Windows 8".
•
Reference:
http://en.wikipedia.org/wiki/Windows_8_edition
25
s#Comparison_chart
"EFS" VERSUS "BITLOCKER"
• "Bitlocker" is used to encrypt entire
hard drives or hard drive partitions
whiile "Encrypting File System" is
used to encrypt individual data files
and/or folders
• "EFS" causes less of a
performance reduction on your
Windows computer
26
"EFS" VERSUS "BITLOCKER" (continued)
• See
http://www.lockergnome.com/windo
ws/2012/04/25/bitlocker-vs-efs/
27
"ENCRYPTING FILE SYSTEM"
SERVICE MUST BE SET TO
"MANUAL" OR "AUTOMATIC"
• In order to encrypt or decrypt a
file or folder, the "Encrypting
File System" services has to be
set to "Manual" or "Automatic":
You can run services.msc from
any search box or "Run" box in
"Windows.." to turn it on:
28
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 1: Click on the "Start"
button in versions of "Windows"
prior to "..8" or, for "Windows
8..", hover over the lower-left
"Hot Corner" and use the
RIGHT mouse" to click on "Run"
in the pop-up "Power User
Context Menu":
29
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 2: Type in
services.msc
• Step 3: Press once on the Enter
key.
30
31
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 4: A "Services" Microsoft
Management Console window
will be displayed:
32
33
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 5: Use the vertical scroll bar
on the right to scroll downward until
you locate the "Encrypting File
System" service.
• Step 6: Use your RIGHT mouse
button to click on it.
• Step 7: A pop-up context menu will
be displayed:
34
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 8: Click on "Properties" in the
pop-up context menu:
35
36
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 9: A "Properties" dialog box will
be displayed.
• Step 10: Make sure that "Startup
type" is set to "Manual" or
"Automatic". "Manual" is preferable.
• Step 11: Click on the "Apply" button
if it is not grayed out.`
37
"ENCRYPTING FILE SYSTEM" SERVICE SET
TO "MANUAL" OR "AUTOMATIC" (continued)
• Step 12: Close the "Properties"
dialog box.
• Step 13: Close the "Services"
Microsoft Management Console
window.
38
39
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES"
• Step 1: Click on the "Start" button in
versions of "Windows" prior to "..8"
or, for "Windows 8..", hover over the
lower-left "Hot Corner" and use the
RIGHT mouse" to click on "Run" in
the pop-up "Power User Context
Menu":
40
41
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 2: Use the right mouse button
to click on "cmd.exe" in versions of
"Windows" prior to "..8" or, for
"Windows 8..", use the left mouse
button to click on "Command
Prompt (Admin) in the pop-up
Power User Tasks menu:
42
43
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 3: Use the left mouse button to
click on "Run as administrator" in
versions of "Windows" prior to "..8"
or, for "Windows 8..", use the left
mouse button to click on the "Yes"
button of the "User Account Control"
dialog box:
44
45
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 4: A command prompt window,
will be displayed:
46
47
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 5: Inside the command prompt
window, type in
certmgr.msc
• Step 6: Press once on the Enter
key.
48
49
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 7: A "certmgr" Microsoft
Management Console window will
be displayed:
50
51
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 8: Double-click on the
Personal group in the right-most
pane:
52
53
54
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 9: Double-click on
"Certificates" subgroup in the rightmost pane:
55
56
USING THE "CERTIFICATE MANAGER"
TO CHECK FOR EXISTING PERSONAL
"PUBLIC KEY CERTIFICATES" (continued)
• Step 10: Note that you presently
have no "Public Key Certificates" or
subgroups in the "Personal" group:
57
58
ENCRYPTING A FILE OR FOLDER
WITH "ENCRYPTING FILE SYSTEM"
• Step 1: Start "Windows
Explorer" ("File Explorer").
• Step 2: Locate or create the
folder or file that you want to
encrypt.
59
60
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 3: Use the RIGHT mouse
to click on it.
• Step 4: A pop-up context menu
will be displayed.
• Step 5: Click on "Properties".
61
62
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 6: A "..Properties" dialog
box will be displayed.
• Step 7: Click on the "Advanced"
button.
63
64
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 8: An "Advanced
Attributes" box will be displayed:
65
66
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 9: Put in a checkmark for
"Encrypt contents to secure
data".
• Step 10: Click on the "OK"
button:
• Step 11: The "Advanced
Attributes" box will disappear.
67
68
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 12: Click on the "Apply"
button of the "..Properties"
dialog box, if the "Apply" button
is not grayed out. Step 11: The
"Advanced Attributes" box will
disappear.
69
70
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 13: Select the desired
"option button":
71
72
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 14: Click on the "Continue"
button of the "Access Denied"
dialog box:
73
74
ENCRYPTING A FILE OR FOLDER WITH
"ENCRYPTING FILE SYSTEM" (continued)
• Step 15: The "Access Denied"
box will disappear.
• Step 16: The file name(s) of the
newly-encrypted file(s) will now
be displayed in a green font to
indicate that the file(s) is/are
encrypted by "Encrypting File
75
System".
