Solved

EFS/PKI Implementation help

Posted on 2006-06-14
1
727 Views
Last Modified: 2013-12-04
I am in the process of implementing EFS on our domain using PKI for file level encryption.  I am trying to find step-by-step tutorials to help with the process (screenshots would be nice) and any type of bullet point checklist of things I will need to do to complete the project.  I have looked and looked but I just keep finding broad overviews of EFS and PKI.  Any help to get the information and get me started would be appreciated.  This is extremely important so I am awarding 500 points.  

FYI - It will be implemented on a windows 2003 server if that helps any.  Ask me questions if you need more information.
0
Comment
Question by:tw_chase
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 16906155
A few things to keep in mind with EFS...
EFS creates a plain-text copy of encrypted files/folders within the folder that data resides, it's recommended that data to be encrypted be placed in an already encrypted folder to avoid possible plain-text recovery.
You must backup your domain admin recovery agents and administrator keys. These will make it possible for you to recover data if a user's account is deleted or incase of HD failure etc...

http://support.microsoft.com/?kbid=241201
http://support.microsoft.com/kb/223316/en-us
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/efs.mspx  (screen shots and all ;)
http://www.microsoft.com/technet/security/smallbusiness/topics/cryptographyetc/protect_data_efs.mspx
-rich
0

Featured Post

Raise the IQ of Your IT Alerts

From IT major incidents to manufacturing line slowdowns, every business process generates insights that need to reach the people required to take action. You need a platform that integrates with your business tools to create fully enabled DevOps toolchains.

You need xMatters.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question