76
USING THE "CERTIFICATE MANAGER"
TO EXPORT A NEWLY-CREATED
"PUBLIC KEY" AND "PRIVATE KEY"
• Step 1: Click on the "Start" button in
versions of "Windows" prior to "..8"
or, for "Windows 8..", hover over the
lower-left "Hot Corner" and use the
RIGHT mouse" to click on "Run" in
the pop-up "Power User Context
Menu":
77
78
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 2: Use the right mouse button
to click on "cmd.exe" in versions of
"Windows" prior to "..8" or, for
"Windows 8..", use the left mouse
button to click on "Command
Prompt (Admin) in the pop-up
Power User Tasks menu:
79
80
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 3: Use the left mouse button to
click on "Run as administrator" in
versions of "Windows" prior to "..8"
or, for "Windows 8..", use the left
mouse button to click on the "Yes"
button of the "User Account Control"
dialog box:
81
82
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 4: A command prompt window,
will be displayed:
83
84
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 5: Inside the command prompt
window, type in
certmgr.msc
• Step 6: Press once on the Enter
key.
85
86
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 7: A "certmgr" Microsoft
Management Console window will
be displayed:
87
88
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 8: Double-click on the
Personal group in the right-most
pane:
89
90
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 9: Double-click on
"Certificates" subgroup in the rightmost pane:
91
92
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 10: Note that you now have a
newly-created "Public Key
Certificate" in the "Certificates"
subgroup of the "Personal" group:
93
94
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 11: Note that you now have a
newly-created "Public Key
Certificate" in the "Certificates"
subgroup of the "Personal" group:
95
96
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 12: Use the RIGHT mouse
button to click on the newly-created
"Public Key Certificate":
97
98
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 13: Click on "All Tasks" in the
pop-up context menu:
99
100
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 14: Click on "Advanced
Operations" in the secondary
context menu:
101
102
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 15: A "Certificate Export
Wizard" dialog box will be
displayed.
• Step 16: Click on the "Next" button:
103
104
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 17: Select the "Yes, export the
private key" option.
• Step 18: Click on the "Next" button:
105
106
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 19: Click on the "Next" button:
107
108
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 20: Click on the "Next" button:
109
110
111
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 21: Type in a password and
record it somewhere in a secure
manner (such as with "Roboform" or
"LastPass"):
112
113
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY"(continued)
• Step 22: Type in the same
password again.
• Step 23: Click on the "Next" button:
114
115
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 24: Click on the "Browse"
button:
116
117
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 25: Use the "Save As" box to
work your way to the hard drive or
flash drive location where you wish
to place the .PFX file:
118
119
120
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 26: When you arrive at the
desired location for the .PFX file,
type in a name for the .PFX file.
• Step 27: Click on the "Save" button:
121
122
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 28: Click on the "Next" button:
123
124
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 29: Click on the "Finish"
button:
125
126
127
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 30: Click on "OK" button:
128
129
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 31: Click on "x" button to close
the "certmgr" window:
130
131
USING THE "CERTIFICATE MANAGER" TO
EXPORT A NEWLY-CREATED "PUBLIC KEY"
AND "PRIVATE KEY" (continued)
• Step 32: Click on "x" button to close
the Command Prompt window:
132
133
134
.PFX FILE(S) (continued)
• .PFX file(s)
= "Personal Information Exchange"
files
• .PFX file(s) an be moved, copied,
renamed, and e-mailed without
restrictions.
135
.PFX FILE(S) (continued)
• Double-click on it to "Import"
the certificate and the private
key into any computer or
Windows user account. Then
you can open/view the
associated the EFS-encrypted
data file
136
DECRYPTING AN EFSENCRYPTED FILE/FOLDER
If your Windows user account or your
Windows computer cannot open an
EFS-encrypted file, do the following:
• Step 1: Obtain the .PFX file (from
the creator/owner of the EFSencrypted file) and double-click on
the .PFX file:
137
138
139
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 2: Click on the "Next" button of
the "Certificate Import Wizard":
140
141
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 3: Click on the "Next" button:
142
143
144
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 4: Type in the password for the
.PFX file (which you should have
obtained from the creator/owner of
the EFS-encrypted data file):
145
146
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 5: Select the "Mark this key as
exportable" option.
• Step 6: Click on the "Next" button:
147
148
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 7: Click on the "Next" button:
149
150
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 8: Click on the "Finish" button:
151
152
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 9: Click on the "OK" button:
153
154
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 10: If you EFS-encrypted files
are inside an EFS-encrypted folder,
double-click on the folder to open it:
155
156
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 11: Double-click on the EFSencrypted data file to open it:
157
158
DECRYPTING AN EFS-ENCRYPTED
FILE/FOLDER (continued)
• Step 12: The EFS-encrypted data
file will open with its default
associated software application
program ("app"):
159
160
DELETED CERTIFICATES STAY IN
RAM UNTIL YOU RE-BOOT
• If you run certmgr.msc to delete
a certificate from your
computer's hard drive, the
certificate will stay active in
RAM, so you have to re-boot to
flush out the active certificate.
161
OPTIONS IN "ACRONIS TRUE IMAGE.."
FOR BACKING UP HARD DRIVES THAT
CONTAIN EFS-ENCRYPTED FILES
• According to
http://www.acronis.com/support/
documentation/ATIH2012/index.
html#267.html:
162
163
Download